< Back
Get-ForensicNetworkList
Post
NAME Get-ForensicNetworkList
SYNOPSIS
Gets a list of networks that the system has previously been connected to.
SYNTAX
Get-ForensicNetworkList [-VolumeName <String>] [<CommonParameters>]
Get-ForensicNetworkList -HivePath <String> [<CommonParameters>]
DESCRIPTION
The Get-ForensicNetworkList cmdlet parses the SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\NetworkList key to
derive a list of previously connected networks.
Except as noted, the cmdlets in the PowerForensics module require the permissions of a member of the
Administrators group on the computer. To run them, start Windows PowerShell with the 'Run as administrator' option.
PARAMETERS
-VolumeName [<String>]
Specifies the name of the volume or logical partition.
Enter the volume name in one of the following formats: \\\\.\\C:, C:, or C.
Required? false
Position? 0
Default value \\\\.\\C:
Accept pipeline input? false
Accept wildcard characters? false
-HivePath <String>
Registry hive to parse.
Required? true
Position? named
Default value
Accept pipeline input? false
Accept wildcard characters? false
<CommonParameters>
This cmdlet supports the common parameters: Verbose, Debug,
ErrorAction, ErrorVariable, WarningAction, WarningVariable,
OutBuffer, PipelineVariable, and OutVariable. For more information, see
about_CommonParameters (https:/go.microsoft.com/fwlink/?LinkID=113216).
INPUTS
None
OUTPUTS
PowerForensics.Artifacts.NetworkList
-------------------------- EXAMPLE 1 --------------------------
[ADMIN]: PS C:\\>Get-ForensicNetworkList
This command uses Get-ForensicNetworkList to parse the SOFTWARE hive on the C:\\ logical volume.
-------------------------- EXAMPLE 2 --------------------------
[ADMIN]: PS C:\\>Get-ForensicNetworkList -HivePath C:\\evidence\\SOFTWARE
This command uses Get-ForensicNetworkList on an exported SOFTWARE hive.
RELATED LINKS
SYNOPSIS
Gets a list of networks that the system has previously been connected to.
SYNTAX
Get-ForensicNetworkList [-VolumeName <String>] [<CommonParameters>]
Get-ForensicNetworkList -HivePath <String> [<CommonParameters>]
DESCRIPTION
The Get-ForensicNetworkList cmdlet parses the SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\NetworkList key to
derive a list of previously connected networks.
Except as noted, the cmdlets in the PowerForensics module require the permissions of a member of the
Administrators group on the computer. To run them, start Windows PowerShell with the 'Run as administrator' option.
PARAMETERS
-VolumeName [<String>]
Specifies the name of the volume or logical partition.
Enter the volume name in one of the following formats: \\\\.\\C:, C:, or C.
Required? false
Position? 0
Default value \\\\.\\C:
Accept pipeline input? false
Accept wildcard characters? false
-HivePath <String>
Registry hive to parse.
Required? true
Position? named
Default value
Accept pipeline input? false
Accept wildcard characters? false
<CommonParameters>
This cmdlet supports the common parameters: Verbose, Debug,
ErrorAction, ErrorVariable, WarningAction, WarningVariable,
OutBuffer, PipelineVariable, and OutVariable. For more information, see
about_CommonParameters (https:/go.microsoft.com/fwlink/?LinkID=113216).
INPUTS
None
OUTPUTS
PowerForensics.Artifacts.NetworkList
-------------------------- EXAMPLE 1 --------------------------
[ADMIN]: PS C:\\>Get-ForensicNetworkList
This command uses Get-ForensicNetworkList to parse the SOFTWARE hive on the C:\\ logical volume.
-------------------------- EXAMPLE 2 --------------------------
[ADMIN]: PS C:\\>Get-ForensicNetworkList -HivePath C:\\evidence\\SOFTWARE
This command uses Get-ForensicNetworkList on an exported SOFTWARE hive.
RELATED LINKS