< Back

Get-ForensicNetworkList

Sat Jan 18, 2020 8:50 pm

NAME Get-ForensicNetworkList



SYNOPSIS

Gets a list of networks that the system has previously been connected to.





SYNTAX

Get-ForensicNetworkList [-VolumeName <String>] [<CommonParameters>]



Get-ForensicNetworkList -HivePath <String> [<CommonParameters>]





DESCRIPTION

The Get-ForensicNetworkList cmdlet parses the SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\NetworkList key to

derive a list of previously connected networks.



Except as noted, the cmdlets in the PowerForensics module require the permissions of a member of the

Administrators group on the computer. To run them, start Windows PowerShell with the 'Run as administrator' option.





PARAMETERS

-VolumeName [<String>]

Specifies the name of the volume or logical partition.



Enter the volume name in one of the following formats: \\\\.\\C:, C:, or C.



Required? false

Position? 0

Default value \\\\.\\C:

Accept pipeline input? false

Accept wildcard characters? false



-HivePath <String>

Registry hive to parse.



Required? true

Position? named

Default value

Accept pipeline input? false

Accept wildcard characters? false



<CommonParameters>

This cmdlet supports the common parameters: Verbose, Debug,

ErrorAction, ErrorVariable, WarningAction, WarningVariable,

OutBuffer, PipelineVariable, and OutVariable. For more information, see

about_CommonParameters (https:/go.microsoft.com/fwlink/?LinkID=113216).



INPUTS

None







OUTPUTS

PowerForensics.Artifacts.NetworkList













-------------------------- EXAMPLE 1 --------------------------



[ADMIN]: PS C:\\>Get-ForensicNetworkList



This command uses Get-ForensicNetworkList to parse the SOFTWARE hive on the C:\\ logical volume.

-------------------------- EXAMPLE 2 --------------------------



[ADMIN]: PS C:\\>Get-ForensicNetworkList -HivePath C:\\evidence\\SOFTWARE



This command uses Get-ForensicNetworkList on an exported SOFTWARE hive.



RELATED LINKS