25.12.2014 Views

Analysis and Evaluation of the Windows Event Log - Bill Buchanan

Analysis and Evaluation of the Windows Event Log - Bill Buchanan

Analysis and Evaluation of the Windows Event Log - Bill Buchanan

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

CO42019 – Project 4<br />

Computer Name<br />

PC1<br />

PC2<br />

Local Users<br />

Barrie<br />

Donald<br />

Barrie<br />

Task:<br />

To inject <strong>the</strong> security log from PC1 into PC2 <strong>and</strong> note any effects or problems<br />

Screen shot <strong>of</strong> security log on PC1<br />

Then started working on PC2<br />

Cleared <strong>the</strong> Security log on PC 2<br />

Privileged object operation:<br />

Object Server: <strong>Event</strong><strong>Log</strong><br />

Object H<strong>and</strong>le: 11670928<br />

Process ID: 748<br />

Primary User Name: PC2$<br />

Primary Domain: WORKGROUP<br />

Primary <strong>Log</strong>on ID: (0x0,0x3E7)<br />

Client User Name: Barrie<br />

Client Domain: PC2<br />

Client <strong>Log</strong>on ID: (0x0,0x109A9)<br />

Privileges: SeSecurityPrivilege<br />

Project – Week 4.doc Page 2 <strong>of</strong> 14

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!