Skip to content

Commit aec7cf2

Browse files
authored
Update README.md
1 parent 6787031 commit aec7cf2

File tree

1 file changed

+9
-9
lines changed

1 file changed

+9
-9
lines changed

README.md

+9-9
Original file line numberDiff line numberDiff line change
@@ -49,35 +49,35 @@ _You can query the database file directly using any SQLite management software w
4949
**Process View** this view simply helps focus on a summary of "run sessions", for example, the analyst can start with executable name (such as cmd.exe) or event type (such as Network event), from there, further filtering can be applied, for example, finding running sessions originating for the same binary, but from different locations. This view utilizes the process GUID to filter events per session "run", selecting any running session (from the list of GUIDs) will show all other related (correlated) events in a simple data-flow-like view, sorted using the time of the event.
5050
_Note: in case data is being imported from an Elasticsearch instance instead of single machine, events can be arranged per executable per machine - check previous section **"Experimental - Sysmon View and Elasticsearch"**)._
5151

52-
![Sysmon View](https://nosecurecode.com/wp-content/uploads/2018/07/1_5.png "Sysmon View")
52+
![Sysmon View](https://nosecurecode.files.wordpress.com/2022/02/cb439-1_5.png "Sysmon View")
5353

5454
Access to Sysmon event details is provided by simply double-clicking any event in the view, for example, the previous screen capture shows the details of the _Process Creation_ event (event ID 1), the tool also can integrate with VirusTotal upon demand for further hash and IP lookup (Needs an API key registration).
5555

5656
**Map View** : During the events import process, there is an option to geo-locate IP addresses, if set, Sysmon View will try to geo-map **Network Destinations** using https://ipstack.com/ service.
5757

58-
![Sysmon View](https://nosecurecode.com/wp-content/uploads/2018/07/2.png "Sysmon View")
58+
![Sysmon View](https://nosecurecode.files.wordpress.com/2022/02/4a3e4-2.png "Sysmon View")
5959

6060
In **map view**, it is easy to navigate between correlated (related) events by using a _network event_ as a starting point, again, the tool is able to achieve this using the running process session GUID. To explore related events, use the hyperlinks for the session GUID, a new view similar to **process view** will show up in a new window with all related session events:
6161

62-
![Sysmon View](https://nosecurecode.com/wp-content/uploads/2018/07/2_5.png "Sysmon View")
62+
![Sysmon View](https://nosecurecode.files.wordpress.com/2022/02/0dee3-2_5.png "Sysmon View")
6363

6464
**All Events View** can also be used to do a _full search_ through all Sysmon collected events data, it also helps in viewing events that do not relate to other events, such as the "Driver Loaded" event type. Navigation between related events is still provided using the process GUID in addition to event details by clicking on _FID link_
6565

66-
![Sysmon View](https://nosecurecode.com/wp-content/uploads/2018/07/3.png "Sysmon View")
66+
![Sysmon View](https://nosecurecode.files.wordpress.com/2022/02/7bee8-3.png "Sysmon View")
6767

6868
Additionally, The **All Events View** supports pivot-like (grouping) arrangement of events, by machine name, event type or GUID, as shown below
6969

70-
![Sysmon View](https://nosecurecode.com/wp-content/uploads/2018/07/4.png "Sysmon View")
70+
![Sysmon View](https://nosecurecode.files.wordpress.com/2022/02/1363d-4.png "Sysmon View")
7171

7272
Multiple grouping levels are also possible
7373

74-
![Sysmon View](https://nosecurecode.com/wp-content/uploads/2018/07/5.png "Sysmon View")
74+
![Sysmon View](https://nosecurecode.files.wordpress.com/2022/02/4599c-5.png "Sysmon View")
7575

7676
# Sysmon Shell
7777

7878
Sysmon Shell can aid in writing and applying Sysmon XML configurations through a simple GUI interface.
7979

80-
![Sysmon Shell](https://nosecurecode.com/wp-content/uploads/2017/11/HeadImageSysmonShell.png "Sysmon Shell")
80+
![Sysmon Shell](https://nosecurecode.files.wordpress.com/2022/02/ceb83-headimagesysmonshell.png "Sysmon Shell")
8181

8282
Sysmon Shell can also be used to explore the various configuration options available to Sysmon, easily apply and update XML configuration, in addition to exporting Sysmon events logs, in a nutshell:
8383

@@ -92,15 +92,15 @@ Sysmon Shell can also be used to explore the various configuration options avail
9292
* The utility has descriptions for all events types taken from Sysmon Sysinternals home page (https://docs.microsoft.com/en-us/sysinternals/downloads/sysmon)
9393
* Sysmon Shell comes _bundled_ with many Sysmon configuration templates created by other security professionals
9494

95-
![Sysmon Shell Templates](https://nosecurecode.com/wp-content/uploads/2017/12/SysmonShellTemplates.png "Sysmon Shell Templates")
95+
![Sysmon Shell Templates](https://nosecurecode.files.wordpress.com/2022/02/e2986-sysmonshelltemplates.png "Sysmon Shell Templates")
9696

9797
**What it won’t do**: warn you about Include/Exclude conflicts or attempt to validate the rules itself, however, once the configuration is applied, the preview pane will display the output captured from Sysmon.exe when configuration is applied (the output of `Sysmon -c command`), from which errors can be identified
9898

9999
# Sysmon Box
100100

101101
Sysmon Box is a small utility that can aid in building a database of captured Sysmon and Network traffic.
102102

103-
![Sysmon Box](https://nosecurecode.com/wp-content/uploads/2019/06/5_6_JUN_2019.png "Sysmon Box")
103+
![Sysmon Box](https://nosecurecode.files.wordpress.com/2022/02/8930e-5_6_jun_2019.png "Sysmon Box")
104104

105105
To run Sysmon Box, use the following command (Sysmon needs to be up and running along with tshark):
106106

0 commit comments

Comments
 (0)