All Projects → IllusiveNetworks-Labs → GetConsoleHistoryAndOutput

IllusiveNetworks-Labs / GetConsoleHistoryAndOutput

Licence: BSD-3-Clause license
An Incident Response tool to extract console command history and screen output buffer

Programming Languages

C++
36643 projects - #6 most used programming language

Projects that are alternatives of or similar to GetConsoleHistoryAndOutput

Memlabs
Educational, CTF-styled labs for individuals interested in Memory Forensics
Stars: ✭ 696 (+1597.56%)
Mutual labels:  forensics, dfir
RdpCacheStitcher
RdpCacheStitcher is a tool that supports forensic analysts in reconstructing useful images out of RDP cache bitmaps.
Stars: ✭ 176 (+329.27%)
Mutual labels:  forensics, dfir
Autotimeliner
Automagically extract forensic timeline from volatile memory dump
Stars: ✭ 54 (+31.71%)
Mutual labels:  forensics, dfir
Turbinia
Automation and Scaling of Digital Forensics Tools
Stars: ✭ 461 (+1024.39%)
Mutual labels:  forensics, dfir
Pypowershellxray
Python script to decode common encoded PowerShell scripts
Stars: ✭ 192 (+368.29%)
Mutual labels:  forensics, dfir
Diffy
Diffy is a triage tool used during cloud-centric security incidents, to help digital forensics and incident response (DFIR) teams quickly identify suspicious hosts on which to focus their response.
Stars: ✭ 555 (+1253.66%)
Mutual labels:  forensics, dfir
Packrat
Live system forensic collector
Stars: ✭ 16 (-60.98%)
Mutual labels:  forensics, dfir
Recuperabit
A tool for forensic file system reconstruction.
Stars: ✭ 280 (+582.93%)
Mutual labels:  forensics, dfir
Linuxforensics
Everything related to Linux Forensics
Stars: ✭ 189 (+360.98%)
Mutual labels:  forensics, dfir
Timesketch
Collaborative forensic timeline analysis
Stars: ✭ 1,795 (+4278.05%)
Mutual labels:  forensics, dfir
Swap digger
swap_digger is a tool used to automate Linux swap analysis during post-exploitation or forensics. It automates swap extraction and searches for Linux user credentials, web forms credentials, web forms emails, http basic authentication, Wifi SSID and keys, etc.
Stars: ✭ 354 (+763.41%)
Mutual labels:  forensics, dfir
Adtimeline
Timeline of Active Directory changes with replication metadata
Stars: ✭ 252 (+514.63%)
Mutual labels:  forensics, dfir
Mac apt
macOS Artifact Parsing Tool
Stars: ✭ 329 (+702.44%)
Mutual labels:  forensics, dfir
Hindsight
Web browser forensics for Google Chrome/Chromium
Stars: ✭ 589 (+1336.59%)
Mutual labels:  forensics, dfir
Ir Rescue
A Windows Batch script and a Unix Bash script to comprehensively collect host forensic data during incident response.
Stars: ✭ 311 (+658.54%)
Mutual labels:  forensics, dfir
Etl Parser
Event Trace Log file parser in pure Python
Stars: ✭ 66 (+60.98%)
Mutual labels:  forensics, dfir
ir scripts
incident response scripts
Stars: ✭ 17 (-58.54%)
Mutual labels:  forensics, dfir
truehunter
Truehunter
Stars: ✭ 30 (-26.83%)
Mutual labels:  forensics, dfir
Invoke Liveresponse
Invoke-LiveResponse
Stars: ✭ 115 (+180.49%)
Mutual labels:  forensics, dfir
Userline
Query and report user logons relations from MS Windows Security Events
Stars: ✭ 221 (+439.02%)
Mutual labels:  forensics, dfir

GetConsoleHistoryAndOutput

GetConsoleHistoryAndOutput is designed to be used as part of "Live Response" forensic investigations.

The ability to retrieve command history and console output buffer of suspicious processes could enable IR teams to gain visibility into attackers actions on a victim's system.

The GetConsoleHistoryAndOutput receives a PID of a console process and retrieves the console command history and screen output buffer.

Additional reading material on the tool, can be found in our blog Windows Console Command History: Valuable Evidence for Live Response Investigation.

How to use

Usage: GetConsoleHistoryAndOutput.exe pid_of_console_process outputfile_path

Examples

The PID of the following console is 6364 alt tag
Running:

GetConsoleHistoryAndOutput.exe 6364 output.txt

Will result with the following data at output.txt:

### Display Output of PID: 6364###

## Process' Command History ##
H0: net group "domain admins" /domain

## Console Output Buffer ##
L0: Microsoft Windows [Version 6.1.7601]                                                                                    
L1: Copyright (c) 2009 Microsoft Corporation.  All rights reserved.                                                         
L3: C:\Users\lex>net group "domain admins" /domain                                                                          
L4: The request will be processed at a domain controller for domain DCOMIC.LOCAL.                                           
L6: Group name     Domain Admins                                                                                            
L7: Comment        Designated administrators of the domain                                                                  
L9: Members                                                                                                                 
L11: -------------------------------------------------------------------------------                                         
L12: Administrator            aquaman                  captaina                                                              
L13: lex                                                                                                                     
L14: The command completed successfully.                                                                                     
L17: C:\Users\lex>                                                  
                                                         
###        Output End         ###

Authors

  • Tom Sela - @4x6hw
  • Liav Teichner

License

This project is licensed under the BSD 3-clause license - see the LICENSE file for details

Contributors

Illusive Networks Research & Dev team members:

  • Tomer Shamul
  • Tom Kahana
  • Dolev Ben Shushan
  • Hadar Yudovich
Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].