25.12.2014 Views

Analysis and Evaluation of the Windows Event Log - Bill Buchanan

Analysis and Evaluation of the Windows Event Log - Bill Buchanan

Analysis and Evaluation of the Windows Event Log - Bill Buchanan

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Barrie Codona, BSc (Hons) Network Computing, 2007<br />

Figure 49: <strong>Event</strong> viewer application. ……………………………….…..….……… 60<br />

Figure 50: Custom event log. ……………………………………………………… 60<br />

Figure 51: Client XML string without HMAC. ……………..…………….……… 61<br />

Figure 52: Client XML string with HMAC. …………………..…..……………… 61<br />

Figure 53: HMAC test data. ……………………………………….……………… 61<br />

Figure 54: HashCalc Screenshot. ………………………………….……………… 62<br />

Figure 55: iFrame.in Hash Calculator. …………………………….……………… 63<br />

Figure 56: Three character HMAC test data. ……………………………………… 64<br />

Figure 57: HMAC brute force application. ……………………………...………… 64<br />

Figure 58: Four character key HMAC test data. …………………………..……… 64<br />

Figure 59: Found four character key. ……………………………………………… 64<br />

Figure 60: HMAC key entropy. ………………………………………..….……… 65<br />

Figure 61: Custom event log showing ‘Sec<strong>Event</strong>.Evt’. …………………………… 66<br />

7

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!