
With the prior knowledge of Core Windows Processes, we can now proceed to discuss the available toolset for analyzing running artefacts in the backend of a Windows machine. In addition, the processes with no depiction of a parent-child relationship should not have a Parent Process under normal circumstances, except for the System process, which should only have System Idle Process (0) as its parent process.

When a program is not responding, the Task Manager is used to terminate the process.Ī Task Manager provides some of the Core Windows Processes running in the background. It also provides information on resource usage, such as how much each process utilizes CPU and memory. Task Manager is a built-in GUI-based Windows utility that allows users to see what is running on the Windows system. To learn more about Core Windows Processes, a built-in Windows tool named Task Manager may aid us in understanding the underlying processes inside a Windows machine. Without prior knowledge, differentiating an outlier from a haystack of events could be problematic. Also, it gives an overview of determining a malicious activity from an endpoint and mapping its related events.įirstly, we would be required to learn the fundamentals of how the Windows Operating System works. It will introduce you to the fundamentals of endpoint security monitoring, essential tools, and high-level methodology.

Less than four months later, Microsoft removed most of that source code.From this room, you will learn about fundamentals, methodology, and tooling for endpoint security monitoring. Microsoft acquired Sysinternals in July 2006, promising that “Customers will be able to continue building on Sysinternals' advanced utilities, technical information and source code”. Many of the Sysinternals tools originally came with source code and there were even Linux versions. TCPView, for viewing TCP and UDP traffic endpoints used by each process (like Netstat on UNIX).RootkitRevealer for detecting registry and file system API discrepancies that may indicate the presence of a user-mode or kernel-mode rootkit.

Autoruns for discovering what executables are set to run during system boot up or login.PsTools for managing (executing, suspending, killing, detailing) local and remote processes.ProcessExplorer for keeping an eye on the files and directories open by any process (like lsof on UNIX).Survey respondents were most enamored with: Some are free of cost and/or include source code, while others are proprietary. Sysinternals provides many small windows utilities that are quite useful for low-level windows hacking.
