25.12.2014 Views

Analysis and Evaluation of the Windows Event Log - Bill Buchanan

Analysis and Evaluation of the Windows Event Log - Bill Buchanan

Analysis and Evaluation of the Windows Event Log - Bill Buchanan

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Barrie Codona, BSc (Hons) Network Computing, 2007<br />

Table <strong>of</strong> Figures<br />

Figure 1: <strong>Log</strong> server protected by a firewall……………….………..……..………. 10<br />

Figure 2: <strong>Log</strong> architecture with time stamping machine……………………..….… 18<br />

Figure 3: Copying <strong>the</strong> <strong>Windows</strong> security log………………………………….…... 24<br />

Figure 4: Replacing <strong>the</strong> <strong>Windows</strong> security log. ……………….…………..………. 25<br />

Figure 5: 32 bit time. ……………………………………...……….….…………… 26<br />

Figure 6: Modifying <strong>the</strong> 32 bit time. …………………….………………………… 27<br />

Figure 7: <strong>Event</strong> logger schematics. ……………………………..………………… 31<br />

Figure 8: Client-Server prototype. ………………………………………………… 33<br />

Figure 9: Client generated XML string. ………………..…….…………………… 34<br />

Figure 10: Client XML string with HMAC. ……………….……………………… 34<br />

Figure 11: Server XML string. …………………………………….……………… 35<br />

Figure 12: The event viewer interface. ………………..……..…………………… 35<br />

Figure 13: Client side pseudo code. ………………………………………..……… 36<br />

Figure 14: Server side pseudo code. …………………………….………………… 37<br />

Figure 15: <strong>Event</strong> viewer pseudo code. ………………………………….………… 37<br />

Figure 16: Testing design. ………………………………………………....……… 38<br />

Figure 17: Generate a large number <strong>of</strong> files pseudo code. ……….…………….… 39<br />

Figure 18: Generate files with error checking. ……………………………..…..… 39<br />

Figure 19: Tester application. …………………………………………..………… 40<br />

Figure 20: Connecting to a server. ………………………………..……..………… 41<br />

Figure 21: The FileSystemWatcher class. ……………………..…………..……… 42<br />

Figure 22: Capturing events. …………………………………………..………..… 43<br />

Figure 23: Generating an HMAC hash signature. …….……..…………………… 43<br />

Figure 24: Encrypting data. ………………………………….…………………… 44<br />

Figure 25: Sending data to <strong>the</strong> server. ……………………….…………………… 44<br />

Figure 26: Listening for a connection. ……………………….…………………… 45<br />

Figure 27: Generating RSA key pair. …………………………..….……………… 45<br />

Figure 28: Receiving a message. ………………………………..………………… 46<br />

Figure 29: Decrypting a message. ………………………………..…..…………… 46<br />

Figure 30: Saving event data to disk. ……………………………………………… 47<br />

Figure 31: Reading a file. ………………………………………….……………… 48<br />

Figure 32: Dividing up an XML string. …………………………….……..……… 48<br />

Figure 33: Checking <strong>the</strong> hash signature. ……………………………..…………… 59<br />

Figure 34: Data flow. ………………….……………………………………..…… 52<br />

Figure 35: Updated Client-Server communications. ……………………………… 53<br />

Figure 36: Processor monitor application. ………………………..….…………… 54<br />

Figure 37: Generating 1,000 files with no encryption. ………..…..……………… 54<br />

Figure 38: Generating 5,000 files with no encryption. ………..……..…………… 55<br />

Figure 39: Generating 10,000 files with no encryption. ……………..…………… 55<br />

Figure 40: Generating 20,000 files with no encryption. ……………..…………… 55<br />

Figure 41: Generating 1,000 files with symmetric encryption………..…………… 56<br />

Figure 42: Generating 5,000 files with symmetric encryption………..…………… 56<br />

Figure 43: Generating 10,000 files with symmetric encryption………..………..… 57<br />

Figure 44: Generating 20,000 files with symmetric encryption………..……..…… 57<br />

Figure 45: Symmetric encryption comparison. ……………………….…………… 58<br />

Figure 46: Asymmetric encryption comparison. ………………………..………… 58<br />

Figure 47: Test directory structure. ………………………………………..……… 59<br />

Figure 48: Tester application generating r<strong>and</strong>om event. …………………..……… 59<br />

6

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!