Preview

Mac Forensics

Powerful Essays
Open Document
Open Document
6453 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Mac Forensics
Mac Forensics: Mac OS X and the HFS+ File System
Philip Craiger, PhD
Assistant Director for Digital Evidence
National Center for Forensic Science &
Department of Engineering Technology
University of Central Florida philip@craiger.net Paul K. Burke
Senior Digital Evidence Research Assistant
National Center for Forensic Science paulkburke@gmail.com ABSTRACT
There are few resources that describe a forensics analysis of an Apple Mac computer. The purpose of this paper is describe procedures to conduct a forensics examination of an Apple Mac running the newest operating system, Mac OS X, and its default file system, the Hierarchical File System Plus (HFS+). Our chapter is divided into four sections. In the first we demonstrate Target Disk Mode to create a forensic duplicate of a Mac hard drive and an on-site preview of a suspect’s computer. In the second we describe the HFS+ file system and describe the data structures used to represent files and are important in the recovery of deleted files. In the third section we describe several procedures one can use to recover evidence at a physical level to recover evidence from unallocated, slack space, and virtual memory. Finally, we describe methods to recover trace evidence from Mac OS X default email, web browser, and instant messaging applications, as well as forensic procedures to recover commands issued from a terminal window.
Keywords: Mac OS X, Mac OS X forensics, digital forensics, computer forensics.

Mac Forensics: Mac OS X and the HFS+ File System
The Apple Macintosh (or Mac) was first introduced to the public in 1984. Since then it has an enjoyed a small, albeit vocal, user base – typically somewhere between 3 and 8% of the installed operating system base. It is not surprising then that there has been very little published regarding digital forensics on Macintosh computers.

To

partially rectify this lack of information in this chapter we present an introduction to
forensics



References: (Eds.), Advances in Digital Forensics. International Association of Information Processing, 2005. (http://developer.apple.com/technotes/tn/tn1150.html), 2004. (http://support.microsoft.com/default.aspx?scid=kb;en-us;136517&Product=w95), 2004. (http://filext.com/detaillist.php?extdetail=.ds_store), 2003. Programs. Submitted to the International Conference on Digital Forensics 11.9, 2005. (http://www.faqs.org/rfcs/rfc4155.html), 2005. (http://developer.apple.com/macosx/spotlight.html), 2005.

You May Also Find These Documents Helpful

  • Good Essays

    Patterns for individualization are characteristics that can be unique among the members of their class. This means that we could possible match a tire mark to a particular tire or a shoe print to a sole this could prove invaluable to investigators. Reviewing the evidence pictures both would by considered impressions they have both left imprints in the soil. I will discuss the type of individualized patterns of both pictures and how one would preserve this type of evidence. Lastly, what type of information can be collected from these types of evidence.…

    • 676 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Forensic Science 9.07 lab

    • 365 Words
    • 2 Pages

    1. The best choice of a technique when blood is found at a crime scene is analyzing the blood. In the genetics laboratory the person who contributes I would say is Alec Jeffreys as he is known as the father of genetic profiling.…

    • 365 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Forensic 10.07

    • 842 Words
    • 3 Pages

    What is a questioned document? Describe at least one example of something that might be a questioned document.…

    • 842 Words
    • 3 Pages
    Good Essays
  • Good Essays

    6.07 Forensics

    • 287 Words
    • 2 Pages

    2. It is important because it is society that scientists can out together, they have what they need.…

    • 287 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Movie Analysis: Fly Boys

    • 657 Words
    • 3 Pages

    As World War I rages in Europe and Allied forces in France, Italy, and England find their resolve quickly diminishing due to the overwhelming force of the German juggernaut, a handful of brave American soldiers volunteer to join their French counterparts in learning to fly and fighting for freedom from above as the true story of the legendary Lafayette Escadrille comes to the screen in a breathtaking war adventure from Academy Award-winning director Tony Bill and famed producer Dean Devlin. They have come from all over the United States, ready and willing to put their lives on the line despite their country's initial pledge to not get involved with the all-consuming war that rages throughout Europe. Few could have foreseen the challenges faced by the world's first fighter pilots, however, and upon arriving at their aerodrome in France, the aspiring aviators are assigned to a new squadron…

    • 657 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Unit1 Forensics

    • 363 Words
    • 2 Pages

    1.) Club drugs are synthetic drugs that are typically used in bars, nightclubs, and raves. They are small and easy to conceal and are thought to improve or enhance one's experience.…

    • 363 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Forensic Science Unit 4

    • 391 Words
    • 2 Pages

    What are the three types of fingerprints found in the human population? How often does each occur?…

    • 391 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    forensics

    • 449 Words
    • 2 Pages

    What physical evidence did you find at the victim’s home? A box of matches, a space heater, beer bottles, Natalie’s wallet, a V-shaped burn pattern, burned outlet, a protected surface on the ground, crazed glass, and a puddle-shaped burn pattern.…

    • 449 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Forensic Science 1.06

    • 658 Words
    • 2 Pages

    Analyzes bodies that haven been in disasters fires, explosions, plane crashes, in general bodies burnt or mutilated.…

    • 658 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    After the preservation phase, forensics are required to locate and identify any evidence that can be used to aid the crime case. There are several locations where evidence are usually found such as in the hard drive on the user’s personal computer, laptop, smart phone or tablet (ACPO, 2012). It is also critical that forensics are aware of the intention of the particular investigation. This aids in the forensics' efforts of locating digital evidences that are relevant to the case. For example, in the case of a server intrusion, forensics should look out for signs such as a rootkit installation, analyze configuration files, logs files and etc. These are possible locations and processes where traces of evidence can be picked out from (Carrier and Spafford, 2003).…

    • 257 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    forensic

    • 266 Words
    • 1 Page

    3. Section 404 of the Sarbanes-Oxley Act requires companies to perform self-assessments of risks for business processes that affect financial reporting.…

    • 266 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    Forensic Investigations

    • 1177 Words
    • 5 Pages

    Dr. Edmond Locard’s Exchange Principle states, “Any action of an individual, and obviously the violent action constituting a crime, cannot occur without leaving a trace.” It is hard to say Locard’s Exchange Principle was not disregarded. After three months of expert investigation it was found that the DNA evidence that was discovered at the scene did not belong to Jennifer or Noura. Also Noura’s own DNA was not found at all at the scene of the crime. It is very hard to understand how Noura could have made extreme violent contact with her mother and not left any fingerprints, footprints, hair, skin cells, blood, bodily fluids, pieces of clothing or fibers behind. This lack of traces evidence sets off two different paths in my mind. One way leads you down a road of pure hatred for a parent. Everyone was felt this way one time or another in their life, where a disagreement or argument over something that is usually aimed at protecting the youth, leads to a massive outburst or feeling of rage, that is always immediately followed by guilt or remorse by a normal human being. But what happens when this rage affects a “not so normal” child. One with malice aforethought, that is just so tired of being controlled that they premeditate a murder and thoroughly clean any trace of evidence. The other path is the road Noura’s defense took. She is irrefutably innocent and Jennifer’s killer/killers are still on the loose.…

    • 1177 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    The improvement in technology is one of the concerns that is both an advantage and an adversity if it lies on the wrong hands in the current and contemporary world. Over the years, the solution to ensuring maximum supervision and regulation to avoid its application in the infringement of individual rights has been debated across numerous legal conferences globally. This understanding brought…

    • 1025 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Phone

    • 3477 Words
    • 14 Pages

    Abstract - There are times during the examination of CDMA cell phones where the available phone forensics tools do not allow the forensic examiner/analyst to extract the data they need from the device. At other times, the available tools may allow the forensic examiner/analyst to extract the full file system of a CDMA phone, but data contained in the file system is encoded in a proprietary manner and cannot be decoded using forensic tools such as EnCase or FTK. Additionally, there are a number of situations that might preclude a forensic examiner/analyst from using a camera to document the data on a phone, such as when the phone’s LCD screen is broken, the phone itself is broken, or the forensic examiner/analyst wishes to avoid physical manipulation of the phone to the extent possible during the examination. The CDMA Fraternal Clone method will allow the forensic examiner/analyst to transfer all user-created files and current settings from one CDMA phone into another phone, so that the target phone (CDMA Fraternal Clone) can be examined. The CDMA Fraternal Clone is used as a means to view the user created data and settings from the original phone in their native format allowing the forensic examiner/analyst to view and work with the extracted data in a way that emulates the original phone. Index Terms - CDMA Cell Phone, CDMA Clone, Mobile Phone, BitPim, broken cell phone, broken mobile phone, Mobile Phone Forensics, Cell Phone Forensics, Cell Phone Forensics Techniques, CDMA, ESN, MIN, CDMA Protected Files…

    • 3477 Words
    • 14 Pages
    Good Essays
  • Best Essays

    log files

    • 2845 Words
    • 12 Pages

    2013 Third International Conference on Intelligent System Design and Engineering Applications A Log-based Approach to Make Digital Forensics Easier on Cloud Computing Ting Sang Shanghai Jiao Tong University, Shanghai, 200240, China. saintogod@gmail.com…

    • 2845 Words
    • 12 Pages
    Best Essays