Difference between pages "Websites" and "Mac OS X"

From ForensicsWiki
(Difference between pages)
Jump to: navigation, search
 
(Startup Items)
 
Line 1: Line 1:
'''Websites''' about [[digital forensics]] and related topics.
+
{{Expand}}
  
= Digital Forensics =
+
Apple Inc.'s Macintosh OS X (pronounced "'''OS Ten'''") is the operating system distributed with Apple computers. It includes heavily used several programs by default, including [[Apple Mail]], a web browser called [[Apple Safari | Safari]], and an [[Apple Address Book]], and [[iCal]].
; Bruce Nikkel's Computer Forensics Homepage
+
: [http://digitalforensics.ch/ Bruce Nikkel's Computer Forensics Homepage]
+
: Presentations, links, references
+
  
; Digital Forensic Solution Provider Website
+
== Disk image types ==
: [http://forensicpeople.com/ Forensic People Website]
+
  
; Certfied Computer Examiner Website
+
Mac OS X has support for various disk image types build-in, some of which are:
: [http://www.isfce.com/ Certfied Computer Examiner Website]
+
* read-write disk image (.dmg) some of which use the [[Raw Image Format]]
: Open certification process for digital forensics.
+
* [[Sparse Image format|Sparse disk image (.spareimage)]]
 +
* [[Sparse Bundle Image format|Sparse bundle disk image (.sparsebundle)]]
  
; Computer Forensics Tool Testing (CFTT) project
+
== Burn Folder ==
: [http://www.cftt.nist.gov/ Computer Forensics Tool Testing project]
+
: The Computer Forensic Tool Testing (CFTT) project establishes methodologies for testing computer forensic tools by development of general tool specifications, test procedures, test criteria, test sets, and test hardware.
+
  
; Computer Forensics and Investigations
+
Mac OS X Burn Folder:
: [http://computer-forensics-lab.org/ project “COMPUTER FORENSICS AND INVESTIGATIONS”]
+
<pre>
: Computer Forensics articles, and website of Igor Michailov
+
$NAME.fpbf
 +
</pre>
  
; Computer Forensics Tool Catalog
+
This folder normally contains [[Mac OS X Alias Files|alias files]] (similar to LNK files under Windows). Which should have the following signature.
: [http://www.cftt.nist.gov/tool_catalog/ Computer Forensics Tool Catalog]
+
<pre>
: The Computer Forensics Tool Catalog provides an easily searchable catalog of forensic tools to enable practitioners to find tools that meet their specific technical needs.
+
00000000  62 6f 6f 6b 00 00 00 00  6d 61 72 6b 00 00 00 00  |book....mark....|
 +
</pre>
  
; Computer Forensics World
+
These [[Mac OS X Alias Files|alias files]] contain additional date and time values.
: http://www.computerforensicsworld.com/
+
: Website with online discussion forums relating to computer forensics.
+
  
; [[Cyberspeak podcast]]
+
Also check the following files for references to deleted .fpbf paths:
: [http://cyberspeak.libsyn.com/ Cyberspeak Podcast]
+
<pre>
: Computer forensics, network security, and computer crime podcast.
+
/Users/$USERNAME/Library/Preferences/com.apple.finder.plist
 +
/Users/$USERNAME/Library/Preferences/com.apple.sidebarlists.plist
 +
</pre>
  
; Digital Forensics Discussion Forum
+
Actual burning of optical media is logged in:
: [http://www.multimediaforensics.com/ Digital Forensics Discussion Forum]
+
<pre>
: A forum for the discussion of computer and digital forensics examinations, certified and non-certified investigators welcome
+
/var/log/system.log
 +
/Users/$USERNAME/Library/Logs/DiscRecording.log
 +
/private/var/.logs_exporter/cache/Users/$USERNAME/Library/Logs/DiscRecording.log
 +
</pre>
  
; Digital Forensic Research Workshop (DFRWS)
+
== HFS/HFS+ date and time values ==
: [http://www.dfrws.org/ Official Website for Digital Forensic Research Workshop]
+
: Open forum for research in digital forensic issues, hosting annual meeting and annual forensics challenge.
+
  
; E-Evidence Information Centre
+
In HFS+ date and time values are stored in an unsigned 32-bit integer containing the number of seconds since January 1, 1904 at 00:00:00 (midnight) UTC (GMT). This is slightly different from HFS where the date and time value are stored using the local time. The maximum representable date is February 6, 2040 at 06:28:15 UTC (GMT). The date values do not account for leap seconds. They do include a leap day in every year that is evenly divisible by four. This is sufficient given that the range of representable dates does not contain 1900 or 2100, neither of which have leap days. Also see: [http://web.archive.org/web/20090214212148/http://developer.apple.com/technotes/tn/tn1150.html Technical Note TN1150 - HFS Plus Volume Format]
: [http://www.e-evidence.info/ E-Evidence Information Centre]
+
: An online digital forensics bibliography, updated monthly
+
  
; FCCU GNU/Linux Forensic Boot CD
+
Converting HFS/HFS+ date and time values with Python:
: [http://www.lnx4n6.be/ Belgian Computer Forensic Website]
+
<pre>
: Belgian Computer Forensic Website - Forensic Boot CD  - Linux
+
import datetime
  
; Forensic Focus
+
print datetime.datetime( 1904, 1, 1 ) + datetime.timedelta( seconds=0xCBDAF25B )
: http://www.forensicfocus.com/
+
</pre>
: News, blog, forums, and other resources for folks engaged in or interested in digital forensics.
+
  
; International Association of Computer Investigative Specialists
+
== Launch Agents ==
: [http://www.iacis.info/ International Association of Computer Investigative Specialists]
+
<pre>
: Volunteer non-profit corporation composed of law enforcement professionals.
+
/System/Library/LaunchAgents/
 +
</pre>
  
; Litilaw Computer Forensics
+
== Launch Daemons ==
: [http://computer-forensics-litilaw.lexbe.com/ Litilaw Computer Forensics]
+
<pre>
: Computer forensics article collection.
+
/Library/LaunchDaemons/
 +
/System/Library/LaunchDaemons/
 +
</pre>
  
; MySecured.com
+
== Startup Items ==
: [http://www.MySecured.com/ MySecured.com]
+
<pre>
: Mobile phone forensics, cellphone related investigation and data analysis site.
+
/Library/StartupItems/
 +
/System/Library/StartupItems/
 +
</pre>
  
; NIST: Secure Hashing
+
== Crash Reporter ==
: [http://csrc.nist.gov/CryptoToolkit/tkhash.html NIST: Secure Hashing]
+
<pre>
: The Computer Security Division's (CSD) Security Technology Group (STG) is involved in the development, maintenance, and promotion of a number of standards and guidance that cover a wide range of cryptographic technology.
+
/Library/Application Support/CrashReporter
 +
</pre>
  
; National Software Reference Library (NSRL)
+
== Diagnostic Reports ==
: [http://www.nsrl.nist.gov/ National Software Reference Library]
+
<pre>
: The National Software Reference Library (NSRL) collects software from various sources and incorporates file profiles computed from this software into a Reference Data Set (RDS) of information.
+
/Library/Logs/DiagnosticReports
 +
</pre>
  
; Open Source Digital Forensics
+
== Quarantine event database ==
: [http://www.opensourceforensics.org  “OpenSourceForensics.org”]
+
See [http://menial.co.uk/blog/2011/06/16/mac-quarantine-event-database/]
: The Open Source Digital Forensics site is a reference for the use of open source software in digital investigations (a.k.a. digital forensics, computer forensics, incident response).
+
  
; [University of Delaware]  Computer Forensics Lab
+
Snow Leopard and earlier
: [http://128.175.24.251/forensics/default.htm University of Delaware]
+
<pre>
: Computer Forensics Lab Resource Site.
+
/Users/$USER/Library/Preferences/com.apple.LaunchServices.QuarantineEvents
 +
</pre>
  
; [University of Rhode Island]  Digital Forensics Center
+
<pre>
: [http://dfc.cs.uri.edu/ University of Rhode Island]
+
SELECT datetime(LSQuarantineTimeStamp + 978307200, "unixepoch") as LSQuarantineTimeStamp, LSQuarantineAgentName, LSQuarantineOriginURLString, LSQuarantineDataURLString from LSQuarantineEvent;
: Computer Forensics Lab Resource Site.
+
</pre>
  
; Forensics Sciences Conference and Exhibition
+
Lion and later
: [http://http://euroforensics.com/]Euroforensics
+
<pre>
 +
/Users/$USER/Library/Preferences/com.apple.LaunchServices.QuarantineEventsV2
 +
</pre>
  
= Non-Digital Forensics =
+
== sleepimage ==
; NIST Image Group
+
This file is similar to the hibernation file on Windows.
: [http://fingerprint.nist.gov/ NIST Image Group]
+
<pre>
: Many reports, including the [[NIST]] report on [[AFIS]] [[fingerprint]] testing.
+
/private/var/vm/sleepimage
 +
</pre>
  
= Wikis =
+
Also see: [http://osxdaily.com/2010/10/11/sleepimage-mac/]
; Forensics Wiki (Russian Language)
+
: [http://www.computer-forensics-lab.org/wiki/ Forensics Wiki in Russian]
+
  
= [[Blogs]] =
+
== Package Files (.PKG) ==
 +
Package Files (.PKG) are XAR archives [http://en.wikipedia.org/wiki/Xar_(archiver)] that contain a cpio archive and metadata [http://s.sudre.free.fr/Stuff/Ivanhoe/FLAT.html].
  
= [[Journals]] =
+
== Also see ==
 +
* [[MacOS Process Monitoring]]
 +
* [[Acquiring a MacOS System with Target Disk Mode]]
 +
* [[Converting Binary Plists]]
 +
* [[FileVault Disk Encryption]]
 +
* [[File Vault]]
 +
 
 +
=== Formats ===
 +
* [[Basic Security Module (BSM) file format]]
 +
* [[Property list (plist)]]
 +
 
 +
== External Links ==
 +
* [http://www.apple.com/macosx/ Official website]
 +
* [http://en.wikipedia.org/wiki/OS_X Wikipedia entry on OS X]
 +
* [http://menial.co.uk/blog/2011/06/16/mac-quarantine-event-database/ Quarantine event database]
 +
* [http://www2.tech.purdue.edu/cit/Courses/cit556/readings/MacForensicsCraiger.pdf Mac Forensics: Mac OS X and the HFS+ File System] by P. Craiger
 +
* [http://web.me.com/driley/iWeb/Previous_files/Directory_Services_Overview.pdf Mac OS X Directory Services Integration including Active Directory]
 +
* [http://digitalinvestigation.wordpress.com/2012/04/04/geek-post-nskeyedarchiver-files-what-are-they-and-how-can-i-use-them/ NSKeyedArchiver files – what are they, and how can I use them?]
 +
* [http://krypted.com/mac-os-x/command-line-alf-on-mac-os-x/ Command Line ALF on Mac OS X]
 +
* [http://newosxbook.com/DMG.html Demystifying the DMG File Format]
 +
* [https://code.google.com/p/mac-security-tips/wiki/ALL_THE_TIPS mac-security-tips]
 +
 
 +
=== Apple Examiner ===
 +
* [http://www.appleexaminer.com/ The Apple Examiner]
 +
* [http://www.appleexaminer.com/MacsAndOS/Analysis/USBOSX/USBOSX.html USB Entries on OS X]
 +
* [http://www.appleexaminer.com/Downloads/MacForensics.pdf Macintosh Forensics - A Guide for the Forensically Sound Examination of a Macintosh Computer] by Ryan R. Kubasiak
 +
 
 +
=== iCloud ===
 +
* [http://support.apple.com/kb/HT4865?viewlocale=en_US&locale=en_US iCloud: iCloud security and privacy overview]
 +
 
 +
[[Category:Mac OS X]]
 +
[[Category:Operating systems]]

Revision as of 13:07, 12 June 2014

Information icon.png

Please help to improve this article by expanding it.
Further information might be found on the discussion page.

Apple Inc.'s Macintosh OS X (pronounced "OS Ten") is the operating system distributed with Apple computers. It includes heavily used several programs by default, including Apple Mail, a web browser called Safari, and an Apple Address Book, and iCal.

Disk image types

Mac OS X has support for various disk image types build-in, some of which are:

Burn Folder

Mac OS X Burn Folder:

$NAME.fpbf

This folder normally contains alias files (similar to LNK files under Windows). Which should have the following signature.

00000000  62 6f 6f 6b 00 00 00 00  6d 61 72 6b 00 00 00 00  |book....mark....|

These alias files contain additional date and time values.

Also check the following files for references to deleted .fpbf paths:

/Users/$USERNAME/Library/Preferences/com.apple.finder.plist
/Users/$USERNAME/Library/Preferences/com.apple.sidebarlists.plist

Actual burning of optical media is logged in:

/var/log/system.log
/Users/$USERNAME/Library/Logs/DiscRecording.log
/private/var/.logs_exporter/cache/Users/$USERNAME/Library/Logs/DiscRecording.log

HFS/HFS+ date and time values

In HFS+ date and time values are stored in an unsigned 32-bit integer containing the number of seconds since January 1, 1904 at 00:00:00 (midnight) UTC (GMT). This is slightly different from HFS where the date and time value are stored using the local time. The maximum representable date is February 6, 2040 at 06:28:15 UTC (GMT). The date values do not account for leap seconds. They do include a leap day in every year that is evenly divisible by four. This is sufficient given that the range of representable dates does not contain 1900 or 2100, neither of which have leap days. Also see: Technical Note TN1150 - HFS Plus Volume Format

Converting HFS/HFS+ date and time values with Python:

import datetime

print datetime.datetime( 1904, 1, 1 ) + datetime.timedelta( seconds=0xCBDAF25B )

Launch Agents

/System/Library/LaunchAgents/

Launch Daemons

/Library/LaunchDaemons/
/System/Library/LaunchDaemons/

Startup Items

/Library/StartupItems/
/System/Library/StartupItems/

Crash Reporter

/Library/Application Support/CrashReporter

Diagnostic Reports

/Library/Logs/DiagnosticReports

Quarantine event database

See [1]

Snow Leopard and earlier

/Users/$USER/Library/Preferences/com.apple.LaunchServices.QuarantineEvents
SELECT datetime(LSQuarantineTimeStamp + 978307200, "unixepoch") as LSQuarantineTimeStamp, LSQuarantineAgentName, LSQuarantineOriginURLString, LSQuarantineDataURLString from LSQuarantineEvent;

Lion and later

/Users/$USER/Library/Preferences/com.apple.LaunchServices.QuarantineEventsV2

sleepimage

This file is similar to the hibernation file on Windows.

/private/var/vm/sleepimage

Also see: [2]

Package Files (.PKG)

Package Files (.PKG) are XAR archives [3] that contain a cpio archive and metadata [4].

Also see

Formats

External Links

Apple Examiner

iCloud