Account Usage
Forensic evidence of account usage refers to the evidence that can be collected and analyzed to determine who used a particular account, when the account was accessed, and what actions were taken while the account was in use. This type of evidence can be useful in a variety of situations, including investigations into the user of Valid Accounts.
There are several types of forensic evidence that can be used to identify account usage:
Log Files: Such as system logs, network logs, and application logs, can contain information about who accessed a particular account and when.
System Artifacts: Such as registry keys, system files, and application data, can contain information about the accounts that have been used on a particular system or application.
Network Traffic: Such as packet captures and network flow related telemetry, can contain information about the accounts that were used to access systems or data over the network.
User Artifacts: User artifacts, such as files and documents, can contain information about the accounts that were used to create or modify them.
The evidence extracted from investigating Account Usage can often provide insight into possible Initial Entry, Persistence, Privilege Escalation, Defense Evasion, Credential Access, and Lateral Movement tactics.
Last updated
