SECURITY: Worst usernames to use as administrator on an internet facing system
Within this article I will provide a list of usernames that have been used by unauthorized persons. Those accounts have been logged by Windows security log (EventID: 4625). I'll try to update this list in the future...
At the end you can use the power shell command used to create this list - Note this "script" is ugly and horrible slow but for the moment its enough for me...
To enable logging for those events please see the >> KB article #115
Unauthorised connections from 08/17/2016 to 08/31/2016 (only accounts with more then ten tries are listed)
| Tries | Username | 
| 6436 | ADMINISTRATOR | 
| 1458 | ADMIN | 
| 146 | USER | 
| 146 | test | 
| 112 | BNVERIT | 
| 93 | scanner | 
| 87 | backup | 
| 81 | scan | 
| 63 | support | 
| 56 | david | 
| 50 | info | 
| 49 | reception | 
| 47 | Benutzer | 
| 46 | PRAXIS | 
| 44 | ntsec_admin | 
| 40 | office | 
| 39 | temp | 
| 38 | User1 | 
| 38 | TERMINAL | 
| 36 | Administrador | 
| 34 | xerox | 
| 33 | testuser | 
| 33 | demo | 
| 31 | VERWALTER | 
| 31 | SYS | 
| 30 | SQL | 
| 30 | manager | 
| 30 | jan | 
| 29 | GUEST | 
| 28 | Usuario | 
| 28 | tim | 
| 28 | ALEXANDER | 
| 27 | remote | 
| 27 | 1 | 
| 26 | TOM | 
| 26 | POS | 
| 26 | EXTRUSION | 
| 26 | eric | 
| 25 | test1 | 
| 25 | printer | 
| 25 | LUIS | 
| 24 | LEON | 
| 24 | JONAS | 
| 24 | JAKOB | 
| 24 | JACOB | 
| 24 | FINN | 
| 24 | ERIK | 
| 23 | PHILIPP | 
| 23 | PAUL | 
| 23 | NOAH | 
| 23 | NIKLAS | 
| 23 | NICLAS | 
| 23 | MORITZ | 
| 23 | MAXIMILIAN | 
| 23 | MAX | 
| 23 | LUKAS | 
| 23 | LUKA | 
| 23 | LUCAS | 
| 23 | LUCA | 
| 23 | LOUIS | 
| 23 | JULIAN | 
| 23 | HENRY | 
| 23 | HENRI | 
| 23 | FYNN | 
| 23 | FELIX | 
| 23 | ELIAS | 
| 23 | BEN | 
| 22 | Server | 
| 22 | canon | 
| 21 | scans | 
| 20 | student | 
| 20 | LAGER | 
| 20 | administrateur | 
| 19 | training | 
| 19 | ftpuser | 
| 19 | fax | 
| 19 | aloha | 
| 18 | VERWALTUNGSBEAMTE | 
| 18 | ups | 
| 18 | postgres | 
| 18 | OPERATOR | 
| 17 | besadmin | 
| 16 | sqladmin | 
| 16 | install | 
| 15 | ZUZU | 
| 15 | User2 | 
| 15 | TRAINERU17 | 
| 15 | tech | 
| 15 | sales | 
| 15 | ROSI | 
| 15 | ROOT | 
| 15 | NKVD | 
| 15 | MICHI | 
| 15 | marketing | 
| 15 | internet | 
| 15 | Gast | 
| 15 | frontdesk | 
| 15 | copier | 
| 15 | BET3 | 
| 15 | BET2 | 
| 15 | BET1 | 
| 14 | stefan | 
| 14 | ricoh | 
| 14 | Public | 
| 14 | PLESK ADMINISTRATOR | 
| 13 | shop | 
| 13 | conference | 
| 12 | video | 
| 12 | VERWALTE | 
| 12 | PSAADM | 
| 12 | Pc | 
| 12 | db2Admin | 
| 12 | BUCHHALTUNG | 
| 12 | accountant | 
| 11 | warehouse | 
| 11 | veritas | 
| 11 | VDRS | 
| 11 | SYSADMIN | 
| 11 | service | 
| 11 | |
| 11 | logmeinremoteuser | 
| 11 | ADMINSTRATOR | 
| 11 | ADM | 
Script code:
	
##------------------------------------------------------------------------------------------------
##
##  Audit-FailedLogonEvents.ps1
##
##   Version 1.0.0
##
##   
##   Copyright (c) 2016 Martin Mueller - www.sh-soft.com
##   
##   Permission is hereby granted, free of charge, to any person obtaining a copy of this software 
##   and associated documentation files (the "Software"), to deal in the Software without 
##   restriction, including without limitation the rights to use, copy, modify, merge, publish, 
##   distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the
##   Software is furnished to do so, subject to the following conditions:
##   
##   The above copyright notice and this permission notice shall be included in all copies or 
##   substantial portions of the Software.
##   
##   THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING
##   BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND 
##   NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, 
##   DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING 
##   FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
##   (The MIT License (MIT))
##
##------------------------------------------------------------------------------------------------
<#
#>
#This will create a csv file for the relevant eventlog entries senn on this page
# They will start at August 17th till the end of august 2016
# The csv file will be created to C:\Report\BadAdmins_082016.csv and can be opened in MSExcel directly!
Get-EventLog -LogName Security -InstanceId 4625 -After 08/17/2016 -Before 08/31/2016 | Select-Object -ExpandProperty Message | ForEach-Object {$_.Split("`r`n") | ForEach-Object {if ($_ -like "*Account Name:*"){$UserName=$_.split(":")[1].trim();if($Username -ne "-"){return $UserName}}}} | Group-Object | Select-Object Count, Name | Sort-Object Count, Name -Descending | Export-Csv -Path "C:\Report\BadAdmins_082016.csv" -Delimiter ";" -Encoding utf8 -NoTypeInformation -NoClobber
# Yes i know this is horrible ugly but it works for me for that purpose... so please do not blame me :-)