Difference between pages "Tools:Data Recovery" and "Mac OS X"

From ForensicsWiki
(Difference between pages)
Jump to: navigation, search
(Carving)
 
 
Line 1: Line 1:
= Partition Recovery =
+
{{Expand}}
  
*[http://www.stellarinfo.com/recover-windows-nt.htm NTFS Partition Recovery]
+
Apple Inc.'s Macintosh OS X (pronounced "'''OS Ten'''") is the operating system distributed with Apple computers. It includes heavily used several programs by default, including [[Apple Mail]], a web browser called [[Apple Safari | Safari]], and an [[Apple Address Book]], and [[iCal]].
: Stellar NTFS Data Recovery Software to recover data from Windows based NTFS/NTFS5 file systems
+
  
*[http://www.infinadyne.com/cddvd_diagnostic.html CD/DVD Diagnostic]
+
== Burn Folder ==
: Recover data and video from CDs/DVDs/Blu-Ray.  This is specifically not for forensic purposes but for data recovery.  A different tool called CD/DVD Inspector is for forensic examination of optical media.
+
  
*[http://www.ptdd.com/index.htm Partition Table Doctor]
+
Mac OS X Burn Folder:
: Recover deleted or lost partitions (FAT16/FAT32/NTFS/NTFS5/EXT2/EXT3/SWAP).
+
<pre>
 +
$NAME.fpbf
 +
</pre>
  
*[http://www.diskinternals.com/ntfs-recovery/ NTFS Recovery]
+
This folder normally contains alias files (similar to LNK files under Windows). Which should have the following signature.
: DiskInternals NTFS Recovery is a fully automatic utility that recovers data from damaged or formatted disks.
+
<pre>
 +
00000000  62 6f 6f 6b 00 00 00 00  6d 61 72 6b 00 00 00 00  |book....mark....|
 +
</pre>
  
*[http://www.stud.uni-hannover.de/user/76201/gpart/ gpart]
+
As LNK files these files contain additional date and time values.
: Gpart is a tool which tries to guess the primary partition table of a PC-type hard disk in case the primary partition table in sector 0 is damaged, incorrect or deleted.
+
  
*[http://www.cgsecurity.org/wiki/TestDisk TestDisk]
+
Also check: ~/Library/Preferences/com.apple.finder.plist
: [[TestDisk]] is an OpenSource software and is licensed under the GNU Public License (GPL).  
+
For references to deleted .fpbf paths.
  
*[http://www.stellarinfo.com/partition-recovery.htm Partition Recovery Software]
+
Actual burning of optical media is logged in:
: Partition Recovery software for NTFS & FAT system that examines lost windows partition of damaged and corrupted hard drive.
+
/var/log/system.log
 +
/Users/$USERNAME/Library/Logs/DiscRecording.log
 +
/private/var/.logs_exporter/cache/Users/$USERNAME/Library/Logs/DiscRecording.log
  
== See Also ==
+
== HFS/HFS+ date and time values ==
  
* [http://support.microsoft.com/?kbid=166997 Using Norton Disk Edit to Backup Your Master Boot Record]
+
In HFS+ date and time values are stored in an unsigned 32-bit integer containing the number of seconds since January 1, 1904 at 00:00:00 (midnight) UTC (GMT). This is slightly different from HFS where the date and time value are stored using the local time. The maximum representable date is February 6, 2040 at 06:28:15 UTC (GMT). The date values do not account for leap seconds. They do include a leap day in every year that is evenly divisible by four. This is sufficient given that the range of representable dates does not contain 1900 or 2100, neither of which have leap days.
  
== Notes ==
+
Converting HFS/HFS+ date and time values with Python:
 +
<pre>
 +
import datetime
  
* "fdisk /mbr" restores the boot code in the [[Master Boot Record]], but not the partition itself. On newer versions of Windows you should use fixmbr, bootrec, mbrfix, or [[MBRWizard]]. You can also extract a copy of the specific standard MBR code from tools like bootrec.exe and diskpart.exe in Windows (from various offsets) and copy it to disk with dd (Use bs=446 count=1). For Windows XP SP2 c:\%WINDIR%\System32\diskpart.exe the MBR code is found between offset 1b818h and 1ba17h.
+
print datetime.datetime( 1904, 1, 1 ) + datetime.timedelta( seconds=0xCBDAF25B )
 +
</pre>
  
= Data Recovery =
+
== Quarantine event database ==
The term "Data Recovery" is frequently used to mean forensic recovery, but the term really should be used for recovering data from damaged media.  
+
See [http://menial.co.uk/blog/2011/06/16/mac-quarantine-event-database/]
  
* [http://www.stellarinfo.com/ Stellar Data Recovery]
+
Snow Leopard and earlier
: Data recovery software services & tools to recover lost data from hard drive.
+
<pre>
 +
/Users/$USER/Library/Preferences/com.apple.LaunchServices.QuarantineEvents
 +
</pre>
  
*[http://www.salvationdata.com/data-recovery-equipment/hd-doctor.htm HD Doctor Suite]
+
<pre>
: HD Doctor Suite is a set of professional tools used to fix firmware problem
+
SELECT datetime(LSQuarantineTimeStamp + 978307200, "unixepoch") as LSQuarantineTimeStamp, LSQuarantineAgentName, LSQuarantineOriginURLString, LSQuarantineDataURLString from LSQuarantineEvent;
 +
</pre>
  
*[http://www.salvationdata.com SalvationDATA]
+
Lion and later
: Claims to have a program that can read the "bad blocks" of Maxtor drives with proprietary commands.
+
<pre>
 +
/Users/$USER/Library/Preferences/com.apple.LaunchServices.QuarantineEventsV2
 +
</pre>
  
*[http://www.toolsthatwork.com/bringback.htm BringBack]
+
== Package Files (.PKG) ==
: BringBack offers easy to use, inexpensive, and highly successful data recovery for Windows and Linux (ext2) operating systems and digital images stored on memory cards, etc.
+
Package Files (.PKG) are XAR archives [http://en.wikipedia.org/wiki/Xar_(archiver)] that contain a cpio archive and metadata [http://s.sudre.free.fr/Stuff/Ivanhoe/FLAT.html].
  
*[http://www.runtime.org/raid.htm RAID Reconstructor]
+
== Also see ==
: Runtime Software's RAID Reconstructor will reconstruct RAID Level 0 (Striping) and RAID Level 5 drives.
+
* [[MacOS Process Monitoring]]
 +
* [[Acquiring a MacOS System with Target Disk Mode]]
 +
* [[Converting Binary Plists]]
 +
* [[FileVault Disk Encryption]]
 +
* [[File Vault]]
  
* [http://www.e-rol.com/en/ e-ROL]
+
== External Links ==
: Erol allows you to recover through the internet files erased by mistake. Recover your files online for free.
+
  
* [http://www.recuva.com/ Recuva]
+
* [http://www.apple.com/macosx/ Official website]
: Recuva is a freeware Windows tool that will recover accidentally deleted files.
+
* [http://en.wikipedia.org/wiki/OS_X Wikipedia entry on OS X]
 +
* [http://menial.co.uk/blog/2011/06/16/mac-quarantine-event-database/ Quarantine event database]
 +
* [http://www2.tech.purdue.edu/cit/Courses/cit556/readings/MacForensicsCraiger.pdf Mac Forensics: Mac OS X and the HFS+ File System] by P. Craiger
  
* [http://www.snapfiles.com/get/restoration.html Restoration]
+
=== Apple Examiner ===
: Restoration is a freeware Windows software that will allow you to recover deleted files
+
* [http://www.appleexaminer.com/ The Apple Examiner]
 +
* [http://www.appleexaminer.com/MacsAndOS/Analysis/USBOSX/USBOSX.html USB Entries on OS X]
 +
* [http://www.appleexaminer.com/Downloads/MacForensics.pdf Macintosh Forensics - A Guide for the Forensically Sound Examination of a Macintosh Computer] by Ryan R. Kubasiak
  
* [http://www.undelete-plus.com/ Undelete Plus]
+
[[Category:Mac OS X]]
: Undelete Plus is a free deleted file recovery tool that works for all versions of Windows (95-Vista), FAT12/16/32, NTFS and NTFS5 filesystems and can perform recovery on various solid state devices.
+
[[Category:Operating systems]]
 
+
* [http://www.data-recovery-software.net/ R-Studio]
+
: R-Studio is a data recovery software suite that can recover files from FAT(12-32), NTFS, NTFS 5, HFS/HFS+, FFS, UFS/UFS2 (*BSD, Solaris), Ext2/Ext3 (Linux) and so on.
+
 
+
* [http://www.deepspar.com/ DeepSpar Disk Imager]
+
: DeepSpar Disk Imager is a dedicated disk imaging device built to handle disk-level problems and to recover bad sectors on a hard drive.
+
 
+
* [http://digital-assembly.com/products/adroit-photo-recovery/ Adroit Photo Recovery]
+
: Adroit Photo Recovery is a photo recovery tool that uses validated carving and is able to recover fragmented photos. Adroit Photo Recovery is able
+
: to recover high definition RAW images from Canon, Nikon etc.
+
 
+
* [http://sourceforge.net/projects/freerecover/ FreeRecover]
+
: FreeRecover is a small program that can recover deleted files from NTFS drives.
+
 
+
See also [[Data Recovery Stories]]
+
 
+
=Carving=
+
*[http://www.datalifter.com/products.htm DataLifter® - File Extractor Pro]
+
: Data carving runs on multiple threads to make use of modern processors
+
 
+
* [http://sourceforge.net/projects/defraser/ NFI Defraser]
+
: "Defraser is a forensic analysis application that can be used to detect full and partial multimedia files in datastreams. It is typically used to find (and restore) complete or partial video files in datastreams (for instance, unallocated diskspace)." Written in C#; runs on Windows.
+
 
+
*[http://www.simplecarver.com/ Simple Carver Suite]
+
: Simple Carver Suite is a collection of unique tools designed for a number of purposes including data recovery, forensic computing and eDiscovery. The suite was originally designed for data recovery and has since expanded to include unique file decoding, file identification and file classification.
+
 
+
*[http://foremost.sourceforge.net/ Foremost]
+
: Foremost is a console program to recover files based on their headers, footers, and internal data structures.
+
 
+
*[http://www.digitalforensicssolutions.com/Scalpel/ Scalpel]
+
: Scalpel is a fast file carver that reads a database of header and footer definitions and extracts matching files from a set of image files or raw device files. Scalpel is filesystem-independent and will carve files from FATx, NTFS, ext2/3, or raw partitions.
+
 
+
*[[EnCase]]
+
: EnCase comes with some enScripts that will do carving.
+
 
+
*[[CarvFs]]
+
: A virtual file system (fuse) implementation that can provide carving tools with the possibility to do recursive multi tool zero-storage carving (also called in-place carving). Patches and scripts for scalpel and foremost are provided. Works on raw and encase images.
+
 
+
*[[LibCarvPath]]
+
: A shared library that allows carving tools to use zero-storage carving on carvfs virtual files.
+
 
+
*[http://greg-kennedy.com/nwserver/?p=10 midi-carver]
+
: midi-carver is a data carver for MIDI files.
+
 
+
*[http://www.cgsecurity.org/wiki/PhotoRec PhotoRec]
+
: PhotoRec is file data recovery software designed to recover lost files including video, documents and archives from Hard Disks and CDRom and lost pictures (thus, its 'Photo Recovery' name) from digital camera memory.
+
 
+
*[http://www.datarescue.com/photorescue/ PhotoRescue]
+
: Datarescue PhotoRescue Advanced is picture and photo data recovery solution made by the creators of IDA Pro. PhotoRescue will undelete, unerase and recover pictures and files lost on corrupted, erased or damaged compact flash (CF) cards, SD Cards, Memory Sticks, SmartMedia and XD cards.
+
 
+
* [https://www.uitwisselplatform.nl/projects/revit RevIt]
+
: RevIt (Revive It) is an experimental carving tool, initially developed for the DFRWS 2006 carving challenge. It uses 'file structure based carving'. Note that RevIt currently is a work in progress.
+
 
+
* [http://jbj.rapanden.dk/magicrescue/ Magic Rescue]
+
: Magic Rescue is a file carving tool that uses "magic bytes" in a file contents to recover data.
+
 
+
* [[FTK]]
+
: FTK2 includes some file carvers
+
 
+
* [[X-Ways]]
+
: X-Ways Forensic provides a robust list of file types as well as the ability to specific custom file headers/trailers.  File types are available for carving, identification and filtering.
+
 
+
*[[Adroit Photo Forensics]]
+
: Adroit Photo Forensics supports data carving of popular image formats. Also supports fragmented carving using [[File_Carving:SmartCarving|SmartCarving]] and [[File_Carving:GuidedCarving|GuidedCarving]].
+
 
+
*[http://belkasoft.com/bfc/en/forensic_carver.asp Belkasoft Forensic Carver], [http://belkasoft.com/bec/en/evidence_center.asp Belkasoft Evidence Center]
+
: Belkasoft Forensic Carver and Belkasoft Evidence Center support data carving for Instant Messenger and Browser artifacts. These tools support carving of physical or logical Windows drives as well as popular forensic image formats like Encase Evidence Files, DD or SMART.
+

Revision as of 06:00, 21 June 2012

Information icon.png

Please help to improve this article by expanding it.
Further information might be found on the discussion page.

Apple Inc.'s Macintosh OS X (pronounced "OS Ten") is the operating system distributed with Apple computers. It includes heavily used several programs by default, including Apple Mail, a web browser called Safari, and an Apple Address Book, and iCal.

Burn Folder

Mac OS X Burn Folder:

$NAME.fpbf

This folder normally contains alias files (similar to LNK files under Windows). Which should have the following signature.

00000000  62 6f 6f 6b 00 00 00 00  6d 61 72 6b 00 00 00 00  |book....mark....|

As LNK files these files contain additional date and time values.

Also check: ~/Library/Preferences/com.apple.finder.plist For references to deleted .fpbf paths.

Actual burning of optical media is logged in: /var/log/system.log /Users/$USERNAME/Library/Logs/DiscRecording.log /private/var/.logs_exporter/cache/Users/$USERNAME/Library/Logs/DiscRecording.log

HFS/HFS+ date and time values

In HFS+ date and time values are stored in an unsigned 32-bit integer containing the number of seconds since January 1, 1904 at 00:00:00 (midnight) UTC (GMT). This is slightly different from HFS where the date and time value are stored using the local time. The maximum representable date is February 6, 2040 at 06:28:15 UTC (GMT). The date values do not account for leap seconds. They do include a leap day in every year that is evenly divisible by four. This is sufficient given that the range of representable dates does not contain 1900 or 2100, neither of which have leap days.

Converting HFS/HFS+ date and time values with Python:

import datetime

print datetime.datetime( 1904, 1, 1 ) + datetime.timedelta( seconds=0xCBDAF25B )

Quarantine event database

See [1]

Snow Leopard and earlier

/Users/$USER/Library/Preferences/com.apple.LaunchServices.QuarantineEvents
SELECT datetime(LSQuarantineTimeStamp + 978307200, "unixepoch") as LSQuarantineTimeStamp, LSQuarantineAgentName, LSQuarantineOriginURLString, LSQuarantineDataURLString from LSQuarantineEvent;

Lion and later

/Users/$USER/Library/Preferences/com.apple.LaunchServices.QuarantineEventsV2

Package Files (.PKG)

Package Files (.PKG) are XAR archives [2] that contain a cpio archive and metadata [3].

Also see

External Links

Apple Examiner