LogonTracer is a tool designed to investigate malicious logons by visualizing and analyzing Windows Active Directory event logs. It associates host names or IP addresses with account names found in logon-related events, displaying them as a graph to identify the account where login attempts occur and the host used. LogonTracer can visualize event IDs related to Windows logon, such as 4624 for successful logon, 4625 for logon failure, 4768 for Kerberos Authentication (TGT Request), 4769 for Kerberos Service Ticket (ST Request), 4776 for NTLM Authentication, and 4672 for assigning special privileges. The tool utilizes PageRank, Hidden Markov model, and ChangeFinder for detecting malicious hosts and accounts from event logs, and can display event logs chronologically. LogonTracer can be used by installing it via docker and referring to its documentation for further details.
This tool is not verified yet and doesn't have listed features.
Did you submit the verified tool? Sign in to add features.
Are you the author? Claim the tool by clicking the icon above. After claiming, you can add features.
Search AWS CloudWatch logs on the command line with aws-sdk-for-go.
Converts Sigma and Yara rules to CRYPTTECH's SIEM query language.
Browse a library of EQL analytics now natively integrated in Elasticsearch.
A method for log volume reduction without losing analytical capability.
An Event Hub to gather, process, and monitor system events and link them to an inventory.
Serverless, real-time data analysis framework for incident detection and response.