Consuming from Microsoft-Windows-Security-Auditing #127
Replies: 2 comments
-
Hello. I can try to collect my memories and answer your questions. If you're interested in this, can I ask you two questions first ?
In case you end up doing an MR, it would surely be appreciated, but I'll let @n4r1b answer, as I'll probably have no way to review it, let alone test it. |
Beta Was this translation helpful? Give feedback.
-
I've looked a bit into this and the main "problem" is that we are propagating the error when trying to start a trace that already exists (
Given the program doesn't throw an exception in any of those steps then they proceed to re-open the trace. (See trace_manager::open) I would assume @daladim concerns had something to do with the fact that this approach hides the error and it can be a bit invasive. I would love to hear more thou I can't remember either 😅. At the moment I don't have a clear idea on how to solve this in a cleaner way than using the same approach |
Beta Was this translation helpful? Give feedback.
-
I'm working on some research that requires reading security event log data from the provider. I've done a bit of reading and it looks like the Krabsetw devs have found a way of do so by opening a handle to the
EventLog-Security
trace sessions created by the OS via theirUserTrace()
class. I've reviewed the Ferrisetw code and it looks like a possibility via theopen_trace()
function. It looks like @daladim had some concerns about doing so, so I wanted to see if I could get some more details before I start working on a PR for this feature.Beta Was this translation helpful? Give feedback.
All reactions