LogonTracer

Investigate malicious Windows logon by visualizing and analyzing Windows event log

Github星跟踪图

Arsenal Version Docker pull test

Concept

LogonTracer is a tool to investigate malicious logon by visualizing and analyzing Windows Active Directory event logs. This tool associates a host name (or an IP address) and account name found in logon-related events and displays it as a graph. This way, it is possible to see in which account login attempt occurs and which host is used.
This tool can visualize the following event id related to Windows logon based on this research.

  • 4624: Successful logon
  • 4625: Logon failure
  • 4768: Kerberos Authentication (TGT Request)
  • 4769: Kerberos Service Ticket (ST Request)
  • 4776: NTLM Authentication
  • 4672: Assign special privileges

More details are described in the following documents:

LogonTracer sample

Additional Analysis

LogonTracer uses PageRank, Hidden Markov model and ChangeFinder to detect malicious hosts and accounts from event log.
PageRank List
With LogonTracer, it is also possible to display event logs in a chronological order.
Timeline

Use LogonTracer

To use LogonTracer, you can:

Documentation

If you want to know more details, please check the LogonTracer wiki.

Demonstration

Following YouTube's video shows how to use LogonTracer.

LogonTracer_Demonstration

Architecture

LogonTracer is written in Python and uses Neo4j for database. The following tools are used.

主要指标

概览
名称与所有者JPCERTCC/LogonTracer
主编程语言Python
编程语言Python (语言数: 5)
平台
许可证Other
所有者活动
创建于2017-11-24 06:07:49
推送于2024-06-21 06:06:32
最后一次提交2024-06-21 15:06:09
发布数20
最新版本名称v1.6.1 (发布于 2023-11-15 21:28:56)
第一版名称v1.0.0 (发布于 2017-11-25 20:25:12)
用户参与
星数2.9k
关注者数133
派生数460
提交数202
已启用问题?
问题数126
打开的问题数19
拉请求数10
打开的拉请求数1
关闭的拉请求数5
项目设置
已启用Wiki?
已存档?
是复刻?
已锁定?
是镜像?
是私有?