Difference between pages "Mac OS X" and "Research Topics"

From Forensics Wiki
(Difference between pages)
Jump to: navigation, search
(Burn Folder)
 
m (AFF Enhancement)
 
Line 1: Line 1:
{{Expand}}
+
Interested in doing research in computer forensics? Looking for a master's topic, or just some ideas for a research paper? Here is our list. Please feel free to add your own ideas. ''Potential Sponsor,'' when present, indicates the name of a researcher who would be interested in lending support in the form of supervision or other resources to a project.
  
Apple Inc.'s Macintosh OS X (pronounced "'''OS Ten'''") is the operating system distributed with Apple computers. It includes heavily used several programs by default, including [[Apple Mail]], a web browser called [[Apple Safari | Safari]], and an [[Apple Address Book]], and [[iCal]].  
+
=Tool Development=
 +
==AFF Enhancement==
 +
[[AFF]] is the Advanced Forensics Format, developed by Simson Garfinkel and Basis Technology. The following enhancements would be very useful to the format:
 +
* Signing with X.509 or GPG keys data segments and metadata.
 +
* Encryption of data segments with an AES-256 key specified by a password
 +
* Encryption of the AES-256 key with a public key (and decryption with a corresponding private key)
 +
* Evaluation of the AFF data page size. What is the optimal page size for compressed forensic work?
 +
* Replacement of the AFF "BADFLAG" approach for indicating bad data with a bitmap.
  
== Burn Folder ==
+
''Sponsor for these projects: [[User:Simsong Simson Garfinkel]]''
  
Mac OS X Burn Folder:
+
==Flash Memory==
<pre>
+
Flash memory devices such as USB keys implement a wear leveling algorithm in hardware so that frequently rewritten blocks are actually written to many different physical blocks. Are there any devices that let you access the raw flash cells underneath the wear leveling chip? Can you get statistics out of the device? Can you access pages that have been mapped out (and still have valid data) but haven't been mapped back yet? Can you use this as a technique for accessing deleted information?
$NAME.fpbf
+
</pre>
+
  
This folder normally contains [[Mac OS X Alias Files|alias files]] (similar to LNK files under Windows). Which should have the following signature.
+
''Sponsor: [[User:Simsong Simson Garfinkel]]''
<pre>
+
00000000  62 6f 6f 6b 00 00 00 00  6d 61 72 6b 00 00 00 00  |book....mark....|
+
</pre>
+
 
+
These [[Mac OS X Alias Files|alias files]] contain additional date and time values.
+
 
+
Also check the following files for references to deleted .fpbf paths:
+
<pre>
+
/Users/$USERNAME/Library/Preferences/com.apple.finder.plist
+
</pre>
+
 
+
Actual burning of optical media is logged in:
+
<pre>
+
/var/log/system.log
+
/Users/$USERNAME/Library/Logs/DiscRecording.log
+
/private/var/.logs_exporter/cache/Users/$USERNAME/Library/Logs/DiscRecording.log
+
</pre>
+
 
+
== HFS/HFS+ date and time values ==
+
 
+
In HFS+ date and time values are stored in an unsigned 32-bit integer containing the number of seconds since January 1, 1904 at 00:00:00 (midnight) UTC (GMT). This is slightly different from HFS where the date and time value are stored using the local time. The maximum representable date is February 6, 2040 at 06:28:15 UTC (GMT). The date values do not account for leap seconds. They do include a leap day in every year that is evenly divisible by four. This is sufficient given that the range of representable dates does not contain 1900 or 2100, neither of which have leap days.
+
 
+
Converting HFS/HFS+ date and time values with Python:
+
<pre>
+
import datetime
+
 
+
print datetime.datetime( 1904, 1, 1 ) + datetime.timedelta( seconds=0xCBDAF25B )
+
</pre>
+
 
+
== Quarantine event database ==
+
See [http://menial.co.uk/blog/2011/06/16/mac-quarantine-event-database/]
+
 
+
Snow Leopard and earlier
+
<pre>
+
/Users/$USER/Library/Preferences/com.apple.LaunchServices.QuarantineEvents
+
</pre>
+
 
+
<pre>
+
SELECT datetime(LSQuarantineTimeStamp + 978307200, "unixepoch") as LSQuarantineTimeStamp, LSQuarantineAgentName, LSQuarantineOriginURLString, LSQuarantineDataURLString from LSQuarantineEvent;
+
</pre>
+
 
+
Lion and later
+
<pre>
+
/Users/$USER/Library/Preferences/com.apple.LaunchServices.QuarantineEventsV2
+
</pre>
+
 
+
== Package Files (.PKG) ==
+
Package Files (.PKG) are XAR archives [http://en.wikipedia.org/wiki/Xar_(archiver)] that contain a cpio archive and metadata [http://s.sudre.free.fr/Stuff/Ivanhoe/FLAT.html].
+
 
+
== Also see ==
+
* [[MacOS Process Monitoring]]
+
* [[Acquiring a MacOS System with Target Disk Mode]]
+
* [[Converting Binary Plists]]
+
* [[FileVault Disk Encryption]]
+
* [[File Vault]]
+
 
+
== External Links ==
+
 
+
* [http://www.apple.com/macosx/ Official website]
+
* [http://en.wikipedia.org/wiki/OS_X Wikipedia entry on OS X]
+
* [http://menial.co.uk/blog/2011/06/16/mac-quarantine-event-database/ Quarantine event database]
+
* [http://www2.tech.purdue.edu/cit/Courses/cit556/readings/MacForensicsCraiger.pdf Mac Forensics: Mac OS X and the HFS+ File System] by P. Craiger
+
 
+
=== Apple Examiner ===
+
* [http://www.appleexaminer.com/ The Apple Examiner]
+
* [http://www.appleexaminer.com/MacsAndOS/Analysis/USBOSX/USBOSX.html USB Entries on OS X]
+
* [http://www.appleexaminer.com/Downloads/MacForensics.pdf Macintosh Forensics - A Guide for the Forensically Sound Examination of a Macintosh Computer] by Ryan R. Kubasiak
+
 
+
[[Category:Mac OS X]]
+
[[Category:Operating systems]]
+

Revision as of 10:09, 22 April 2007

Interested in doing research in computer forensics? Looking for a master's topic, or just some ideas for a research paper? Here is our list. Please feel free to add your own ideas. Potential Sponsor, when present, indicates the name of a researcher who would be interested in lending support in the form of supervision or other resources to a project.

Tool Development

AFF Enhancement

AFF is the Advanced Forensics Format, developed by Simson Garfinkel and Basis Technology. The following enhancements would be very useful to the format:

  • Signing with X.509 or GPG keys data segments and metadata.
  • Encryption of data segments with an AES-256 key specified by a password
  • Encryption of the AES-256 key with a public key (and decryption with a corresponding private key)
  • Evaluation of the AFF data page size. What is the optimal page size for compressed forensic work?
  • Replacement of the AFF "BADFLAG" approach for indicating bad data with a bitmap.

Sponsor for these projects: User:Simsong Simson Garfinkel

Flash Memory

Flash memory devices such as USB keys implement a wear leveling algorithm in hardware so that frequently rewritten blocks are actually written to many different physical blocks. Are there any devices that let you access the raw flash cells underneath the wear leveling chip? Can you get statistics out of the device? Can you access pages that have been mapped out (and still have valid data) but haven't been mapped back yet? Can you use this as a technique for accessing deleted information?

Sponsor: User:Simsong Simson Garfinkel