25.12.2014 Views

Analysis and Evaluation of the Windows Event Log - Bill Buchanan

Analysis and Evaluation of the Windows Event Log - Bill Buchanan

Analysis and Evaluation of the Windows Event Log - Bill Buchanan

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Barrie Codona, BSc (Hons) Network Computing, 2007<br />

As it can be seen from Figure 54, both <strong>of</strong> <strong>the</strong> HMAC values are identical, which<br />

means that <strong>the</strong> <strong>Event</strong> <strong>Log</strong>ging Application is correctly generating an HMAC<br />

checksum. This was <strong>the</strong>n double checked with an online Hash Calculator, <strong>the</strong> exact<br />

same details were inputted <strong>and</strong> this was <strong>the</strong> output.<br />

Figure 54: HashCalc Screenshot<br />

Figure 55, which is a screenshot from iFrame.in (2008) confirms that <strong>the</strong> HMAC<br />

function is working correctly. As before <strong>the</strong> exact same details from Figure 53 were<br />

inputted <strong>and</strong> it produced <strong>the</strong> same hash signature that is displayed in Figure 53 <strong>and</strong><br />

Figure 54.<br />

62

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!