Techniques and Tools for Logs Forensic Analysis
Techniques and Tools for Logs Forensic Analysis Applied to Forensic and Incident Response Investigations
In this article Juan Torres Ibáñez we will explain the tools and techniques for logs analysis, applied to forensic and incident response investigations. Some of the most important digital evidence in any forensic investigation lies within the logs. Many devices and systems store important information in text files, called logs (operating systems, web servers, email servers, firewalls, routers, ...). In this article, we will try to explain tools and techniques for logs analysis, applied to forensic and incident response investigations. We will use the Microsoft Windows event logs analysis as a ‘use case’. We will show tools as Windows Event Viewer, Event Log Explorer, Evtx Explorer Parser and Timeline Explorer; and we will show their parsing, searching, and filtering capabilities on large volumes of data. We will also explain how this allows us to find traces of a ransomware attack in the logs.
Find out more - subscribe to DFM today and read the full article. Or if you're a subscriber, login and read the article online.