Your download link is at the very bottom of the page... always.
Processed through Paypal
No account required.
Donate Bitcoin to this wallet:
Donate Ethereum to this wallet:
Donate Litecoin to this wallet:
|File - Download Chainsaw v2.5.0
Always scroll to the bottom of the page for the main download link.
We don't believe in fake/misleading download buttons and tricks. The link is always in the same place.
Rapidly Search and Hunt through Windows Event Logs
Chainsaw provides a powerful ‘first-response’ capability to quickly identify threats within Windows event logs. It offers a generic and fast method of searching through event logs for keywords, and by identifying threats using built-in detection logic and via support for Sigma detection rules.
🔍 Search and extract event log records by event IDs, string matching, and regex patterns
🎯 Hunt for threats using Sigma detection rules and custom built-in detection logic
⚡ Lightning fast, written in rust, wrapping the EVTX parser library by @OBenamram
🔥 Document tagging (detection logic matching) provided by the TAU Engine Library
📑 Output in an ASCII table format, CSV format, or JSON format
Sigma Rule Matching
Using the --rules and --mapping parameters you can specify a directory containing a subset of SIGMA detection rules (or just the entire SIGMA git repo) and chainsaw will automatically load, convert and run these rules against the provided event logs. The mapping file tells chainsaw what event IDs to run the detection rules against, and what fields are relevant. By default the following event IDs are supported:
Extraction and parsing of Windows Defender, F-Secure, Sophos, and Kaspersky AV alerts
Detection of key event logs being cleared, or the event log service being stopped
Users being created or added to sensitive user groups
Brute-force of local user accounts
You can specify the --lateral-all flag to chainsaw to also parse and extract additional 4624 logon types (network logons, service, batch etc.) relating to potential lateral movement that may be interesting for investigations.
You can use the pre-compiled versions of chainsaw from Oldergeeks.com, or you can clone the repo (and the submodules) by running: git clone --recurse-submodules https://github.com/countercept/chainsaw.git
You can then compile the code yourself by running: cargo build --release. Once the build has finished, you will find a copy of the compiled binary in the target/release folder.
Make sure to build with the --release flag as this will ensure significantly faster execution time.
If you want to quickly see what Chainsaw looks like when it runs, you can use the command:
./chainsaw hunt evtx_attack_samples/ --rules sigma_rules/ --mapping mapping_files/sigma-mapping.yml
Supporting Additional Event IDs (via Mapping Files)
When using Sigma rule detection logic, Chainsaw requires a 'mapping file' to tell it which event IDs to check, what fields are important, and which fields to output in the table view. The included sigma mapping in the "mapping_files" directory already supports most of the key Event IDs, but if you want to add support for additional event IDs you can use this mapping file as a template.
Search all .evtx files in the evtx_files dir for event id 4624
./chainsaw search ~/Downloads/evtx_files/ -e 4624
Search a specific evtx log for logon events containing the string "bob" (case insensitive)
./chainsaw search ~/Downloads/evtx_files/security.evtx -e 4624 -s "bob" -i
Search a specific evtx log for logon events, with a matching regex pattern. Save results to file
./chainsaw search ~/Downloads/evtx_files/security.evtx -e 4624 -r "bob[a-zA-Z]" -o out.txt
Hunt through all event logs in a specific path, show additional information relating to potential lateral movement, and save results to individual CSV files
Hunt through all event logs in a specific path, apply detection logic and TAU rules from the specified path
This release contains the following changes of note:
Bring in upstream fix for evtx files that contain the size_t type (thanks to upstream for such a quick turn around)
Add in a dump command so that people stop bodging the functionality via search
Minor fixes and tweaks
This download is for the Windows version. All other download assets are below:
Click here to visit the author's website.
Continue below for the main download link.
|F-Secure Countercept <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/Chainsaw5_th.png"border="0">
|Mar 17, 2023 - 11:34
|, out of 13 Votes.
Click to Rate File     Share it on Twitter → Tweet