Difference between pages "Tools" and "Mac OS X"

From ForensicsWiki
(Difference between pages)
Jump to: navigation, search
m (Windows-based Tools)
 
(Startup Items)
 
Line 1: Line 1:
This is an '''overview of available tools''' for forensic [[investigator]]s. Please click on the name of any tool for more details.
+
{{Expand}}
  
'''Note: This page has gotten too big and is being broken up. See:'''
+
Apple Inc.'s Macintosh OS X (pronounced "'''OS Ten'''") is the operating system distributed with Apple computers. It includes heavily used several programs by default, including [[Apple Mail]], a web browser called [[Apple Safari | Safari]], and an [[Apple Address Book]], and [[iCal]].
  
* [[:Category:Disk Imaging]]
+
== Disk image types ==
* [[Tools:Data Recovery]] (including file [[carving]])
+
* [[Tools:File Analysis]]
+
* [[Tools:Document Metadata Extraction]]
+
* [[Tools:Memory Imaging]]
+
* [[Tools:Memory Analysis]]
+
* [[Tools:Network Forensics]]
+
* [[Tools:Logfile Analysis]]
+
* [[:Category:Anti-forensics tools]]
+
* [[:Category:Secure deletion]]
+
  
= Disk Analysis Tools =
+
Mac OS X has support for various disk image types build-in, some of which are:
== Hard Drive Firmware and Diagnostics Tools ==
+
* read-write disk image (.dmg) some of which use the [[Raw Image Format]]
; [[PC-3000]] from [[DeepSpar Data Recovery Systems]]
+
* [[Sparse Image format|Sparse disk image (.spareimage)]]
: http://www.deepspar.com/products-pc-3000-drive.html
+
* [[Sparse Bundle Image format|Sparse bundle disk image (.sparsebundle)]]
: http://www.pc-3000.com/
+
  
== Linux-based Tools ==
+
== Burn Folder ==
; [[LINReS]] by [[NII Consulting Pvt. Ltd.]]
+
: http://www.niiconsulting.com/innovation/linres.html
+
  
; [[SMART]] by [[ASR Data]]
+
Mac OS X Burn Folder:
: http://www.asrdata.com
+
<pre>
 +
$NAME.fpbf
 +
</pre>
  
; [[Second Look: Linux Memory Forensics]] by [[Pikewerks Corporation]]
+
This folder normally contains [[Mac OS X Alias Files|alias files]] (similar to LNK files under Windows). Which should have the following signature.
: http://secondlookforensics.com/
+
<pre>
 +
00000000  62 6f 6f 6b 00 00 00 00  6d 61 72 6b 00 00 00 00  |book....mark....|
 +
</pre>
  
== Macintosh-based Tools ==
+
These [[Mac OS X Alias Files|alias files]] contain additional date and time values.
  
; [[Macintosh Forensic Software]] by [[BlackBag Technologies, Inc.]]
+
Also check the following files for references to deleted .fpbf paths:
: http://www.blackbagtech.com/software_mfs.html
+
<pre>
 +
/Users/$USERNAME/Library/Preferences/com.apple.finder.plist
 +
/Users/$USERNAME/Library/Preferences/com.apple.sidebarlists.plist
 +
</pre>
  
; [[MacForensicsLab]] by [[Subrosasoft]]
+
Actual burning of optical media is logged in:
: [http://www.subrosasoft.com/OSXSoftware/index.php?main_page=product_info&cPath=39&products_id=114 MacForensicLab-Subrosasoft]
+
<pre>
 +
/var/log/system.log
 +
/Users/$USERNAME/Library/Logs/DiscRecording.log
 +
/private/var/.logs_exporter/cache/Users/$USERNAME/Library/Logs/DiscRecording.log
 +
</pre>
  
; [[Mac Marshal]] by [[ATC-NY]]
+
== HFS/HFS+ date and time values ==
: http://www.macmarshal.com/
+
  
== Windows-based Tools ==
+
In HFS+ date and time values are stored in an unsigned 32-bit integer containing the number of seconds since January 1, 1904 at 00:00:00 (midnight) UTC (GMT). This is slightly different from HFS where the date and time value are stored using the local time. The maximum representable date is February 6, 2040 at 06:28:15 UTC (GMT). The date values do not account for leap seconds. They do include a leap day in every year that is evenly divisible by four. This is sufficient given that the range of representable dates does not contain 1900 or 2100, neither of which have leap days. Also see: [http://web.archive.org/web/20090214212148/http://developer.apple.com/technotes/tn/tn1150.html Technical Note TN1150 - HFS Plus Volume Format]
  
; [[Blackthorn GPS Forensics]]
+
Converting HFS/HFS+ date and time values with Python:
: http://www.blackthorngps.com
+
<pre>
 +
import datetime
  
; [[BringBack]] by [[Tech Assist, Inc.]]
+
print datetime.datetime( 1904, 1, 1 ) + datetime.timedelta( seconds=0xCBDAF25B )
: http://www.toolsthatwork.com/bringback.htm
+
</pre>
  
; Belkasoft Evidence Center by [[Belkasoft]]
+
== Launch Agents ==
; http://www.belkasoft.com
+
<pre>
: This product makes it easy for an investigator to search, analyze and store digital evidence found in Instant Messenger histories, Internet Browser histories and Outlook mailboxes.
+
/System/Library/LaunchAgents/
 +
</pre>
  
; [[CD/DVD Inspector]] by [[InfinaDyne]]
+
== Launch Daemons ==
; http://www.infinadyne.com/cddvd_inspector.html
+
<pre>
: This is the only forensic-qualified tool for examinination of optical media.  It has been around since 1999 and is in use by law enforcement, government and data recovery companies worldwide.
+
/Library/LaunchDaemons/
 +
/System/Library/LaunchDaemons/
 +
</pre>
  
; [[EMail Detective - Forensic Software Tool]] by [[Hot Pepper Technology, Inc]]
+
== Startup Items ==
; http://www.hotpepperinc.com/emd
+
<pre>
 +
/Library/StartupItems/
 +
/System/Library/StartupItems/
 +
</pre>
  
; [[EnCase]] by [[Guidance Software]]
+
== Crash Reporter ==
: http://www.guidancesoftware.com/
+
<pre>
 +
/Library/Application Support/CrashReporter
 +
</pre>
  
; Facebook Forensic Toolkit (FFT) by Afentis Forensics
+
== Diagnostic Reports ==
; http://www.facebookforensics.com
+
<pre>
: eDiscovery toolkit to identify and clone full profiles; including wall posts, private messages, uploaded photos/tags, group details, graphically illustrate friend links, and generate expert reports.
+
/Library/Logs/DiagnosticReports
 +
</pre>
  
; [[Forensic Toolkit]] ([[FTK]]) by [[AccessData]]
+
== Quarantine event database ==
: http://www.accessdata.com/products/ftk/
+
See [http://menial.co.uk/blog/2011/06/16/mac-quarantine-event-database/]
  
; [[HBGary Responder Professional]]  - Windows Physical Memory Forensic Platform
+
Snow Leopard and earlier
:http://www.hbgary.com
+
<pre>
 +
/Users/$USER/Library/Preferences/com.apple.LaunchServices.QuarantineEvents
 +
</pre>
  
; [[ILook Investigator]] by [[Elliot Spencer]] and [[Internal Revenue Service|U.S. Dept of Treasury, Internal Revenue Service - Criminal Investigation]] (IRS)
+
<pre>
: http://www.ilook-forensics.org/
+
SELECT datetime(LSQuarantineTimeStamp + 978307200, "unixepoch") as LSQuarantineTimeStamp, LSQuarantineAgentName, LSQuarantineOriginURLString, LSQuarantineDataURLString from LSQuarantineEvent;
 +
</pre>
  
; [[Mercury Indexer]] by [[MicroForensics, Inc.]]
+
Lion and later
: http://www.MicroForensics.com/
+
<pre>
 +
/Users/$USER/Library/Preferences/com.apple.LaunchServices.QuarantineEventsV2
 +
</pre>
  
; [[Nuix Desktop]] by [[Nuix Pty Ltd]]
+
== sleepimage ==
: http://www.nuix.com
+
This file is similar to the hibernation file on Windows.
 +
<pre>
 +
/private/var/vm/sleepimage
 +
</pre>
  
; [[OnLineDFS]] by [[Cyber Security Technologies]]
+
Also see: [http://osxdaily.com/2010/10/11/sleepimage-mac/]
: http://www.cyberstc.com/
+
  
; [[OSForensics]] by [[PassMark Software Pty Ltd]]
+
== Package Files (.PKG) ==
: http://www.osforensics.com/
+
Package Files (.PKG) are XAR archives [http://en.wikipedia.org/wiki/Xar_(archiver)] that contain a cpio archive and metadata [http://s.sudre.free.fr/Stuff/Ivanhoe/FLAT.html].
  
; [[P2 Power Pack]] by [[Paraben]]
+
== Also see ==
: https://www.paraben-forensics.com/catalog/product_info.php?cPath=25&products_id=187
+
* [[MacOS Process Monitoring]]
 +
* [[Acquiring a MacOS System with Target Disk Mode]]
 +
* [[Converting Binary Plists]]
 +
* [[FileVault Disk Encryption]]
 +
* [[File Vault]]
  
; [[Prodiscover]] by [[Techpathways]]
+
=== Formats ===
: http://www.techpathways.com/ProDiscoverWindows.htm
+
* [[Basic Security Module (BSM) file format]]
 +
* [[Property list (plist)]]
  
; [[Proof Finder]] by [[Nuix Pty Ltd]]
+
== External Links ==
: http://www.prooffinder.com/
+
* [http://www.apple.com/macosx/ Official website]
 +
* [http://en.wikipedia.org/wiki/OS_X Wikipedia entry on OS X]
 +
* [http://menial.co.uk/blog/2011/06/16/mac-quarantine-event-database/ Quarantine event database]
 +
* [http://www2.tech.purdue.edu/cit/Courses/cit556/readings/MacForensicsCraiger.pdf Mac Forensics: Mac OS X and the HFS+ File System] by P. Craiger
 +
* [http://web.me.com/driley/iWeb/Previous_files/Directory_Services_Overview.pdf Mac OS X Directory Services Integration including Active Directory]
 +
* [http://digitalinvestigation.wordpress.com/2012/04/04/geek-post-nskeyedarchiver-files-what-are-they-and-how-can-i-use-them/ NSKeyedArchiver files – what are they, and how can I use them?]
 +
* [http://krypted.com/mac-os-x/command-line-alf-on-mac-os-x/ Command Line ALF on Mac OS X]
 +
* [http://newosxbook.com/DMG.html Demystifying the DMG File Format]
 +
* [https://code.google.com/p/mac-security-tips/wiki/ALL_THE_TIPS mac-security-tips]
  
; [[Safeback]] by [[NTI]] and [[Armor Forensics]]
+
=== Apple Examiner ===
: http://www.forensics-intl.com/safeback.html
+
* [http://www.appleexaminer.com/ The Apple Examiner]
 +
* [http://www.appleexaminer.com/MacsAndOS/Analysis/USBOSX/USBOSX.html USB Entries on OS X]
 +
* [http://www.appleexaminer.com/Downloads/MacForensics.pdf Macintosh Forensics - A Guide for the Forensically Sound Examination of a Macintosh Computer] by Ryan R. Kubasiak
  
; [[X-Ways Forensics]] by [[X-Ways AG]]
+
=== iCloud ===
: http://www.x-ways.net/forensics/index-m.html
+
* [http://support.apple.com/kb/HT4865?viewlocale=en_US&locale=en_US iCloud: iCloud security and privacy overview]
  
; [[DateDecoder]] by [[Live-Forensics]]
+
[[Category:Mac OS X]]
: http://www.live-forensics.com/dl/DateDecoder.zip
+
[[Category:Operating systems]]
: A command line tool that decodes most encoded time/date stamps found on a windows system, and outputs the time/date in a human readable format.
+
 
+
; [[RecycleReader]] by [[Live-Forensics]]
+
: http://www.live-forensics.com/dl/RecycleReader.zip
+
: A command line tool that outputs the contents of the recycle bin on XP, Vista and 7.
+
 
+
; [[Dstrings]] by [[Live-Forensics]]
+
: http://www.live-forensics.com/dl/Dstrings.zip
+
: A command line tool that searches for strings in a given file.  It has the ability to compare the output of those strings against a dictionary to either exclude the dictionary terms in the output or only output files that match the dictionary.  It also has the ability to search for IP Addresses and URLs/Email Addresses.
+
 
+
; [[Unique]] by [[Live-Forensics]]
+
: http://www.live-forensics.com/dl/Unique.zip
+
: A command line tool similar to the Unix uniq. Allows for unique string counts, as well as various sorting options.
+
 
+
; [[HashUtil]] by [[Live-Forensics]]
+
: http://www.live-forensics.com/dl/HashUtil.zip
+
: HashUtil.exe will calculate MD5, SHA1, SHA256 and SHA512 hashes.  It has an option that will attempt to match the hash against the NIST/ISC MD5 hash databases.
+
 
+
; [http://www.windowsscope.com WindowsSCOPE Pro, Ultimate, Live]
+
: Comprehensive Windows Memory Forensics and Cyber Analysis, Incident Response, and Education support.
+
: Software and hardware based acquisition with [http://www.windowsscope.com/index.php?option=com_virtuemart&Itemid=34 CaptureGUARD PCIe and ExpressCard]
+
: Hardware based acquisition of memory on a locked computer via [http://www.windowsscope.com/index.php?page=shop.product_details&flypage=flypage.tpl&product_id=30&category_id=1&option=com_virtuemart&Itemid=34 CaptureGUARD Gateway]
+
: [http://www.windowsscope.com  WindowsSCOPE] Live provides memory analysis of Windows computers on a network from Android phones and tablets.
+
 
+
== Open Source Tools ==
+
 
+
; [[AFFLIB]]
+
: A library for working with [[disk image]]s. Currently AFFLIB supports raw, [[AFF]], [[AFD]], and [[EnCase]] file formats. Work to support segmented raw, [[iLook]], and other formats is ongoing.
+
 
+
; [[Autopsy]]
+
: http://www.sleuthkit.org/autopsy/desc.php
+
 
+
; [[Bulk Extractor]]
+
: https://github.com/simsong/bulk_extractor/wiki
+
: Bulk Extractor provides digital media triage by extracting Features from digital media.
+
 
+
; [[Bulk Extractor Viewer]]
+
: https://github.com/simsong/bulk_extractor/wiki/BEViewer
+
: Bulk Extractor Viewer is a browser UI for viewing Feature data extracted using [[Bulk Extractor]].
+
 
+
; [[Digital Forensics Framework]] (DFF)
+
: DFF is cross-platform and open-source, user and developers oriented. It provide many features and is very modular. Our goal is to provide a powerful framework to the forensic community, so people can use only one tool during the analysis. http://www.digital-forensic.org
+
 
+
; [[foremost]]
+
: http://foremost.sf.net/
+
: [[Linux]] based file carving program
+
 
+
; [[FTimes]]
+
: http://ftimes.sourceforge.net/FTimes/index.shtml
+
: FTimes is a system baselining and evidence collection tool.
+
 
+
; [[gfzip]]
+
: http://www.nongnu.org/gfzip/
+
 
+
; [[gpart]]
+
: http://www.stud.uni-hannover.de/user/76201/gpart/
+
: Tries to ''guess the primary partition table of a PC-type hard disk in case the primary partition table in sector 0 is damaged, incorrect or deleted''.
+
 
+
; [[Hachoir]]
+
: A generic framework for binary file manipulation, it supports [[FAT12]], [[FAT16]], [[FAT32]], [[ext2|ext2/ext3]], Linux swap, MSDOS partition header, etc. Recognize file type. Able to find subfiles (hachoir-subfile).
+
 
+
; [[magicrescue]]
+
: http://jbj.rapanden.dk/magicrescue/
+
 
+
; The [[Open Computer Forensics Architecture]]
+
: http://ocfa.sourceforge.net/
+
 
+
; [[pyflag]]
+
: http://code.google.com/p/pyflag/
+
: Web-based, database-backed forensic and log analysis GUI written in Python.
+
 
+
; [[Scalpel]]
+
: http://www.digitalforensicssolutions.com/Scalpel/
+
: [[Linux]] and [[Windows]] file carving program originally based on [[foremost]].
+
 
+
; [[scrounge-ntfs]]
+
: http://memberwebs.com/nielsen/software/scrounge/
+
 
+
; [[Sleuthkit]]
+
: http://www.sleuthkit.org/
+
 
+
; [[The Coroner's Toolkit]] ([[TCT]])
+
: http://www.porcupine.org/forensics/tct.html
+
 
+
== [[NDA]] and [[scoped distribution]] tools ==
+
 
+
= Enterprise Tools (Proactive Forensics)=
+
 
+
; [[LiveWire Investigator 2008]] by [[WetStone Technologies]]
+
: http://www.wetstonetech.com/f/livewire2008.html
+
 
+
; [[P2 Enterprise Edition]] by [[Paraben]]
+
: http://www.paraben-forensics.com/enterprise_forensics.html
+
 
+
= Forensics Live CDs =
+
; [[Kali Linux]]
+
: [http://www.kali.org/ http://www.kali.org/]
+
 
+
; [[KNOPPIX]]
+
: [http://www.knopper.net/knoppix/index-en.html http://www.knopper.net/knoppix/index-en.html]
+
 
+
; [[BackTrack Linux]]
+
: [http://www.backtrack-linux.org/ http://www.backtrack-linux.org/]
+
 
+
See: [[:Category:Live CD|Forensics Live CDs]]
+
 
+
= Personal Digital Device Tools=
+
 
+
== GPS Forensics ==
+
 
+
; [[Blackthorn GPS Forensics]]
+
; [[.XRY]]
+
 
+
== PDA Forensics ==
+
; [[Cellebrite UFED]]
+
; [[.XRY]]
+
; [[Paraben PDA Seizure]]
+
; [[Paraben PDA Seizure Toolbox]]
+
; [[PDD]]
+
 
+
== Cell Phone Forensics ==
+
; [[BitPIM]]
+
; [[Cellebrite UFED]]
+
; [[DataPilot Secure View]]
+
; [[.XRY]]
+
: http://www.msab.com/index
+
; [[Fernico ZRT]]
+
; [[ForensicMobile]]
+
; [[LogiCube CellDEK]]
+
; [[MOBILedit!]]
+
; [[Oxygen Forensic Suite 2010]]
+
: http://www.oxygen-forensic.com
+
; [[Paraben's Device Seizure]] and [[Paraben's Device Seizure Toolbox]]
+
: http://www.paraben-forensics.com/handheld_forensics.html
+
; [[Serial Port Monitoring]]
+
; [[TULP2G]]
+
 
+
== SIM Card Forensics ==
+
; [[Cellebrite UFED]]
+
; [[.XRY]]
+
; [[ForensicSIM]]
+
; [[Paraben's SIM Card Seizure]]
+
: http://www.paraben-forensics.com/handheld_forensics.html
+
; [[SIMCon]]
+
 
+
== Preservation Tools ==
+
; [[Paraben StrongHold Bag]]
+
; [[Paraben StrongHold Tent]]
+
 
+
= Other Tools =
+
; Chat Sniper
+
: http://www.alexbarnett.com/chatsniper.htm
+
:  A forensic software tool designed to simplify the process of on-scene evidence acquisition and analysis of logs and data left by the use of AOL, MSN (Live), or Yahoo instant messenger.
+
 
+
; Computer Forensics Toolkit
+
: http://computer-forensics.privacyresources.org
+
: This is a collection of resources, most of which are informational, designed specifically to guide the beginner, often in a procedural sense.
+
 
+
; Live View
+
: http://liveview.sourceforge.net/
+
: Live View is a graphical forensics tool that creates a [[VMware]] [[virtual machine]] out of a dd disk image or physical disk.
+
 
+
; Parallels VM
+
: http://www.parallels.com/
+
: http://en.wikipedia.org/wiki/Parallels_Workstation
+
 
+
; Microsoft Virtual PC
+
: http://www.microsoft.com/windows/products/winfamily/virtualpc/default.mspx
+
: http://en.wikipedia.org/wiki/Virtual_PC
+
 
+
; [[VMware]] Player
+
: http://www.vmware.com/products/player/
+
: http://en.wikipedia.org/wiki/VMware#VMware_Workstation
+
: A free player for [[VMware]] [[virtual machine]]s that will allow them to "play" on either [[Windows]] or [[Linux]]-based systems.
+
 
+
; [[VMware]] Server
+
: http://www.vmware.com/products/server/
+
: The free server product, for setting up/configuring/running [[VMware]] [[virtual machine]].Important difference being that it can run 'headless', i.e. everything in background.
+
 
+
; Webtracer
+
: http://www.forensictracer.com
+
: Software for forensic analysis of internet resources (IP address, e-mail address, domain name, URL, e-mail headers, log files...)
+
 
+
== Hex Editors ==
+
 
+
; [[biew]]
+
: http://biew.sourceforge.net/en/biew.html
+
 
+
; [[Okteta]]
+
: KDE's new cross-platform hex editor with features such as signature-matching
+
: http://utils.kde.org/projects/okteta/
+
 
+
; [[hexdump]]
+
: ...
+
 
+
; [[HexFiend]]
+
: A hex editor for Apple OS X
+
: http://ridiculousfish.com/hexfiend/
+
 
+
; [[Hex Workshop]]
+
: A hex editor from [[BreakPoint Software, Inc.]]
+
: http://www.bpsoft.com
+
 
+
; [[khexedit]]
+
: http://docs.kde.org/stable/en/kdeutils/khexedit/index.html
+
 
+
; [[WinHex]]
+
: Computer forensics software, data recovery software, hex editor, and disk editor from [[X-Ways]].
+
: http://www.x-ways.net/winhex
+
 
+
; [[wxHexEditor]]
+
: A Multi-OS supported, open sourced, hex and disk editor.
+
: http://www.wxhexeditor.org
+
 
+
; [[xxd]]
+
: ...
+
 
+
; [[HexReader]]
+
: [[Live-Forensics]] software that reads windows files at specified offset and length and outputs results to the console.
+
: http://www.live-forensics.com/dl/HexReader.zip
+
 
+
= Telephone Scanners/War Dialers =
+
 
+
;PhoneSweep
+
:http://www.sandstorm.net/products/phonesweep/
+
:PhoneSweep is a commercial grade multi-line wardialer used by many security auditors to run telephone line scans in their organizations. PhoneSweep Gold is the distributed-access add-on for PhoneSweep, for organizations that need to run scans remotely.
+

Revision as of 14:07, 12 June 2014

Information icon.png

Please help to improve this article by expanding it.
Further information might be found on the discussion page.

Apple Inc.'s Macintosh OS X (pronounced "OS Ten") is the operating system distributed with Apple computers. It includes heavily used several programs by default, including Apple Mail, a web browser called Safari, and an Apple Address Book, and iCal.

Disk image types

Mac OS X has support for various disk image types build-in, some of which are:

Burn Folder

Mac OS X Burn Folder:

$NAME.fpbf

This folder normally contains alias files (similar to LNK files under Windows). Which should have the following signature.

00000000  62 6f 6f 6b 00 00 00 00  6d 61 72 6b 00 00 00 00  |book....mark....|

These alias files contain additional date and time values.

Also check the following files for references to deleted .fpbf paths:

/Users/$USERNAME/Library/Preferences/com.apple.finder.plist
/Users/$USERNAME/Library/Preferences/com.apple.sidebarlists.plist

Actual burning of optical media is logged in:

/var/log/system.log
/Users/$USERNAME/Library/Logs/DiscRecording.log
/private/var/.logs_exporter/cache/Users/$USERNAME/Library/Logs/DiscRecording.log

HFS/HFS+ date and time values

In HFS+ date and time values are stored in an unsigned 32-bit integer containing the number of seconds since January 1, 1904 at 00:00:00 (midnight) UTC (GMT). This is slightly different from HFS where the date and time value are stored using the local time. The maximum representable date is February 6, 2040 at 06:28:15 UTC (GMT). The date values do not account for leap seconds. They do include a leap day in every year that is evenly divisible by four. This is sufficient given that the range of representable dates does not contain 1900 or 2100, neither of which have leap days. Also see: Technical Note TN1150 - HFS Plus Volume Format

Converting HFS/HFS+ date and time values with Python:

import datetime

print datetime.datetime( 1904, 1, 1 ) + datetime.timedelta( seconds=0xCBDAF25B )

Launch Agents

/System/Library/LaunchAgents/

Launch Daemons

/Library/LaunchDaemons/
/System/Library/LaunchDaemons/

Startup Items

/Library/StartupItems/
/System/Library/StartupItems/

Crash Reporter

/Library/Application Support/CrashReporter

Diagnostic Reports

/Library/Logs/DiagnosticReports

Quarantine event database

See [1]

Snow Leopard and earlier

/Users/$USER/Library/Preferences/com.apple.LaunchServices.QuarantineEvents
SELECT datetime(LSQuarantineTimeStamp + 978307200, "unixepoch") as LSQuarantineTimeStamp, LSQuarantineAgentName, LSQuarantineOriginURLString, LSQuarantineDataURLString from LSQuarantineEvent;

Lion and later

/Users/$USER/Library/Preferences/com.apple.LaunchServices.QuarantineEventsV2

sleepimage

This file is similar to the hibernation file on Windows.

/private/var/vm/sleepimage

Also see: [2]

Package Files (.PKG)

Package Files (.PKG) are XAR archives [3] that contain a cpio archive and metadata [4].

Also see

Formats

External Links

Apple Examiner

iCloud