Check out my research into this MITER ATTACK persistence technique where I
identify vulnerable pre-installed Windows applications. Creating a PoC exploit for this vulnerability
to inject and execute a Cobalt Strike Beacon in the victim machine's memory. The victim machine was
running Symmantec Endpoint Protection and all traffic was going through Paulo Alto Network's Next
Generation Firewall.
Windows collects a lot of detailed telemetry about the applications you open,
when you open them, how long you spend on them, and the times and names of when you switched from
you work app to YouTube. It also records where and when you copy and pasted. All of this data is
very useful for digital forensics investigators in a corporate setting, or for an attacker to
bypass behavioural analysis when exfiltrating data.
My script will parse your local windows timeline database and generate some CSV files and PDFs to
show you the kinds of data stored here.