SECURITY: Worst usernames to use as administrator on an internet facing system

Within this article I will provide a list of usernames that have been used by unauthorized persons. Those accounts have been logged by Windows security log (EventID: 4625). I'll try to update this list in the future...

At the end you can use the power shell command used to create this list - Note this "script" is ugly and horrible slow but for the moment its enough for me...

To enable logging for those events please see the >> KB article #115

Unauthorised connections from 08/17/2016 to 08/31/2016 (only accounts with more then ten tries are listed)

Tries Username
6436 ADMINISTRATOR
1458 ADMIN
146 USER
146 test
112 BNVERIT
93 scanner
87 backup
81 scan
63 support
56 david
50 info
49 reception
47 Benutzer
46 PRAXIS
44 ntsec_admin
40 office
39 temp
38 User1
38 TERMINAL
36 Administrador
34 xerox
33 testuser
33 demo
31 VERWALTER
31 SYS
30 SQL
30 manager
30 jan
29 GUEST
28 Usuario
28 tim
28 ALEXANDER
27 remote
27 1
26 TOM
26 POS
26 EXTRUSION
26 eric
25 test1
25 printer
25 LUIS
24 LEON
24 JONAS
24 JAKOB
24 JACOB
24 FINN
24 ERIK
23 PHILIPP
23 PAUL
23 NOAH
23 NIKLAS
23 NICLAS
23 MORITZ
23 MAXIMILIAN
23 MAX
23 LUKAS
23 LUKA
23 LUCAS
23 LUCA
23 LOUIS
23 JULIAN
23 HENRY
23 HENRI
23 FYNN
23 FELIX
23 ELIAS
23 BEN
22 Server
22 canon
21 scans
20 student
20 LAGER
20 administrateur
19 training
19 ftpuser
19 fax
19 aloha
18 VERWALTUNGSBEAMTE
18 ups
18 postgres
18 OPERATOR
17 besadmin
16 sqladmin
16 install
15 ZUZU
15 User2
15 TRAINERU17
15 tech
15 sales
15 ROSI
15 ROOT
15 NKVD
15 MICHI
15 marketing
15 internet
15 Gast
15 frontdesk
15 copier
15 BET3
15 BET2
15 BET1
14 stefan
14 ricoh
14 Public
14 PLESK ADMINISTRATOR
13 shop
13 conference
12 video
12 VERWALTE
12 PSAADM
12 Pc
12 db2Admin
12 BUCHHALTUNG
12 accountant
11 warehouse
11 veritas
11 VDRS
11 SYSADMIN
11 service
11 print
11 logmeinremoteuser
11 ADMINSTRATOR
11 ADM

Script code:

	
##------------------------------------------------------------------------------------------------
##
##  Audit-FailedLogonEvents.ps1
##
##   Version 1.0.0
##
##   
##   Copyright (c) 2016 Martin Mueller - www.sh-soft.com
##   
##   Permission is hereby granted, free of charge, to any person obtaining a copy of this software 
##   and associated documentation files (the "Software"), to deal in the Software without 
##   restriction, including without limitation the rights to use, copy, modify, merge, publish, 
##   distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the
##   Software is furnished to do so, subject to the following conditions:
##   
##   The above copyright notice and this permission notice shall be included in all copies or 
##   substantial portions of the Software.
##   
##   THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING
##   BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND 
##   NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, 
##   DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING 
##   FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
##   (The MIT License (MIT))
##
##------------------------------------------------------------------------------------------------
<#

#>

#This will create a csv file for the relevant eventlog entries senn on this page
# They will start at August 17th till the end of august 2016
# The csv file will be created to C:\Report\BadAdmins_082016.csv and can be opened in MSExcel directly!
Get-EventLog -LogName Security -InstanceId 4625 -After 08/17/2016 -Before 08/31/2016 | Select-Object -ExpandProperty Message | ForEach-Object {$_.Split("`r`n") | ForEach-Object {if ($_ -like "*Account Name:*"){$UserName=$_.split(":")[1].trim();if($Username -ne "-"){return $UserName}}}} | Group-Object | Select-Object Count, Name | Sort-Object Count, Name -Descending | Export-Csv -Path "C:\Report\BadAdmins_082016.csv" -Delimiter ";" -Encoding utf8 -NoTypeInformation -NoClobber

# Yes i know this is horrible ugly but it works for me for that purpose... so please do not blame me :-) 

	

>> syntax highlighting powered by highlight.js