Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

ESET Endpoint Security Log Parsing Artifact #931

Merged
merged 3 commits into from
Dec 1, 2024

Conversation

j91321
Copy link
Contributor

@j91321 j91321 commented Oct 22, 2024

Artifact that uses ESET Log Collector tool to convert threat logs into XMLs and parse them through Velociraptor. Covers all important log sources that are commonly encountered in enterprise setting. Tested on ESET Endpoint Security.

Examples:
image

image

image

type: CLIENT

tools:
- name: ESETLogCollector
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Can you add an expected_hash field in?

tools:

Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

im also wondering what this tool does - for example: does it decode the logs?
Depending on what it does we might be able to do this natively and bypass the need for EXECVE

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I've added expected_hash. The main purpose of ELC here is that it can convert proprietary format of AV logs into XML. See https://help.eset.com/elc/4.10/en-US/elc_cli.html It's too bad AV can't currently convert logs to XML directly without the need to download this tool.

Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

no worries - this is defiantly a useful artifact!

I just like to mention native as Ive seen logs simply rc4-ed that were easy to do natively so think about uplifting this if we can figure out what they are. VR can definitely read XML, just what ever the other binary format is. The general idea of minimising EXECVE and third party execution on the endpoint is always a good one. :)

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Agree, I will look into if anything can be done about it. I'm probably best person to do it as I work for ESET.

@mgreen27 mgreen27 merged commit a2952c5 into Velocidex:master Dec 1, 2024
4 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants