🕶️
VICEINTELPRO
GitHub: HorrorClause
  • In Tenebris Videmus
  • 🚩CTFs
    • 💾Hack the Box
      • 🏫Academy
        • Command Injection Assessment
        • XSS Assessment
        • Web Attacks Assessment
    • Try Hack Me
      • In Progress
  • 📖Documents
  • 👨‍🏫HOW-TOs
    • Obisidian How-To
    • Setup Mandiant FLARE VM
  • 📑Security Fundamentals
    • Security Controls
      • Physical Security
      • Endpoint Security
      • Email Security
      • Network Security
      • AAA Controls
    • Networking 101
      • OSI Model
      • Network Fundamentals
      • Network Devices
      • Network Tools
      • Protocols and Ports
    • 👨‍💼Management Principles
      • Risk
      • Policies and Procedures
      • Compliance and Frameworks
      • Change and Patch Management
  • 🛡️Security Concepts
    • ⚠️Risk Assessment Models
      • DREAD Risk Assessment Model
      • STRIDE Threat Model
      • Common Vulnerability Scoring System (CVSS)
    • Pentesting
      • Common Terms
      • AV Identification-Evasion
      • Introduction to Payloads
      • Automating Payloads & Delivery with Metasploit
      • Shells Jack Us In, Payloads Deliver Us Shells
      • Web Shells
      • Pentesting Overview
      • Penetration Testing Process
    • 🐛Vulnerability Assessment
      • Common Vulnerabilities and Exposures (CVE)
      • Common Vulnerability Scoring System (CVSS)
      • Assessment Standards
      • Vulnerability Assessment
      • Vulnerability Scanning
      • Reporting
      • 🎯Nessus
        • Getting Started with Nessus
        • Nessus Scan
        • Working with Nessus Scan Output
        • Advanced Settings
        • Scanning Issues
      • 🦴OpenVAS (Greenbone)
        • Getting Started with OpenVAS
        • OpenVAS
        • Exporting Results
    • Passwords
      • Password Managers
      • Password Policies
      • Password Security Fundamentals
    • Frameworks
    • GRC
    • Logon Types
    • What is Dev-Null ?
  • ⚔️Offensive Security
    • OSINT
      • OSINT - Websites
      • Google Dorks
    • 🔫Attacking Common Services
      • The Concept of Attacks
      • Interacting with Common Services
      • Finding Sensitive Information
      • Attacking DNS
      • Attacking Email Services
      • Attacking FTP
      • Attacking RDP
      • Attacking SMB
      • Attacking SQL Databases
      • Cheat Sheet - Attacking Common Services
      • Service Misconfigurations
    • 🔪Attacking Web Apps with Ffuf
      • Web Fuzzing
      • Directory Fuzzing
      • Page Fuzzing
      • Recursive Fuzzing
      • DNS Records
      • Sub-domain Fuzzing
      • Vhost Fuzzing
      • Filtering Results
      • Parameter Fuzzing - GET
      • Parameter Fuzzing - POST
      • Value Fuzzing
    • ☁️Cloud
      • AWS
        • AWS S3 Buckets
    • 💉Command Injection
      • Command Injection Cheat Sheet
      • Intro to Command Injections
      • Detection
      • Injecting Commands
      • Other Injection Operators
      • Identifying Filters
      • Bypassing Space Filters
      • Bypassing Other Blacklisted Characters
      • Bypassing Blacklisted Commands
      • Advanced Command Obfuscation
      • Evasion Tools
      • Command Injection Prevention
    • Containers
      • Docker
    • ❌Cross-Site Scripting (XSS)
      • Introduction to XSS
      • Stored XSS
      • Reflected XSS
      • DOM XSS
      • XSS Discovery
      • Defacing
      • Phishing
      • Session Hijacking
      • XSS Prevention
    • Directory Busting
      • DirB
      • DirBuster
      • Ffuf
      • Gobuster
    • 🅰️DNS
      • DNSRecon
      • Fierce
    • File Inclusion
      • Local File Inclusion Cheatsheet
      • Intro to File Inclusion
      • Local File Inclusion (LFI)
      • Basic Bypass
      • PHP Filters
      • PHP Wrappers
      • Remote File Inclusion (RFI)
      • LFI and File Uploads
      • Log Poisoning
      • Automated Scanning
      • File Inclusion Prevention
    • File Transfers
      • Transferring Files
      • File Transfer - Quick Commands
      • Living off the Land
      • Windows File Transfer Methods
      • Linux File Transfer Methods
      • Catching Files over HTTP(S)
      • Transferring Files with Code
      • Miscellaneous File Transfer Methods
      • Protected File Transfers
      • Mounting Encrypted VHD Drives
      • Mounting VHD in Kali
      • File Transfer Detection
    • File Upload Attacks
      • File Upload Cheatsheet
      • Absent Validation
      • Upload Exploitation
      • Client-Side Validation
      • Blacklist Filters
      • Whitelist Filters
      • Type Filters
      • Limited File Uploads
      • Other Upload Attacks
      • Preventing File Upload Vulnerabilities
    • 👣Footprinting
      • Linux Remote Management Protocols
      • Windows Remote Management Protocols
      • Enumeration
        • Enumeration Methodology
        • 🖥️Host Based
          • Quick Commands
          • DNS
          • FTP
          • IMAP-POP3
          • IPMI
          • MSSQL
          • MySQL
          • NFS
          • Oracle TNS
          • SMB
  • Powershell
    • Powershell CheatSheet
  • Python
    • Map
    • Anonymous Functions
    • Recursion
      • ZipMap
      • Nested Sum
      • Recursion on a Tree
      • Count Nested Levels
      • Longest Word
    • Function Transformations
      • More Transformations
      • Why Transform?
    • Closures
    • Currying
    • Decorators
    • Sum Types
    • Enums
    • Match
    • Regex
  • Kusto (KQL)
    • SQL and KQL Comparison
    • Using the Where and Sort Operators
    • KQL Queries
  • HTML
  • Insecure File Uploads
Powered by GitBook
On this page
  • Logon Type 1: System.
  • Logon Type 2: Interactive.
  • Logon Type 3: Network.
  • Logon Type 4: Batch.
  • Logon Type 5: Service.
  • Logon Type 6: (Not Defined in Standard Logs).
  • Logon Type 7: Unlock.
  • Logon Type 8: NetworkCleartext.
  • Logon Type 9: NewCredentials.
  • Logon Type 10: RemoteInteractive.
  • Logon Type 11: CachedInteractive.
  1. Security Concepts

Logon Types

This page provides a detailed overview of various Windows logon types, including Interactive, Network, Batch, Service, and others, explaining when and why each logon type occurs. It also covers key scenarios like remote access, cached credentials, and secure vs. insecure logons to help users understand how Windows tracks and logs user authentication events.

Logon Type 1: System.

A logon session was created by the system at startup. This logon type occurs when Windows starts and the system processes use the system account to perform functions or start up tasks.

Logon Type 2: Interactive.

A user logged on to this computer. This event occurs when a user logs on locally, either with a local or domain account. If a domain account is used and the domain controller isn't available, this will be logged with Logon Type 11 instead.

Logon Type 3: Network.

A user or computer logged on to this computer from the network. This occurs when someone accesses the computer remotely over the network, often seen with shared resources.

Logon Type 4: Batch.

Batch logon type used by batch servers where processes are running on behalf of users without direct intervention, typically triggered by scheduled tasks.

Logon Type 5: Service.

A service was started by the Service Control Manager. This happens when Windows starts a service that logs in using a user account rather than special system accounts like "Local System" or "NetworkService."

Logon Type 6: (Not Defined in Standard Logs).

This type does not have a common definition in the event logs, but confusion often arises with Logon Type 9 (NewCredentials), which deals with users running processes with different credentials.

Logon Type 7: Unlock.

The workstation was unlocked. This event occurs when a previously locked workstation is unlocked by a user.

Logon Type 8: NetworkCleartext.

A user logged on from the network, and the password was passed in cleartext (unhashed). This is an insecure method of transmitting credentials and should generally be avoided.

Logon Type 9: NewCredentials.

A caller cloned its current token and specified new credentials for outbound connections. This typically happens when using the RunAs command with the /netonly option to execute a program with different credentials for network connections.

Logon Type 10: RemoteInteractive.

A user logged on remotely using Terminal Services or Remote Desktop. Similar to Logon Type 2 (Interactive), but the connection is made through RDP.

Logon Type 11: CachedInteractive.

A user logged on with network credentials stored locally. This happens when the domain controller is unavailable, and Windows uses cached credentials to allow the logon to proceed.

PreviousGRCNextWhat is Dev-Null ?

Last updated 4 months ago

🛡️