Chapter 13: Logon and Account Logon Events

20
Mastering Windows Network Forensics and Investigation Chapter 13: Logon and Account Logon Events

description

Chapter 13: Logon and Account Logon Events. Mastering Windows Network Forensics and Investigation. Chapter Topics:. Logon vs. Account Logon Events Authentication in a Domain Environment Logging within a Domain Environment. Logon vs. Account Logon. Logon Events Event ID 5xx (Windows XP) - PowerPoint PPT Presentation

Transcript of Chapter 13: Logon and Account Logon Events

Page 1: Chapter 13: Logon and Account Logon Events

Mastering Windows Network Forensics and Investigation

Chapter 13: Logon and Account Logon Events

Page 2: Chapter 13: Logon and Account Logon Events

Chapter Topics:

• Logon vs. Account Logon Events

• Authentication in a Domain Environment

• Logging within a Domain Environment

Page 3: Chapter 13: Logon and Account Logon Events

Logon vs. Account Logon

• Logon Events– Event ID 5xx (Windows XP)– Event ID 46xx (Windows Vista +)– Log Access to a resource

• Account Logon Event– Event ID 6xx (Windows XP)– Event ID 47xx (Windows Vista +)– Log Authentication of credentials

Page 4: Chapter 13: Logon and Account Logon Events

Common Windows XP Logon Events

• 528 – Local logon

• 540 – Network Logon

• 538 – Logoff

• 529 – Failed Logon

Page 5: Chapter 13: Logon and Account Logon Events

Common Windows Vista +Logon Events

• 4624 – Local logon

• 4624 – Network Logon

• 4634 – Logoff

• 4625 – Failed Logon

Page 6: Chapter 13: Logon and Account Logon Events

Common Logon Events (WinXP)

Page 7: Chapter 13: Logon and Account Logon Events

Common Logon Events (WinXP)

Page 8: Chapter 13: Logon and Account Logon Events

Common Logon Events (Win Vista +)

Page 9: Chapter 13: Logon and Account Logon Events

Common Logon Events(Win Vista +)

Page 10: Chapter 13: Logon and Account Logon Events

Authentication

• Domain accounts are authenticated by DCs

• Local Accounts authenticated by local computer’s SAM

• Kerberos is default authentication method in a domain

• NTLM is default authentication method for local accounts

Page 11: Chapter 13: Logon and Account Logon Events

Kerberos Domain Authentication

Key Distribution

Center (Domain

Controller)

Client

1. Authenticatio

n request b

ased on username and password

2. KDC issues a TGT to

client

3. Client p

resents TGT to KDC with

request to

access client computer

4. KDC issues service tic

ket to client valid fo

r file server

5. Based on the properly issued service ticket, the client computer grants the logon request

Page 12: Chapter 13: Logon and Account Logon Events

Common Account Logon Events (Win XP)

• 672 – TGT issued

• 673 – Service Ticket issued

• 675 – Failed Kerberos Authentication

• 680 – NTLM authentication event

Page 13: Chapter 13: Logon and Account Logon Events

Common Account Logon Events(Win Vista +)

• 4768 – TGT issued

• 4769 – Service Ticket issued

• 4771 – Failed Kerberos Pre-Authentication

• 4776 – NTLM authentication event

Page 14: Chapter 13: Logon and Account Logon Events

Common Account Logon Events

Page 15: Chapter 13: Logon and Account Logon Events

Common Account Logon Events

Page 16: Chapter 13: Logon and Account Logon Events

Common Account Logon Events

Page 17: Chapter 13: Logon and Account Logon Events

Common Account Logon Events

Page 18: Chapter 13: Logon and Account Logon Events

Common Account Logon Events

Page 19: Chapter 13: Logon and Account Logon Events

Common Account Logon Events

Page 20: Chapter 13: Logon and Account Logon Events

Domain Logging of a Client being used to Access a File Server

• 672

• 673 (Client)

• 673 (DC)

• 673 (krbtgt)

• 540

• 538

• 673 (File Server)

• 4768

• 4769 (Client)

• 4769 (DC)

• 4769 (krbtgt)

• 4624

• 4634

• 4769 (File Server)

Domain Controller

• 4624 • 528

• 4624

• 4634

• 540

• 538

Client Computer

File Server

Vista + Win XP

Vista + Win XP

Vista + Win XP