• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Windows 7 forensics event logs-dtl-r3
 

Windows 7 forensics event logs-dtl-r3

on

  • 7,159 views

 

Statistics

Views

Total Views
7,159
Views on SlideShare
7,108
Embed Views
51

Actions

Likes
2
Downloads
166
Comments
0

2 Embeds 51

http://www.ctin.org 50
http://translate.googleusercontent.com 1

Accessibility

Categories

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Windows 7 forensics event logs-dtl-r3 Windows 7 forensics event logs-dtl-r3 Presentation Transcript

    • Digital Forensics and Windows 7 Event Logs Troy Larson Principal Forensics Program Manager TWC Network Security Investigations NSINV-R3– Research|Readiness|Response
    • IntroductionVista/Windows 7 EventLogging:• New format *.evtx.• More, many more, event log files.• New system for collecting and displaying events.• New security event numbering.
    • Windows Event LogsBefore Vista—Event Log. Vista to present—Windows Event• The big three: Log. – System. • The big three: – Security. – System. – Application. – Security.• Binary file, .evt. – Application.• WindowsSystem32config – Plus 100+ more event log files. – Binary/xml format—.evtx.*• Documented and well known. • C:WindowsSystem32winevt Logs • New, documentation growing.http://msdn.microsoft.com/en- http://msdn.microsoft.com/en-us/library/aa363652(v=VS.85).aspx us/library/aa385780(v=VS.85).aspx *http://computer.forensikblog.de/en/topics/windows/vista_event_log/
    • Windows Event Logs C:WindowsSystem32winevtLogs
    • Windows Event LogsWhat is an event log?
    • Windows Event LogsAn event log is more than its .evtx file.• The log displayed in the Event Viewer is a compilation of an .evtx file and components of one or more message DLLs.• The Registry links the .evtx to its message DLLs, which together create the complete event log presented by the Event Viewer. HKEY_LOCAL_MACHINESYSTEMCurrentControlSetserviceseventlog
    • From *.evtx to Event Log Registry: HKLMSYSTEMControlSet001serviceseventlog*.evtx file MessageFile.dll Event Viewer
    • Windows Event Logs• Impact on forensics? – Information in an event log often depends on message DLLs. – To get the message information, one must have the message DLLs available at the time the logs are- • Collected; or • Read. – Security events generally consistent within same versions of Windows (message DLLs the same). – Application logs pose the biggest risk of incompatible or missing message information—as message DLLs depend on the installed applications.
    • Windows Event Logs• Solutions: – Collect logs live, before shutting down a system. • For Example: – >psloglist.exe -s -x Application > AppEvent.csv – >psloglist.exe -s -x System > SysEvent.csv – >psloglist.exe -s -x Security > SecEvent.csv – Rebuild registry references to message DLLs on the analysis workstation. • Generally, not necessary unless there are recorded events that are important and need to be resolved with their corresponding message DLLs.
    • Windows Event Logs• Configuring the analyst workstation for reviewing event logs: – Identify the missing message DLLs. • Specified by the registry key for the component with the incomplete event record. – Copy message DLLs to analyst work station. – Add registry keys for component to specify location of the message DLLs.
    • Windows Event Logs• Identify missing message DLLs. – Review system registry hive file of the system from which the event log file was taken.
    • Windows Event Logs• Extract the message DLL(s) from the source system and copy to the analyst’s workstation. – New location or recreate original path.
    • Windows Event Logs• Recreate the registry serviceseventlog key(s) and values on the analyst’s workstation so that they point to the copied message DLL(s). Include all original values.HKEY_LOCAL_MACHINESYSTEMControlSet001serviceseventlogApplicationCommunicator• The Event Viewer should now pull in the expected message DLL information when the event log is viewed.
    • Windows Event Logs• Event logs in forensic examinations: – Rarely a primary source of information. • Noisy. • Significant events often only stand out when there are dates, times, or other items to bring focus to an event. – Security events are often not significant. • Dependent on the security audit settings. – Often evidence of compromise is found in the System and Application event logs or one of the new, narrowly focused logs. • System or application crashes. • Errors, warnings, information.
    • Windows Event LogsWorking with the Windows 7 Event Viewer
    • Windows Event Logs
    • Windows Event Logs
    • Windows Event Logs
    • Windows Event Logs Filtering is much improved in Windows 7. Filter the event logs to reduce the noise.
    • Windows Event Logs• Start by selecting the event source, as this will populate the other choices.
    • Windows Event Logs• Next, focus on Task categories—here, selecting logon and logoff.
    • Windows Event Logs• Finally, Keywords, here selecting Audit Failure and Audit Success.
    • Windows Event Logs The filtered view.
    • Windows Event Logs And now, the event logs.
    • Windows Event Logs• System Events. – Logged by Windows and Windows system services, and are classified as error, warning, or information. – Typical interesting events: • Time Change. • Startup and shutdown. • Services startup, shutdown, failures. • Startups should be logged, but crashes or errors could prevent logging of shutdown or termination events.http://windows.microsoft.com/en-US/windows7/What-information-appears-in-event-logs-Event-Viewer
    • Windows Event Logs
    • Windows Event Logs
    • Windows Event Logs
    • Windows Event Logs• Application events. – Program Events are classified as error, warning, or information, depending on the severity of the event. An error is a significant problem, such as loss of data. A warning is an event that isnt necessarily significant, but might indicate a possible future problem. An information event describes the successful operation of a program, driver, or service. – Typical interesting events would be those relating to programs that could be relevant to an investigation. • Application errors. – E.g., BackupExec agent attack. – Antivirus or malware detection events. • Combined with System events, Application events can show that symptoms of suspected intrusions or compromises could have been long standing system problems. – Note: application logging is controlled by the applications—so events are defined by the application developers. – Not all application generate events.
    • Windows Event Logs
    • Windows Event Logs
    • Windows Event Logs• Security events. – These events are called audits and are described as successful or failed depending on the event, such as whether a user trying to log on to Windows was successful. – Depend on audit policy. – Noisy. – Completely different Security event IDs from all versions before Vista. – General Tip: Translate pre-Vista Event ID numbers to the new Vista event ID numbers by adding 4096. – There are a number of new security events. – Typical events of interest: • Account logon and logoff. • Failed logon attempts. • Account escalation. • Process execution.
    • Windows Event Logs 9 audit categories.
    • Windows Event LogsClicking on an audit category can provide you with an explanation ofwhat the category audits.
    • Windows Event Logshttp://www.microsoft.com/downloads/en/details.aspx?FamilyID=3A15B562-4650-4298-9745-D9B261F35814&displaylang=en
    • Windows Event Logs
    • Windows Event Logs http://support.microsoft.com/kb/977519
    • Windows Event LogsFurther Information: http://www.ultimatewindowssecurity.com/securitylog/encyclopedia/default.aspx http://blogs.msdn.com/b/ericfitz/
    • Windows Event Logs All those other logs.
    • Windows Event Logs
    • Windows Event Logs
    • Windows Event Logs
    • Windows Event Logs
    • Windows Event Logs
    • Windows Event Logs
    • Windows Event Logs
    • Windows Event Logs
    • Windows Event Logs• Emphasis: Usually on Security Events, but other event logs may have more to offer.• Event log are not typically the primary evidence. – Often too noisy.• Best used when other facts fix times, or implicate specific accounts or computers.• Often, most useful in a timeline with other items of significance.
    • Windows Event Logs