dfm covers

Techniques and Tools for Logs Forensic Analysis

Written by DFM Team

Techniques and Tools for Logs Forensic Analysis Applied to Forensic and Incident Response Investigations

In this article Juan Torres Ibáñez we will explain the tools and techniques for logs analysis, applied to forensic and incident response investigations. Some of the most important digital evidence in any forensic investigation lies within the logs. Many devices and systems store important information in text files, called logs (operating systems, web servers, email servers, firewalls, routers, ...). In this article, we will try to explain tools and techniques for logs analysis, applied to forensic and incident response investigations. We will use the Microsoft Windows event logs analysis as a ‘use case’. We will show tools as Windows Event Viewer, Event Log Explorer, Evtx Explorer Parser and Timeline Explorer; and we will show their parsing, searching, and filtering capabilities on large volumes of data. We will also explain how this allows us to find traces of a ransomware attack in the logs.

Find out more -  subscribe to DFM today   and read the full article. Or if you're a subscriber, login and  read the article online.


Submit an Article

Call for Articles

We are keen to publish new articles from all aspects of digital forensics. Click to contact us with your completed article or article ideas.

Featured Book

Learning iOS Forensics

A practical hands-on guide to acquire and analyse iOS devices with the latest forensic techniques and tools.

Meet the Authors

Andrew Harbison

Andrew Harbison is a Director and IT Forensics Lead at Grant Thornton


Coming up in the Next issue of Digital Forensics Magazine

Solving the Security Challenges with a Human Firewall

The Next Generation Human Firewall, fully trained and ready to act on security threats with the right tools at their disposal needs to meet the needs of a securely distributed, flexible, integrated modern workforce.

Fraudulent Use of Digital Images and Detection Survey

This article looks at the basic concepts related to image forgery; the types, detection procedure algorithms and all possible techniques to detect malicious signatures including a comparative analysis.

Subscribe today

Discovery in the Cloud: An Investigator’s Close Look at Unexpected Risks and Challenges

Documents residing in cloud storage accounts are increasingly coming into scope in digital forensic investigations such as IP theft, regulatory, corruption, merger clearance and civil matters. Organisations may be obligated to place preservation holds on data residing in cloud storage, collect documents from cloud accounts and produce this data to regulators or courts.

Every Issue

News, 360, IRQ, Legal