Evaluate and establish a baseline of host activity to identify abnormal processes, services, user behavior, and persistence mechanisms on potentially compromised systems.
Given access to hosts across Windows, Linux, and macOS platforms and appropriate local or remote administrative privileges.
A documented host activity baseline exists, allowing rapid detection of anomalies and informing eradication and recovery plans.
Operator Note: Expectations differ greatly → A DC running RDP is normal, a user workstation running RDP server is suspicious.
Get-Process | Sort-Object ProcessName | Format-Table -AutoSize
Save output:
Get-Process | Out-File C:\IR\baseline_process_list.txt
ps aux --sort=pid
Save output:
ps aux --sort=pid > /tmp/baseline_process_list.txt
Operator Note: Look for unsigned, unusual named processes, or processes running from temp directories.
Get-NetTCPConnection | Format-Table -AutoSize
ss -tulnp
Operator Note: Investigate processes listening on unexpected ports (ex: Powershell hosting a web server).
Get-ScheduledTask | Format-Table -AutoSize
reg query HKLM\Software\Microsoft\Windows\CurrentVersion\Run
crontab -l
ls /etc/cron* /var/spool/cron
launchctl list
Operator Note: Persistence mechanisms often hide here. Flag anything unfamiliar.
quser
Get-EventLog -LogName Security -InstanceId 4624 | Select-Object -First 20
who
last
Operator Note: Unexpected logins (especially at odd hours) → red flag.
Get-WmiObject -Class Win32_Product | Select-Object Name
dpkg -l
system_profiler SPApplicationsDataType
Operator Note: Look for unauthorized or suspicious software.
Create a report documenting:
Hostname | Normal Processes | Normal Ports | Installed Software | Users/Logins | Notes |
---|---|---|---|---|---|
WIN-DC01 | lsass.exe, svchost.exe | 88, 135, 445 | AV, Adobe Reader | admin, svc-account | DC - normal baseline |
USER-PC | chrome.exe, outlook.exe | none | Chrome, Office | user | normal user profile |
Operator Note: Not everything unknown is bad → escalate suspicious findings to Intel or IR Lead.
Tool | Platform | Installation | Usage |
---|---|---|---|
Sysinternals Suite (Autoruns, PsExec, Procmon) | Windows | Download | Deep process and autorun analysis |
Velociraptor | Cross-platform | Deploy agent | Enterprise-scale endpoint telemetry |
OSQuery | Cross-platform | Install agent | SQL-based host visibility |
PowerShell / Bash | Native | Built-in | Collect process and system info |
Date | Version | Description | Author |
---|---|---|---|
2025-05-02 | 1.0 | Created from scratch with deep operator-focused guidance and examples | Leo |