Skip to content

Commit

Permalink
Update README.md
Browse files Browse the repository at this point in the history
  • Loading branch information
nasbench committed Oct 14, 2021
1 parent 927ff16 commit e29f297
Showing 1 changed file with 63 additions and 41 deletions.
104 changes: 63 additions & 41 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,74 +2,96 @@

This is a repository that contains a bunch of resources to learn and understand ETW (Event Tracing for Windows)

## Contents

- [ETW Resources](#etw-resources)
- [Contents](#contents)
- [Structure](#structure)
- [Blogs / Research (<https://nasbench.medium.com/>)](#blogs--research-httpsnasbenchmediumcom)
- [Tools](#tools)
- [Interacting w/ ETW](#interacting-w-etw)
- [Dumping ETW Providers Manifest](#dumping-etw-providers-manifest)
- [Scripting w/ ETW (Detection, Digital Forensics)](#scripting-w-etw-detection-digital-forensics)
- [Online Resources](#online-resources)
- [Architecture](#architecture)
- [Research](#research)
- [Talks](#talks)
- [Books](#books)

## Structure

- [ETW Providers Manifests](https://github.com/nasbench/ETW-Resources/tree/main/ETW%20Providers%20Manifests)
- [Examples](https://github.com/nasbench/ETW-Resources/tree/main/Examples)
- [ETW Events List](https://github.com/nasbench/ETW-Resources/tree/main/ETW%20Events%20List)

## Blogs / Research (<https://nasbench.medium.com/>)

* [A Primer On Event Tracing For Windows (ETW)](https://nasbench.medium.com/a-primer-on-event-tracing-for-windows-etw-997725c082bf)
* [Finding Detection and Forensic Goodness In ETW Providers](https://nasbench.medium.com/finding-detection-and-forensic-goodness-in-etw-providers-7c7a2b5b5f4f)
* [Windows 11 “New” ETW Providers — Overview](https://nasbench.medium.com/windows-11-new-etw-providers-overview-a2a5fbc85775)
- [A Primer On Event Tracing For Windows (ETW)](https://nasbench.medium.com/a-primer-on-event-tracing-for-windows-etw-997725c082bf)
- [Finding Detection and Forensic Goodness In ETW Providers](https://nasbench.medium.com/finding-detection-and-forensic-goodness-in-etw-providers-7c7a2b5b5f4f)
- [Windows 11 “New” ETW Providers — Overview](https://nasbench.medium.com/windows-11-new-etw-providers-overview-a2a5fbc85775)

## Tools

The following is a list of tools that can let us interact with the different ETW providers available. The examples directory contains example scripts and commands on how to use these tools

### Interacting w/ ETW

* [**Logman**](https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/logman)
* [**Microsoft.Diagnostics.Tracing.TraceEvent**](nuget.org/packages/Microsoft.Diagnostics.Tracing.TraceEvent/)
* [**Message Analyzer**](https://github.com/riverar/messageanalyzer-archive)
- [**Logman**](https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/logman)
- [**Microsoft.Diagnostics.Tracing.TraceEvent**](nuget.org/packages/Microsoft.Diagnostics.Tracing.TraceEvent/)
- [**Message Analyzer**](https://github.com/riverar/messageanalyzer-archive)

### Dumping ETW Providers Manifest

* [**ETW Explorer**](https://github.com/zodiacon/EtwExplorer/)
* [**WEPExplorer**](https://github.com/lallousx86/WinTools/tree/master/WEPExplorer)
* [**PerfView**](https://github.com/microsoft/perfview)
- [**ETW Explorer**](https://github.com/zodiacon/EtwExplorer/)
- [**WEPExplorer**](https://github.com/lallousx86/WinTools/tree/master/WEPExplorer)
- [**PerfView**](https://github.com/microsoft/perfview)

### Scripting w/ETW (Detection, Digital Forensics)
### Scripting w/ ETW (Detection, Digital Forensics)

* [**PSalander**](https://github.com/matthastings/PSalander)
* [**Sealighter**](https://github.com/pathtofile/Sealighter)
* [**PyWintrace**](https://github.com/fireeye/pywintrace)
* [**SilkETW**](https://github.com/fireeye/SilkETW)
* [**KrabsETW**](https://github.com/microsoft/krabsetw/)
- [**PSalander**](https://github.com/matthastings/PSalander)
- [**Sealighter**](https://github.com/pathtofile/Sealighter)
- [**PyWintrace**](https://github.com/fireeye/pywintrace)
- [**SilkETW**](https://github.com/fireeye/SilkETW)
- [**KrabsETW**](https://github.com/microsoft/krabsetw/)

## Online Resources

The following are blogs and articles published by the wider security community discussing various aspects of ETW

### Architecture

* [Event Tracing: Improve Debugging And Performance Tuning With ETW by Microsoft](https://docs.microsoft.com/en-us/archive/msdn-magazine/2007/april/event-tracing-improve-debugging-and-performance-tuning-with-etw)
* [About Event Tracing by Microsoft](https://docs.microsoft.com/en-us/windows/desktop/etw/about-event-tracing)
* [Part 1 - ETW Introduction and Overview by Microsoft](https://web.archive.org/web/20200725154736/https://docs.microsoft.com/en-us/archive/blogs/ntdebugging/part-1-etw-introduction-and-overview)
* [Part 2 - Exploring and Decoding ETW Providers using Event Log Channels by Microsoft](https://web.archive.org/web/20200816023246/https://docs.microsoft.com/en-us/archive/blogs/ntdebugging/part-2-exploring-and-decoding-etw-providers-using-event-log-channels)
* [Part 3 - ETW Methods of Tracing by Microsoft](https://web.archive.org/web/20200731060805/https://docs.microsoft.com/en-us/archive/blogs/ntdebugging/part-3-etw-methods-of-tracing)
* [ETW: Event Tracing for Windows 101](https://www.ired.team/miscellaneous-reversing-forensics/windows-kernel-internals/etw-event-tracing-for-windows-101)
* [ETW: Event Tracing for Windows, Part 1: Intro by Mozilla](https://blog.mozilla.org/sfink/2010/11/01/etw-part-1-intro/)
* [ETW: Event Tracing for Windows, part 2: field reporting by Mozilla](https://blog.mozilla.org/sfink/2010/11/01/etw-part-2-field-reporting/)
* [ETW: Event Tracing for Windows, part 3: architecture by Mozilla](https://blog.mozilla.org/sfink/2010/11/02/etw-part-3-architecture/)
* [ETW: Event Tracing for Windows, part 4: collection by Mozilla](https://blog.mozilla.org/sfink/2010/11/03/etw-part-4-collection/)
* [ETW Security by Geoff Chappell](https://www.geoffchappell.com/studies/windows/km/ntoskrnl/api/etw/secure/index.htm)
* [Writing an Instrumentation Manifest](https://docs.microsoft.com/en-us/windows/win32/wes/writing-an-instrumentation-manifest)
- [Event Tracing: Improve Debugging And Performance Tuning With ETW by Microsoft](https://docs.microsoft.com/en-us/archive/msdn-magazine/2007/april/event-tracing-improve-debugging-and-performance-tuning-with-etw)
- [About Event Tracing by Microsoft](https://docs.microsoft.com/en-us/windows/desktop/etw/about-event-tracing)
- [Part 1 - ETW Introduction and Overview by Microsoft](https://web.archive.org/web/20200725154736/https://docs.microsoft.com/en-us/archive/blogs/ntdebugging/part-1-etw-introduction-and-overview)
- [Part 2 - Exploring and Decoding ETW Providers using Event Log Channels by Microsoft](https://web.archive.org/web/20200816023246/https://docs.microsoft.com/en-us/archive/blogs/ntdebugging/part-2-exploring-and-decoding-etw-providers-using-event-log-channels)
- [Part 3 - ETW Methods of Tracing by Microsoft](https://web.archive.org/web/20200731060805/https://docs.microsoft.com/en-us/archive/blogs/ntdebugging/part-3-etw-methods-of-tracing)
- [ETW: Event Tracing for Windows 101](https://www.ired.team/miscellaneous-reversing-forensics/windows-kernel-internals/etw-event-tracing-for-windows-101)
- [ETW: Event Tracing for Windows, Part 1: Intro by Mozilla](https://blog.mozilla.org/sfink/2010/11/01/etw-part-1-intro/)
- [ETW: Event Tracing for Windows, part 2: field reporting by Mozilla](https://blog.mozilla.org/sfink/2010/11/01/etw-part-2-field-reporting/)
- [ETW: Event Tracing for Windows, part 3: architecture by Mozilla](https://blog.mozilla.org/sfink/2010/11/02/etw-part-3-architecture/)
- [ETW: Event Tracing for Windows, part 4: collection by Mozilla](https://blog.mozilla.org/sfink/2010/11/03/etw-part-4-collection/)
- [ETW Security by Geoff Chappell](https://www.geoffchappell.com/studies/windows/km/ntoskrnl/api/etw/secure/index.htm)
- [Writing an Instrumentation Manifest](https://docs.microsoft.com/en-us/windows/win32/wes/writing-an-instrumentation-manifest)

### Research

* [Tampering with Windows Event Tracing: Background, Offense, and Defense by Palantir](https://blog.palantir.com/tampering-with-windows-event-tracing-background-offense-and-defense-4be7ac62ac63)
* [Introduction to Threat Intelligence ETW](https://undev.ninja/introduction-to-threat-intelligence-etw/)
* [Detecting process injection with ETW](https://blog.redbluepurple.io/windows-security-research/kernel-tracing-injection-detection)
* [Experimenting with Protected Processes and Threat-Intelligence](https://blog.tofile.dev/2020/12/16/elam.html)
* [Bypassing the Microsoft-Windows-Threat-Intelligence Kernel APC Injection Sensor](https://medium.com/@philiptsukerman/bypassing-the-microsoft-windows-threat-intelligence-kernel-apc-injection-sensor-92266433e0b0)
* [Data Source Analysis and Dynamic Windows RE using WPP and TraceLogging](https://posts.specterops.io/data-source-analysis-and-dynamic-windows-re-using-wpp-and-tracelogging-e465f8b653f7)
* [Detecting Parent PID Spoofing](https://blog.f-secure.com/detecting-parent-pid-spoofing/)
- [Tampering with Windows Event Tracing: Background, Offense, and Defense by Palantir](https://blog.palantir.com/tampering-with-windows-event-tracing-background-offense-and-defense-4be7ac62ac63)
- [Introduction to Threat Intelligence ETW](https://undev.ninja/introduction-to-threat-intelligence-etw/)
- [Detecting process injection with ETW](https://blog.redbluepurple.io/windows-security-research/kernel-tracing-injection-detection)
- [Experimenting with Protected Processes and Threat-Intelligence](https://blog.tofile.dev/2020/12/16/elam.html)
- [Bypassing the Microsoft-Windows-Threat-Intelligence Kernel APC Injection Sensor](https://medium.com/@philiptsukerman/bypassing-the-microsoft-windows-threat-intelligence-kernel-apc-injection-sensor-92266433e0b0)
- [Data Source Analysis and Dynamic Windows RE using WPP and TraceLogging](https://posts.specterops.io/data-source-analysis-and-dynamic-windows-re-using-wpp-and-tracelogging-e465f8b653f7)
- [Detecting Parent PID Spoofing](https://blog.f-secure.com/detecting-parent-pid-spoofing/)

### Talks

* [T208 Hidden Treasure Detecting Intrusions with ETW Zac Brown - Derbycon 7](https://www.youtube.com/watch?v=VABMu05mYww&ab_channel=AdrianCrenshaw)
* [T208 Hidden Treasure Detecting Intrusions with ETW Zac Brown - GrrCON 2017](https://www.youtube.com/watch?v=ppGmRUhQO80&ab_channel=AdrianCrenshaw)
* [RECON 2019 - Using WPP and TraceLogging Tracing (Matt Graeber)](https://www.youtube.com/watch?v=l2co6ZCQCXU)
* [S25 Tracing Adversaries Detecting Attacks with ETW Matt Hastings Dave Hull - Derbycon 7](https://www.youtube.com/watch?v=3RwADlGX40o)
* [The Good, the Bad and the ETW (Grzegorz Tworek)](https://www.youtube.com/watch?v=0XTdCxq7kCY)
- [T208 Hidden Treasure Detecting Intrusions with ETW Zac Brown - Derbycon 7](https://www.youtube.com/watch?v=VABMu05mYww&ab_channel=AdrianCrenshaw)
- [T208 Hidden Treasure Detecting Intrusions with ETW Zac Brown - GrrCON 2017](https://www.youtube.com/watch?v=ppGmRUhQO80&ab_channel=AdrianCrenshaw)
- [RECON 2019 - Using WPP and TraceLogging Tracing (Matt Graeber)](https://www.youtube.com/watch?v=l2co6ZCQCXU)
- [S25 Tracing Adversaries Detecting Attacks with ETW Matt Hastings Dave Hull - Derbycon 7](https://www.youtube.com/watch?v=3RwADlGX40o)
- [The Good, the Bad and the ETW (Grzegorz Tworek)](https://www.youtube.com/watch?v=0XTdCxq7kCY)

### Books

* [Windows Internals, Part 2, 7th Edition](https://www.microsoftpressstore.com/store/windows-internals-part-2-9780135462331)
* [Windows 10 System Programming, Part 2](https://leanpub.com/windows10systemprogrammingpart2)
- [Windows Internals, Part 2, 7th Edition](https://www.microsoftpressstore.com/store/windows-internals-part-2-9780135462331)
- [Windows 10 System Programming, Part 2](https://leanpub.com/windows10systemprogrammingpart2)

0 comments on commit e29f297

Please sign in to comment.