An introduction to
Sysinternals tools
Riyaz Walikar
@wincmdfu
Background
• The sysinternals website was created and operated by the company
Winternals Software LP
• Collection of utilities to manage, diagnose, troubleshoot and monitor
a Windows environment
• Microsoft acquired Winternals and its assets on July 18, 2006
• Bryce Cogswell
• Mark Russinovich
Tools
• Collection of 60+ utilities
• https://technet.microsoft.com/en-us/sysinternals/bb842062
• live.sysinternals.comtoolsstrings.exe
• I will try and cover
• strings, tcpview, autoruns, procexp, procmon, procdump and psexec
strings
strings
tcpview
autoruns
procexp
procmon
procdump
After obtaining a memory dump of the lsass.exe
mimikatz # sekurlsa::minidump lsass.exe_161216_112214.dmp
psexec
References and further reading
• https://technet.microsoft.com/en-us/sysinternals/bb545021.aspx
• https://technet.microsoft.com/en-us/sysinternals/bb842062
• https://blogs.technet.microsoft.com/markrussinovich/
• https://technet.microsoft.com/en-us/sysinternals/bb963887
• https://ibreak.software/2009/07/22/the-case-of-the-intelligent-spambot/
• https://ibreak.software/2009/07/07/the-case-of-the-persistent-executable/
C:> whoami
• Chief Offensive Security Officer – Appsecco
• @riyazwalikar
• @wincmdfu
• riyazwalikar@gmail.com
• http://ibreak.software

An Introduction to Sysinternals

  • 1.
    An introduction to Sysinternalstools Riyaz Walikar @wincmdfu
  • 2.
    Background • The sysinternalswebsite was created and operated by the company Winternals Software LP • Collection of utilities to manage, diagnose, troubleshoot and monitor a Windows environment • Microsoft acquired Winternals and its assets on July 18, 2006
  • 3.
    • Bryce Cogswell •Mark Russinovich
  • 4.
    Tools • Collection of60+ utilities • https://technet.microsoft.com/en-us/sysinternals/bb842062 • live.sysinternals.comtoolsstrings.exe • I will try and cover • strings, tcpview, autoruns, procexp, procmon, procdump and psexec
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
    procdump After obtaining amemory dump of the lsass.exe mimikatz # sekurlsa::minidump lsass.exe_161216_112214.dmp
  • 12.
  • 13.
    References and furtherreading • https://technet.microsoft.com/en-us/sysinternals/bb545021.aspx • https://technet.microsoft.com/en-us/sysinternals/bb842062 • https://blogs.technet.microsoft.com/markrussinovich/ • https://technet.microsoft.com/en-us/sysinternals/bb963887 • https://ibreak.software/2009/07/22/the-case-of-the-intelligent-spambot/ • https://ibreak.software/2009/07/07/the-case-of-the-persistent-executable/
  • 14.
    C:> whoami • ChiefOffensive Security Officer – Appsecco • @riyazwalikar • @wincmdfu • riyazwalikar@gmail.com • http://ibreak.software

Editor's Notes

  • #9 The newer versions of autoruns has a tab for WMI, office
  • #12 Mimkatz is a tool used to extract Kerberos tickets, passwords, logon credentials and tons of other information from a Windows computer.
  • #13 Run commands as a different user or on remote systems