Home

Awesome

LfLe

Recover event log entries from an image by heurisitically looking for record structures.

Dependencies

Usage

Use this tool to extract event log messages from an image file by looking for things that appear to be records. Then, feed the resulting file into an event log viewer, such as Event Log Explorer (http://www.eventlogxp.com/, use "direct" mode when opening).

usage: lfle.py [-h] [-v] [-s] input_path output_path

Recover event log entries from an image by heurisitically looking for record
structures.

positional arguments:
  input_path   Path to a raw (dd) image file.
  output_path  Path to write output file that contains recovered event log
               entries.

optional arguments:
  -h, --help   show this help message and exit
  -v           Print debugging messages during scanning.
  -s           Disable status messages (percent complete) during scanning.

Sample Output

evt/LfLe - [master●] » python lfle.py "/media/truecrypt2/VM/Windows XP Professional - Service Pack 3 - TEMPLATE/Windows XP Professional - Service Pack 3-cl1.vmdk" recovered.evt
100% complete% done
Wrote 5413 records
Skipped 48 records with length greater than 0x10000
Skipped 12 records with length less than 0x30
Skipped 14 records with invalid structure
Skipped 1 records with invalid content

Limitations

This tool supports only EVT/WinXP style event log messages. It does not support recovering EVTX/Win7 style event log messages.