DFIR - Log Analysis
DFIR - Log Analysis
Log Analysis
3
Log examples
4
Why is Log Analysis Important for IR
5
Common Log Sources
+ Login Information
7
Firewall Logs
+ Which systems behind the firewall are infected (analysis on Command &
Control traffic from the infected hosts)
+ Traffic between different network segments e.g. Users, Servers, DMZ, PCI,
etc.
8
Firewall Logs (cont.)
Common Log Fields
• Date and Time of request
Date & Time
• IP of system requesting access
Source IP address
• Targeted IP for access
Destination IP address
• e.g. TCP/UDP
Protocol
• Random port chosen by OS
Source port
• Port of application targeted
Destination port
• Accept or Deny
Rule Status
• Number of Bytes Transferred
Bytes
9
Firewall Logs (cont.)
VPN Analysis
Firewalls enable VPN access, hence the VPN logs are generated by the firewalls
as well. Here are some tips on analyzing VPN Logs:
+ Check the Source IP of all users and if unexpected countries’ IPs (or Cloud
Hosting Providers) are logging in, then consider asking corresponding user
and block accordingly
+ If a single user logs in from two distinct IP addresses at the same time,
investigate the IPs and make user change the password accordingly.
10
Other Networking Devices
(IDS, IPS, Web Proxy)
+ Logon information on end points and servers with details on the connections
such as Source IP address, Source Host Name and Type of Logon
+ RAS Logs can give you Caller Information (Source IP) and which server the
logged in user made access to
12
Operating System Logs
Windows
Windows Operating System Logs can provide you the following key evidence:
+ Who logged on to the system and what time (Local and Remote access)
13
Operating System Logs
Windows (cont.)
• These contain a record of users who
connected to a system (Event IDs 528, 540,
4624 or 4648), when they disconnected
Security (Event IDs 538, 4634), failed logon attempts
(529, 4625),, etc.
14
Operating System Logs
Linux
Linux Operating System Logs can provide you the following key evidence:
+ Who logged on to the system and what time (Local and Remote access)
15
Operating System Logs
Linux (cont.)
• These contain a record of users who
connected to a system (Event IDs 528, 540,
4624 or 4648), when they disconnected
Security (Event IDs 538, 4634), failed logon attempts
(529, 4625),, etc.
16
Applications
Database Logs
+ Login Information and User Access Tracking on Database Tables
17
Web Server Logs (cont.)
Common Log Fields
• Date and Time of Request
Date / Time
• IP of system requesting access
Source IP address
• Targeted IP for access
Destination IP address
• GET vs. POST
Request Type
• Source Browser (Mozilla, Safari, etc.)
User Agent
• Full Path of Webpage Requested
Query
• 200 is for success; 404 is for deny
HTTP Status Code
• Number of Bytes Transferred
Bytes
18
Logging Essentials
19
SIEM (Security information and event management)
> Centralization
> Aggregation
> Correlation
20
Log Analysis
Live Example