abbasi
2013-07-08, 12:21 AM
Dear All,
I've been wondering if it is possible to read/decode/parse encrypted TEMS investigation (any version) log files programmatically. Idea is to not utilize fmt or other exported text files from TEMS investigation itself but do this as actix does it i.e. importing raw log files and processing those. A bunch of python scripts exist on the internet claiming to achieve the goal however most need access to a host of TEMS application files including temspy indicating that they are using the TEMS parent application in the background or files such as converter.exe to achieve the desired result. Been wondering how actix is doing this.
The snapshot below shows exactly how TEMS log file looks in raw form (i.e. encrypted) hence unreadable.
33060
I've been wondering if it is possible to read/decode/parse encrypted TEMS investigation (any version) log files programmatically. Idea is to not utilize fmt or other exported text files from TEMS investigation itself but do this as actix does it i.e. importing raw log files and processing those. A bunch of python scripts exist on the internet claiming to achieve the goal however most need access to a host of TEMS application files including temspy indicating that they are using the TEMS parent application in the background or files such as converter.exe to achieve the desired result. Been wondering how actix is doing this.
The snapshot below shows exactly how TEMS log file looks in raw form (i.e. encrypted) hence unreadable.
33060