Mac MarshalTM: A Tool for Mac OS X Operating System and Application Forensics
نویسندگان
چکیده
Computer forensic tools for Apple Mac hardware have traditionally focused on low-level file system details. Mac OS X and common applications on the Mac platform provide an abundance of information about the user’s activities in configuration files, caches, and logs. We have developed Mac MarshalTM, an extensible tool suite for the analysis of files on Mac OS X disk images. Mac Marshal provides simple access to Spotlight metadata maintained by the operating system, yielding efficient file content search and exposing metadata such as digital camera make and model. It can also help investigators assess FileVault encrypted home directories. Mac Marshal support modules interpret files written by common Mac OS applications such as Safari, Mail, and iTunes.
منابع مشابه
Mac OS X persistent evidences for forensics purposes
Computer forensics is a discipline focused on obtaining evidences that provide a clue about how, when and who did an action over an asset. This is important in the event of attacks from intruders and malware. However, no open source forensics tools have been developed to extract the Mac OS X file persistent evidences, despite recent trend of malwares and attacks on the operating system and appl...
متن کاملAbout the Integration of Mac OS X Devices into a Centrally Managed UNIX Environment
The UNIX flavors in use today have so much in common that centralized management of UNIX systems has become almost standard. Since Mac OS X is based on BSD-UNIX it is a promising candidate for integration into a centrally managed UNIX environment. Starting from generic administration concepts, this paper develops an integrated management concept that handles fully automated installation and con...
متن کاملAn Evaluation of Windows-Based Computer Forensics Application Software Running on a Macintosh
The two most common computer forensics applications perform exclusively on Microsoft Windows Operating Systems, yet contemporary computer forensics examinations frequently encounter one or more of the three most common operating system environments, namely Windows, OS-X, or some form of UNIX or Linux. Additionally, government and private computer forensics laboratories frequently encounter budg...
متن کاملOn the Viability of Memory Forensics in Compromised Environments
Memory forensics has become a powerful tool for the detection and analysis of malicious software. It provides investigators with an impartial view of a system, exposing hidden processes, threads, and network connections, by acquiring and analyzing physical memory. Because malicious software must be at least partially resident in memory in order to execute, it cannot remove all its traces from R...
متن کامل