Skip to main content

Script to programmatically interface with Windows Events.

Project description

Overview

This is a library to interact with the Windows Event Logging system. The focus is to interact directly with the Windows API, rather than parsing evt files. This will allow you to use python to parse events as well as subscribe to providers.

It is a fork of the abandoned bannsec/winevt with some fixes and improvements.

Install

winevt_ng can be installed directly as a package from pypi. I recommend you install it into a python virtual environment.

$ mkvirtualenv --python=$(which python3) winevt_ng # Optional
(winevt_ng)$ pip install winevt_ng

Current Features

Currently, this library supports querying and subscribing to event logs or parsing of event log files. Because this library uses the Windows API directly, you can query for any of the reigstered event providers.

Example

Query

Let's say you want to review the error report alerts that are in your Application event log. To print out all the times you dropped a dump file, you could do the following:

In [1]: from winevt_ng import EventLog

In [2]: query = EventLog.Query("Application","Event/System/Provider[@Name='Windows Error Reporting']")

In [3]: for event in query:
   ...:     for item in event.EventData.Data:
   ...:         if "dmp" in item.cdata:
   ...:             print(item.cdata)

If you were interested in seeing every time you had an error or critical event from the System, you could do:

In [1]: from winevt_ng import EventLog

In [2]: query = EventLog.Query("System","Event/System[Level<=2]")

In [3]: for event in query:
   ...:     print(event.System.Provider['Name'])

Subscription

Let's say you want to watch for new Errors and Critial events from the System log, and want to be able to take some form of immediate action. You can acomplish that through a subcription using a python function as your callback.

In [1]: from winevt_ng import EventLog

In [2]: def handle_event(action, pContext, event):
   ...:     print("Got event: " + str(event))
   ...:

In [3]: cb = EventLog.Subscribe("System","Event/System[Level<=2]",handle_event)

In [4]: Got event: <Event EventID=10016 Level=Error>
Got event: <Event EventID=10016 Level=Error>
Got event: <Event EventID=10016 Level=Error>

If you want to cancel your subscription, simply use the unsubscribe method:

In [5]: cb.unsubscribe()

EventLog.Event

The EventLog.Event class abstracts the concept of a Windows Event Log. There are likely two primary ways you would use this:

Event.xml

Every Event object has an xml property to it. That property is the same XML you would find looking through the Windows Event Viewer. It is returned as a string and you can parse it however you wish.

Event structure

Every Event object also has a structure to it. The structure is effectively the output of untangle. That said, it starts at the Event level so it makes Windows Events easier to traverse. Here's an example of XML:

<Event xmlns="http://schemas.microsoft.com/win/2004/08/events/event">
  <System>
    <Provider EventSourceName="Software Protection Platform Service" Guid="{E23B33B0-C8C9-472C-A5F9-F2BDFEA0F156}" Name="Microsoft-Windows-Security-SPP"/>
    <EventID Qualifiers="16384">903</EventID>
    <Version>0</Version>
    <Level>0</Level>
    <Task>0</Task>
    <Opcode>0</Opcode>
    <Keywords>0x80000000000000</Keywords>
    <TimeCreated SystemTime="2017-05-05T16:11:37.282412200Z"/>
    <EventRecordID>12126</EventRecordID>
    <Correlation/>
    <Execution ProcessID="0" ThreadID="0"/>
    <Channel>Application</Channel>
    <Computer>Phoenix</Computer>
    <Security/>
  </System>
  <EventData/>
</Event>

If this were the XML for our Event object, and we wanted to find out the TimeCreated, we could do the following:

event.System.TimeCreated['SystemTime']

Authenticate Local and Remote

You can authenticate locally and remotely. If you provide no extra details, you will by default authenticate locally as your current user. However, for both Query and Subscribe, you can provide the following optional arguments:

  • username
  • password
  • domain
  • server
  • auth (default, negotiate, kerberos, ntlm)

For example, if you wished to connect to a server using username "administrator", it would be:

query = EventLog.Query("Security","*",username="administrator", server="myserver", domain="mydomain")

You would then be prompted for the password interactively.

Bookmarks

If you want to ensure you're not losing your place, you can use bookmarks. The Bookmark class abstracts the fundamental Windows construct of a bookmark. Use of bookmarks can be done by:

  1. Instantiate a new bookmark
bookmark = EventLog.Bookmark()

1b. If you already have a bookmark, just feed in the xml

bookmark = EventLog.Bookmark(xml)
  1. Give the bookmark parameter to Query or Subscribe
cb = EventLog.Subscribe("System","*",handle_event,bookmark=bookmark)
  1. Save your bookmark by saving your xml however you wish
bookmark.xml

The updating of the bookmark will occur behind the scenes for you.

Multiple Subscription Support

This library supports subscribing to as many channels as you want. The caveat is that you should not allow your Subscription objects to be garbage collected. In practice, this just means don't overwrite your class variables. Even if you're not using them, keep them around so that python doesn't try to garbage collect them on you.

Tested On

I have only tested this on my Windows 10 x64 system with python 3.6 x64. It should work across most Windows systems given a Python x64 version >=3.2 (cffi changes).

It will very likely NOT work on python 2.

It might work on python 3.2+ x86. Let me know your experience.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

winevt_ng-0.1.0.tar.gz (28.4 kB view details)

Uploaded Source

File details

Details for the file winevt_ng-0.1.0.tar.gz.

File metadata

  • Download URL: winevt_ng-0.1.0.tar.gz
  • Upload date:
  • Size: 28.4 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/3.8.0 colorama/0.4.4 importlib-metadata/4.6.4 keyring/23.5.0 pkginfo/1.8.2 readme-renderer/34.0 requests-toolbelt/0.9.1 requests/2.30.0 rfc3986/1.5.0 tqdm/4.57.0 urllib3/1.26.15 CPython/3.10.12

File hashes

Hashes for winevt_ng-0.1.0.tar.gz
Algorithm Hash digest
SHA256 d8f8931d582f69e877416323d77c8187788a7bbdc4e99e77f545b686b2b7e1bc
MD5 5e3a0dfb58e5788479009995669e78cc
BLAKE2b-256 7139e5dc0281a891a80b9c25aa9123f74cd67b92d784dfafdabe5f8c762b08c7

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page