Searching through Windows event logs can be a daunting task even for the most seasoned professional – even more so if you don’t have the experience to know where and what to look for exactly.
DeepBlueCLI written by Eric Conrad, is a great Incident response tool due to its speed which is critical in an incident response setting.
DeepBlueCLI can also be used to conduct Threat Hunting activities.
DeepBlueCLI is included in the amazing Incident Response Card Game,Backdoors & Breaches.
DeepBlueCLI can be used multiple ways:
- on a local system,
- over the Windows domain network,
- on offline log files.
At minimum, you need the following 5 event ID’s logged in your environment in order to have DeepBlueCLI work:
- 4688
- 4625
- Sysmon Event ID 1
- 4103,4104
DeepBlueCLI capabilities:
- Detects Metasploit style service names.
- Detects obfuscation, both powershell and cmd.
- Password Spraying
- Automatically decode base64 encoded commands.
- and many more.
DeepBlueCLI execution:
You can customize DeepBlueCLI by editing the regexes.txt to add command lines or service names to match for.
You can also add custom regex patterns to the safelist.txt file to ignore applications that create long command lines and are legitimate, some examples include the Chrome or Edge update executables.
As DeepBlueCLI is written in powershell we can easily modify our output with pipeline filters.
To only view selected fields:
Export the results into a csv file:
If you want more hands-on experience with DeepBlueCLI check out the evtx files in the github repo.
Thanks for the reading, happy learning!
Source: GlobalSign
Author
Péter Szöllősi
OFFENSIVE SECURITY MANAGER
Related Posts
Tool Tip: How to create honey folders?
In today's blog post, we will be going over how to create honey folders with no additional...
Deep Dive into the Technical Background of Black Cell’s first Capture the Flag Event
On May 17, 2024, Black Cell hosted its first blue-team CTF tournament, SecOps 2024 CTF. Capture...