Skip to content

AntonyN0P/PowerShell_IncidentResponse

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 

Repository files navigation

PowerShell script for take a snapshots of hosts (Baseline). Take snapshot or host BaseLine, is good practice in Incident Response cause you have opportunity to compare host before intrusion and after, set differences between policies, services, processes, files hashes etc. The script created with multithreading programming for some cmdlets (once you start, script'll check ThreadJob powershell module for multithreading programming and suggest to install, if module wasn't found on host), it's more faster. And for more information you can use autorunsc64.exe and sha256deep64.exe for make hashes. Creates a folder filled with CSV, XML and TXT files which capture the current operational state of the computer, such as running processes, services, user accounts, audit policies, shared folders, networking settings, and more. These files can be used for threat hunting, auditing, compliance, and troubleshooting purposes.

The output folder will be named after the local host and the current date and time, e.g., .\COMPUTERNAME-Year-Month-Day-Hour-Minute.

Script requires PowerShell 3.0, Windows 7, Server 2008, or later, and must be run with administrative privileges.

Most commands are built into PowerShell 3.0 and later, but some tools will need to be installed first in order to use them, such as AUTORUNSC64.EXE (https://download.sysinternals.com/files/Autoruns.zip) and SHA256DEEP.EXE (https://sourceforge.net/projects/md5deep/files/latest/download). Script gather:

  • Audit-Policy;
  • BIOS information;
  • ComputerSystem information;
  • Info about drivers;
  • dxdiag info;
  • Environment-Variables info;
  • FileSystem existing files and hidden filesystem files;
  • FS NTFS permissions;
  • Group-Members;
  • Groups;
  • MSINFO;
  • Name-Resolution-Policy-Table;
  • Network-Adapters;
  • Net. connections profiles;
  • Network-Firewall-Export;
  • Network-Firewall-Profiles;
  • Network-Firewall-Rules;
  • Network-IPaddresses;
  • Network-IPSec-Rules;
  • Network-NbtStat;
  • Network-Route-Table;
  • Network-TCP-Listening-Ports;
  • Network-UDP-Listening-Ports;
  • Network-WinSock;
  • Password-And-Lockout-Policies;
  • Processes;
  • Registry-CurrentControlSet;
  • Registry-WindowsCurrentVersion;
  • SecEdit-Security-Policy;
  • Shared-Folders;
  • Users;
  • Hashes of all SystemRoot's files;
  • Hashes of all ProgramFiles;
  • Hashes of all files on volumes;
  • And big AutoRuns's report (If you use autorunsc64.exe together in script's directory).

About

PowerShell scripts for IncidentResponse

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published