Difference between revisions of "Mac Marshal"

From ForensicsWiki
Jump to: navigation, search
(Update for V3.)
 
(2 intermediate revisions by 2 users not shown)
Line 10: Line 10:
 
Mac Marshal is a tool to analyze Mac OS X file system images. It scans a Macintosh disk image, automatically detects and displays Macintosh and Windows operating systems and virtual machine images, then runs a number of analysis tools on the image to extract Mac OS X-specific forensic evidence written by the OS and common applications.
 
Mac Marshal is a tool to analyze Mac OS X file system images. It scans a Macintosh disk image, automatically detects and displays Macintosh and Windows operating systems and virtual machine images, then runs a number of analysis tools on the image to extract Mac OS X-specific forensic evidence written by the OS and common applications.
  
Mac Marshal follows forensic best practices and maintains a detailed log file of all activities it performs. It produces reports in RTF, PDF, and HTML formats, and runs on Mac OS X-based analysis machines.
+
Mac Marshal Forensic Edition runs on an investigator's workstation to analyze a Mac disk image.
 +
 
 +
Mac Marshal Field Edition runs on a Mac target machine from a USB drive.  It extracts volatile system state data, including a snapshot of physical RAM.
 +
 
 +
Mac Marshal follows forensic best practices, maintains a detailed log file of all activities it performs, and produces reports in RTF, PDF, and HTML formats.
 +
 
 +
Version 1.0 was released in January 2009, available at no cost to US law enforcement, with a commercial version available to non-law enforcement.  Version 2.0 was released in November 2010, adding live analysis in the Field Edition and the ability to take a snapshot of the target machine's physical RAM.  Version 3.0 was released in November 2011 and can run on both Mac OS X and Windows XP and later.
  
Version 1.0 was released in January 2009, available at no cost to US law enforcement, with a commercial version available to non-law enforcement.
 
  
 
=Authors=
 
=Authors=
Mac Marhsal was developed by ATC-NY, supported by a contract with the US National Institute of Justice (NIJ).  The project was originally named MEGA.  
+
Mac Marshal was developed by ATC-NY, supported in part by the US National Institute of Justice (NIJ).  The project was originally named MEGA.  
  
 
= External Links =  
 
= External Links =  

Latest revision as of 10:57, 28 November 2011

Mac Marshal
Maintainer: ATC-NY
OS: Mac OS X
Genre: Template:Macintosh forensics
License: Commercial (free to law enforcement)
Website: macmarshal.com

Mac Marshal is a tool to analyze Mac OS X file system images. It scans a Macintosh disk image, automatically detects and displays Macintosh and Windows operating systems and virtual machine images, then runs a number of analysis tools on the image to extract Mac OS X-specific forensic evidence written by the OS and common applications.

Mac Marshal Forensic Edition runs on an investigator's workstation to analyze a Mac disk image.

Mac Marshal Field Edition runs on a Mac target machine from a USB drive. It extracts volatile system state data, including a snapshot of physical RAM.

Mac Marshal follows forensic best practices, maintains a detailed log file of all activities it performs, and produces reports in RTF, PDF, and HTML formats.

Version 1.0 was released in January 2009, available at no cost to US law enforcement, with a commercial version available to non-law enforcement. Version 2.0 was released in November 2010, adding live analysis in the Field Edition and the ability to take a snapshot of the target machine's physical RAM. Version 3.0 was released in November 2011 and can run on both Mac OS X and Windows XP and later.


Authors

Mac Marshal was developed by ATC-NY, supported in part by the US National Institute of Justice (NIJ). The project was originally named MEGA.

External Links