(ProcExp: Process Explorer)
{ Viewing Parent and Child Processes }
0. Background Information |
- http://technet.microsoft.com/en-us/sysinternals/bb896653
- The Process Explorer display consists of two sub-windows.
- The top window always shows a list of the currently active processes, including the names of their owning accounts, whereas the information displayed in the bottom window depends on the mode that Process Explorer is in: if it is in handle mode you'll see the handles that the process selected in the top window has opened; if Process Explorer is in DLL mode you'll see the DLLs and memory-mapped files that the process has loaded.
- Process Explorer also has a powerful search capability that will quickly show you which processes have particular handles opened or DLLs loaded.
- The unique capabilities of Process Explorer make it useful for tracking down DLL-version problems or handle leaks, and provide insight into the way Windows and applications work.
- Login to your Instructor VM, as username Administrator
- For those of you that are not part of this class, this is a Windows XP machines.
- From your Instructor VM, open your Windows Explorer Web Browser.
- Paste in the below link into your web browser.
- http://download.sysinternals.com/Files/ProcessExplorer.zip
- Click Save
- Save to C:\tools\ProcExp
- Select Open Folder
- Right Click on ProcessExplorer, Extract All
- Click Next
- Click Next
- Click Finished
2. Running ProcessExplorer |
- Navigate to C:\tools\ProcExp\ProcessExplorer
- Double Click on procexp.exe
- Click Run
- Click Agree
- Next you will see a screen that looks very similar to the below.
- Notice the Parent / Child Process Tree Structure
3. Viewing Process Properties |
- Scroll Down to lsass.exe
- Right click on lsass.exe
- Click on Properties
- As you can see lsass.exe is responsible for Net Login
- From the Services tab, you have the ability to:
- Stop, Restart and Pause the Process
- Also you can see who has Permission to Full Control, Read, and Write.
- Click on Permissions Button.
- For each user
- Make sure only the Administrator User have Full Control, Read, and Write Permission.
- All other user should only have Read Access, and perhaps special permissions.
- Goal: We are verifying that only the administrator users have Full Control.
- Highlight lsass.exe
- Right Click on lsass.exe --> Create Dump --> Create Full Dump
- Navigate to C:\tools\ProcExp\ProcessExplorer (See Below)
- Save File as lsass-YYYYMMDD.dmp, where YYYYMMDD is a date field.
- Using Windows Explorer, Navigate to C:\tools\ProcExp\ProcessExplorer
- Proof of Lab: Highlight lsass-YYYYMMDD.dmp, Do a screen print, Paste into word doc, Upload to Moodle.
- Special Note (Not required for this lab), for dumping all memory processes.
- You would highlight System --> Create Dump --> Create Full Dump
- From a forensics point of view, you would want to capture everything.
- Cut and Paste a screen shot that looks similar to Step #3 in Section 5 into a word document and upload to Moodle.
No comments:
Post a Comment