Exploiting Event Log Readers Group for Security Log Access
Verify Group Membership:
net localgroup "Event Log Readers"
Check if the user is a member of the "Event Log Readers" group.
Identify Audit Settings:
Determine if process creation auditing (Event ID 4688) and command-line logging are enabled.
Query Security Logs using wevtutil
:
wevtutil
:wevtutil qe Security /rd:true /f:text | Select-String "/user"
Search for credential usage in the security logs.
wevtutil qe Security /rd:true /f:text /r:<remote_host> /u:<user> /p:<password> | findstr "/user"
Remotely query security logs with credentials.
Query Security Logs using Get-WinEvent
:
Get-WinEvent
:Get-WinEvent -LogName security | Where-Object { $_.ID -eq 4688 -and $_.Properties[8].Value -like '*/user*'}
Search for credential usage in process creation events.
Get-WinEvent -LogName security -Credential <PSCredential> | Where-Object { $_.ID -eq 4688 -and $_.Properties[8].Value -like '*/user*'}
Remote query using specific credentials.
Explore PowerShell Operational Logs:
Examine the PowerShell Operational log for sensitive information if script block or module logging is enabled.
Commands:
net localgroup "Event Log Readers"
wevtutil qe Security
findstr
PowerShell Cmdlets:
Get-WinEvent
Select-String
Where-Object
Techniques:
Leverage "Event Log Readers" group membership to access security logs.
Search for sensitive information (credentials, command-line parameters) within event logs.
Use
wevtutil
andGet-WinEvent
to query and filter event log data.Explore PowerShell Operational logs for potential credential leaks.
Understand the importance of process creation auditing and command-line logging.
Last updated