Skip to content

Latest commit

 

History

History
25 lines (12 loc) · 1.04 KB

emet_log_mining.md

File metadata and controls

25 lines (12 loc) · 1.04 KB

EMET Log Mining

Purpose: Identify potential 0-day exploits by looking for things blocked by EMET

Data Required: Windows Application Event logs (which contain EMET logs)

Collection Considerations:

Analysis Techniques:

Description

Window's Enhanced Mitigation Experience Toolkit (EMET) is a set of technologies that monitor for and block certain conditions that commonly arise as the result of common exploit patterns. It's commonly used on endpoints (but is also available on servers).

The idea here is to examine the EMET logs to find things that it has blocked (processes it has killed before they could become dangerous). These may be simple bugs in legit applications, or they could be indications of exploit attempts.

Other Notes

It's not clear what actual analysis techniques might be useful here yet, short of simply examining every EMET log individually. Need more research on this one.

More Info