Safety Checks
Seatbelt - local and remote safety checksâ
Seatbelt.exe -group=<all|user|system|slack|chrome|remote|misc> [-full]
Seatbelt.exe -group=<remote> -computername=<hostname[.evilcorp.com]> [-username=<domain>\<user> -password=<password>]
Seatbelt.exe -group=user -outputfile="<C:\Temp\out.txt|C:\Temp\out.json">
Seatbelt.exe <checks1> <checks2> <checks3> [-q]
Scout - remote safety checksâ
scout <hostname|ip>
Antivirusâ
wmic /namespace:\\root\securitycenter2 path antivirusproduct
Antivirus exclusion
windows/gather/enum_av_excluded
Sysmonâ
Get-Process | Where-Object { $_.ProcessName -eq "Sysmon" }
Proxy settingsâ
netsh winhttp show proxy
ping -n 1 wpad
PowerShellâ
Engines
reg query HKLM\SOFTWARE\Microsoft\PowerShell\
reg query HKLM\SOFTWARE\Microsoft\PowerShell\<X>
Logging
reg query HKLM\SOFTWARE\Policies\Microsoft\Windows\PowerShell\Transcription
reg query HKLM\SOFTWARE\Policies\Microsoft\Windows\PowerShell\ModuleLogging
reg query HKLM\SOFTWARE\Policies\Microsoft\Windows\PowerShell\ScriptBlockLogging
CLM
$ExecutionContext.SessionState.LanguageMode
AppLockerâ
Get-AppLockerPolicy -Effective -XML
Get-AppLockerPolicy -Effective | select -ExpandProperty RuleCollections
DeviceGuardâ
Get-CimInstance -ClassName Win32_DeviceGuard -Namespace root\Microsoft\Windows\DeviceGuard
Properties | Description | Valid values |
---|---|---|
AvailableSecurityProperties | This field helps to enumerate and report state on the relevant security properties for Device Guard. |
|
RequiredSecurityProperties | This field describes the required security properties to enable virtualization-based security. |
|
SecurityServicesConfigured | This field indicates whether the Credential Guard or HVCI service has been configured. |
|
SecurityServicesRunning | This field indicates whether the Credential Guard or HVCI service is running. |
|
VirtualizationBasedSecurityStatus | This field indicates whether VBS is enabled and running. |
|
Usersâ
Logged on users
Get-EventLog -LogName Security [-Newest 100] | Where-Object {$_.EventID -eq 4624}
List Processes with potential creds embedded in executable or config file
Get-EventLog -LogName Security -Newest 100 | Where-Object {$_.EventID -eq 4648} | Select-Object -Property *
Available CLRâ
dir %WINDIR%\Microsoft.Net\Framework\ /s /b | find "System.dll"
[System.IO.File]::Exists("$env:windir\Microsoft.Net\Framework\v2.0.50727\System.dll")
[System.IO.File]::Exists("$env:windir\Microsoft.Net\Framework\v4.0.30319\System.dll")
Audit policyâ
auditpol /get /categoryams:*
RDP historyâ
reg query HKCU\Software\Microsoft\Terminal Server Client\