Event Log Chainsaw Massacre - Powerful Threat Detection

  Рет қаралды 16,528

13Cubed

13Cubed

Күн бұрын

Пікірлер: 26
@yannickleroy7419
@yannickleroy7419 2 жыл бұрын
Not sure why this was in my recommended, but it was actually quite interesting. Thank's for showcasing this, subbed!
@castle228
@castle228 2 жыл бұрын
Going to have to add this tool to the repertoire
@mallikab8707
@mallikab8707 2 жыл бұрын
Awesome 👌 Thank for your time and I will explore more on this.
@rogerioabreu3081
@rogerioabreu3081 2 жыл бұрын
awesome. thnx
@lonegunmen1985
@lonegunmen1985 Жыл бұрын
Awsome! Thanks for sharing the knowlege
@NetworkITguy
@NetworkITguy 2 жыл бұрын
This with velociraptor is gg
@sulthansk6444
@sulthansk6444 2 жыл бұрын
@Lordyzagat velociraptor ir tool
@orlandop4sun
@orlandop4sun 11 ай бұрын
Great job on this video.. súper profesional
@adrianguerrero9583
@adrianguerrero9583 2 жыл бұрын
can you also do a preview/walkthrough for the Hayabusa tool by Yamato-Security. it looks like they are almost the same.
@shadisukkar
@shadisukkar Ай бұрын
Hello 13Cubed. Thank you for this amazing video. I have a couple of questions regarding Chainsaw. Does Chainsaw work with Windows logs only, or does it work with other OS logs? Also, can it take (.json) logs or plain text logs (.log) as an input? Or is it specific for .evtx logs only?
@13Cubed
@13Cubed Ай бұрын
It's a cross-platform tool, but it's designed for Windows forensic artifacts. And yes, Chainsaw v2 introduces "support for loading and parsing Event Logs in both JSON and XML format."
@shadisukkar
@shadisukkar Ай бұрын
@@13Cubed Thank you.
@samjohn1098
@samjohn1098 2 жыл бұрын
Pretty cool.. Nice
@benw4529
@benw4529 Жыл бұрын
What happen to the syntax the commands to not work
@amirhosseinhemmati9290
@amirhosseinhemmati9290 2 ай бұрын
can you please provide a link to log database that you used
@13Cubed
@13Cubed 2 ай бұрын
Hi, unfortunately that test database has been long since removed.
@otvs5838
@otvs5838 2 жыл бұрын
Please share the Latest and safest source link to download chainsaw .
@13Cubed
@13Cubed 2 жыл бұрын
github.com/WithSecureLabs/chainsaw/releases
@artember1200
@artember1200 2 жыл бұрын
does this require sysmon to be effective?
@13Cubed
@13Cubed 2 жыл бұрын
No, but Sysmon is certainly highly beneficial.
@Revoc
@Revoc Жыл бұрын
This seems to be out of date now with their update.
@13Cubed
@13Cubed Жыл бұрын
Such is life with KZbin... will consider making an update at some point.
@ishannair1335
@ishannair1335 7 ай бұрын
none of these commands work for me. amazing
@13Cubed
@13Cubed 7 ай бұрын
What error do you receive when you try? I need a little more detail if you want to solve the issue.
Impacket Impediments - Finding Evil in Event Logs
39:25
13Cubed
Рет қаралды 8 М.
Persistence Mechanisms
15:39
13Cubed
Рет қаралды 16 М.
Пришёл к другу на ночёвку 😂
01:00
Cadrol&Fatich
Рет қаралды 3,9 МЛН
Will A Guitar Boat Hold My Weight?
00:20
MrBeast
Рет қаралды 134 МЛН
When you discover a family secret
00:59
im_siowei
Рет қаралды 35 МЛН
Let's Talk About Shimcache - The Most Misunderstood Artifact
21:51
Prefetch Deep Dive
36:15
13Cubed
Рет қаралды 16 М.
SANS DFIR Webcast - Incident Response Event Log Analysis
48:50
SANS Digital Forensics and Incident Response
Рет қаралды 81 М.
The ABCs of WMI - Finding Evil in Plain Sight
15:56
13Cubed
Рет қаралды 17 М.
Threat Hunting via Sysmon - SANS Blue Team Summit
51:01
SANS Institute
Рет қаралды 61 М.
Detecting PsExec Usage
23:16
13Cubed
Рет қаралды 10 М.
Let's Talk About NTFS Index Attributes
10:52
13Cubed
Рет қаралды 7 М.
What's on My DFIR Box?
18:30
13Cubed
Рет қаралды 10 М.
Windows MACB Timestamps (NTFS Forensics)
28:09
13Cubed
Рет қаралды 27 М.