Exercise 3 24/08/2021 Event Log Analysis
Exercise 3 24/08/2021 Event Log Analysis
24/08/2021
1) Event Viewer
Refer the following links for more details about the use of event logs for forensics
https://en.wikipedia.org/wiki/Event_Viewer
https://www.blackbagtech.com/blog/2017/01/27/leveraging-windows-event-logs-in-exam
inations/
https://isc.sans.edu/forums/diary/Windows+Events+log+for+IRForensics+Part+1/21493/
https://medium.com/@lucideus/introduction-to-event-log-analysis-part-1-windows-forens
ics-manual-2018-b936a1a35d8a
https://medium.com/@lucideus/event-log-analysis-part-2-windows-forensics-manual-201
8-75710851e323
Event ids are generated for events useful in forensic investigation. Examples include
a) Successful logon
b) Failed login
(i) Logon
(ii) Logoff
(iii) Attempt made to query the existence of a blank password for an account
This tool can be got from https://eventlogxp.com it is available for free for personal
non-commercial use. It is also available for commercial use. It is an extension of the
Microsoft Event Viewer tool. It has many features helpful in forensic analysis.
https://eventlogxp.com/event-log-forensic.html
Download this tool on a Windows computer and take screenshots of two security related
events such as those listed in the previous exercise.