LogonTracer Logo

LogonTracer

0
Free
Visit Website

LogonTracer is a tool designed to investigate malicious logons by visualizing and analyzing Windows Active Directory event logs. It associates host names or IP addresses with account names found in logon-related events, displaying them as a graph to identify the account where login attempts occur and the host used. LogonTracer can visualize event IDs related to Windows logon, such as 4624 for successful logon, 4625 for logon failure, 4768 for Kerberos Authentication (TGT Request), 4769 for Kerberos Service Ticket (ST Request), 4776 for NTLM Authentication, and 4672 for assigning special privileges. The tool utilizes PageRank, Hidden Markov model, and ChangeFinder for detecting malicious hosts and accounts from event logs, and can display event logs chronologically. LogonTracer can be used by installing it via docker and referring to its documentation for further details.

FEATURES

ALTERNATIVES

Elastic is a search-powered AI company that enables users to find answers from all data in real-time at scale.

Commercial

A tool for advanced HTTPD logfile security analysis and forensics, implementing various techniques to detect attacks against web applications.

Free

A service that analyzes and visualizes security data to investigate potential security issues.

Free

Serverless, real-time data analysis framework for incident detection and response.

Free

A method for log volume reduction without losing analytical capability.

Free

Cybersecurity project for security monitoring of Node.js applications.

Free

A logging proxy tool created in response to the 'MongoDB Apocalypse', with Docker support.

Free

Logdissect is a CLI utility and Python library for analyzing log files and other data.

Free
CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved