25.12.2014 Views

Analysis and Evaluation of the Windows Event Log - Bill Buchanan

Analysis and Evaluation of the Windows Event Log - Bill Buchanan

Analysis and Evaluation of the Windows Event Log - Bill Buchanan

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Barrie Codona, BSc (Hons) Network Computing, 2007<br />

system would also provide an attacker with <strong>the</strong> opportunity <strong>of</strong> removing <strong>the</strong> hard disc<br />

drives <strong>and</strong> ei<strong>the</strong>r manipulating <strong>the</strong> data using ano<strong>the</strong>r machine or simply destroying<br />

<strong>the</strong> drives. All <strong>of</strong> <strong>the</strong>se evidence tampering techniques would make <strong>the</strong> digital<br />

investigation much harder <strong>and</strong> a more time consuming process.<br />

1.2 Background<br />

From as far back as <strong>the</strong> 1970’s computer pr<strong>of</strong>essionals have identified <strong>the</strong> need for<br />

computer security in distributed systems that contain sensitive information; part <strong>of</strong> <strong>the</strong><br />

security package that is built into operating systems is <strong>the</strong> ability to audit events that<br />

have occured on a computer system. For <strong>the</strong> <strong>Windows</strong> user, this consists <strong>of</strong> <strong>the</strong><br />

<strong>Windows</strong> event log which is a customisable audit log. It was originally designed as a<br />

diagnostic tool to identify any problems with <strong>the</strong> operating system <strong>and</strong> it also allows<br />

<strong>the</strong> user some degree <strong>of</strong> control over what type <strong>of</strong> events are recorded. In a<br />

commercial environment <strong>the</strong> auditing will be defined as part <strong>of</strong> <strong>the</strong> company’s<br />

security policy. This will involve recording <strong>of</strong> events, via <strong>the</strong> use <strong>of</strong> domain<br />

controllers, when users are successfully logging on <strong>and</strong> <strong>of</strong>f, <strong>and</strong> which host machines<br />

<strong>the</strong>y are using. Although <strong>the</strong> domain controllers are used to capture <strong>the</strong> event data it is<br />

also possible to setup <strong>and</strong> store <strong>the</strong> log files on a separate log server. This server could<br />

be protected from network based attacks by using a firewall which only allows traffic<br />

from <strong>the</strong> domain controllers, see Figure 1.<br />

Figure 1: <strong>Log</strong> server protected by a firewall<br />

However, as previously mentioned, <strong>the</strong>re are a number <strong>of</strong> flaws with <strong>the</strong> <strong>Windows</strong><br />

event logging service. These flaws not only relate to <strong>the</strong> security <strong>of</strong> <strong>the</strong> information<br />

after it has been written to disc, but also to what information it is actually capturing,<br />

storing <strong>and</strong> how it is stored.<br />

10

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!