Preview

Mac Forensics

Powerful Essays
Open Document
Open Document
6453 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Mac Forensics
Mac Forensics: Mac OS X and the HFS+ File System
Philip Craiger, PhD
Assistant Director for Digital Evidence
National Center for Forensic Science &
Department of Engineering Technology
University of Central Florida philip@craiger.net Paul K. Burke
Senior Digital Evidence Research Assistant
National Center for Forensic Science paulkburke@gmail.com ABSTRACT
There are few resources that describe a forensics analysis of an Apple Mac computer. The purpose of this paper is describe procedures to conduct a forensics examination of an Apple Mac running the newest operating system, Mac OS X, and its default file system, the Hierarchical File System Plus (HFS+). Our chapter is divided into four sections. In the first we demonstrate Target Disk Mode to create a forensic duplicate of a Mac hard drive and an on-site preview of a suspect’s computer. In the second we describe the HFS+ file system and describe the data structures used to represent files and are important in the recovery of deleted files. In the third section we describe several procedures one can use to recover evidence at a physical level to recover evidence from unallocated, slack space, and virtual memory. Finally, we describe methods to recover trace evidence from Mac OS X default email, web browser, and instant messaging applications, as well as forensic procedures to recover commands issued from a terminal window.
Keywords: Mac OS X, Mac OS X forensics, digital forensics, computer forensics.

Mac Forensics: Mac OS X and the HFS+ File System
The Apple Macintosh (or Mac) was first introduced to the public in 1984. Since then it has an enjoyed a small, albeit vocal, user base – typically somewhere between 3 and 8% of the installed operating system base. It is not surprising then that there has been very little published regarding digital forensics on Macintosh computers.

To

partially rectify this lack of information in this chapter we present an introduction to
forensics



References: (Eds.), Advances in Digital Forensics. International Association of Information Processing, 2005. (http://developer.apple.com/technotes/tn/tn1150.html), 2004. (http://support.microsoft.com/default.aspx?scid=kb;en-us;136517&Product=w95), 2004. (http://filext.com/detaillist.php?extdetail=.ds_store), 2003. Programs. Submitted to the International Conference on Digital Forensics 11.9, 2005. (http://www.faqs.org/rfcs/rfc4155.html), 2005. (http://developer.apple.com/macosx/spotlight.html), 2005.

You May Also Find These Documents Helpful

  • Good Essays

    Patterns for individualization are characteristics that can be unique among the members of their class. This means that we could possible match a tire mark to a particular tire or a shoe print to a sole this could prove invaluable to investigators. Reviewing the evidence pictures both would by considered impressions they have both left imprints in the soil. I will discuss the type of individualized patterns of both pictures and how one would preserve this type of evidence. Lastly, what type of information can be collected from these types of evidence.…

    • 676 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Forensic 10.07

    • 842 Words
    • 3 Pages

    What is a questioned document? Describe at least one example of something that might be a questioned document.…

    • 842 Words
    • 3 Pages
    Good Essays
  • Good Essays

    6.07 Forensics

    • 287 Words
    • 2 Pages

    2. It is important because it is society that scientists can out together, they have what they need.…

    • 287 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Unit1 Forensics

    • 363 Words
    • 2 Pages

    1.) Club drugs are synthetic drugs that are typically used in bars, nightclubs, and raves. They are small and easy to conceal and are thought to improve or enhance one's experience.…

    • 363 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Forensic Science Unit 4

    • 391 Words
    • 2 Pages

    What are the three types of fingerprints found in the human population? How often does each occur?…

    • 391 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    forensics

    • 449 Words
    • 2 Pages

    What physical evidence did you find at the victim’s home? A box of matches, a space heater, beer bottles, Natalie’s wallet, a V-shaped burn pattern, burned outlet, a protected surface on the ground, crazed glass, and a puddle-shaped burn pattern.…

    • 449 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Forensic Science 1.06

    • 658 Words
    • 2 Pages

    Analyzes bodies that haven been in disasters fires, explosions, plane crashes, in general bodies burnt or mutilated.…

    • 658 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    forensic

    • 266 Words
    • 1 Page

    3. Section 404 of the Sarbanes-Oxley Act requires companies to perform self-assessments of risks for business processes that affect financial reporting.…

    • 266 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    More work goes into a homicide investigation than what the media alludes to. Television shows like Law and Order, and CSI show an over glorified series of basic investigations as well as highly dramatic interrogation in which each homicide case is solved within a one-hour episode. In reality, a homicide investigation is 20 times more complex than what is aired on prime time television. Cases can take years to solve, and a large number remain open indefinitely. From start to finish, a homicide investigation begins when the first responder arrives on the scene, and ends when the perpetrator is placed behind bars.…

    • 1083 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    After the preservation phase, forensics are required to locate and identify any evidence that can be used to aid the crime case. There are several locations where evidence are usually found such as in the hard drive on the user’s personal computer, laptop, smart phone or tablet (ACPO, 2012). It is also critical that forensics are aware of the intention of the particular investigation. This aids in the forensics' efforts of locating digital evidences that are relevant to the case. For example, in the case of a server intrusion, forensics should look out for signs such as a rootkit installation, analyze configuration files, logs files and etc. These are possible locations and processes where traces of evidence can be picked out from (Carrier and Spafford, 2003).…

    • 257 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Forensic Investigations

    • 1177 Words
    • 5 Pages

    Dr. Edmond Locard’s Exchange Principle states, “Any action of an individual, and obviously the violent action constituting a crime, cannot occur without leaving a trace.” It is hard to say Locard’s Exchange Principle was not disregarded. After three months of expert investigation it was found that the DNA evidence that was discovered at the scene did not belong to Jennifer or Noura. Also Noura’s own DNA was not found at all at the scene of the crime. It is very hard to understand how Noura could have made extreme violent contact with her mother and not left any fingerprints, footprints, hair, skin cells, blood, bodily fluids, pieces of clothing or fibers behind. This lack of traces evidence sets off two different paths in my mind. One way leads you down a road of pure hatred for a parent. Everyone was felt this way one time or another in their life, where a disagreement or argument over something that is usually aimed at protecting the youth, leads to a massive outburst or feeling of rage, that is always immediately followed by guilt or remorse by a normal human being. But what happens when this rage affects a “not so normal” child. One with malice aforethought, that is just so tired of being controlled that they premeditate a murder and thoroughly clean any trace of evidence. The other path is the road Noura’s defense took. She is irrefutably innocent and Jennifer’s killer/killers are still on the loose.…

    • 1177 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Digital Forensics Paper

    • 1176 Words
    • 5 Pages

    Digital forensics is not a new phenomenon, therefore, why is it, still to this day, not considered a profession. As mentioned in the article, digital forensics has been around since the 1970s when the government first began to develop tools to investigate web based fraud (Losavio, Seigfried-Spellar, and Sloan, 2016). Social scientists have claimed that due to the progression digital forensics has received, such as, specialized knowledge; specialized training; work that is considered great value; credit emptor relations with clients; a code of ethics; cooperative relations with other members; high autonomy levels; and self regulation, since its original inception, that it is indeed a profession (Losavio, Seigfried-Spellar, and Sloan, 2016).…

    • 1176 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    The improvement in technology is one of the concerns that is both an advantage and an adversity if it lies on the wrong hands in the current and contemporary world. Over the years, the solution to ensuring maximum supervision and regulation to avoid its application in the infringement of individual rights has been debated across numerous legal conferences globally. This understanding brought…

    • 1025 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    Phone

    • 3477 Words
    • 14 Pages

    Abstract - There are times during the examination of CDMA cell phones where the available phone forensics tools do not allow the forensic examiner/analyst to extract the data they need from the device. At other times, the available tools may allow the forensic examiner/analyst to extract the full file system of a CDMA phone, but data contained in the file system is encoded in a proprietary manner and cannot be decoded using forensic tools such as EnCase or FTK. Additionally, there are a number of situations that might preclude a forensic examiner/analyst from using a camera to document the data on a phone, such as when the phone’s LCD screen is broken, the phone itself is broken, or the forensic examiner/analyst wishes to avoid physical manipulation of the phone to the extent possible during the examination. The CDMA Fraternal Clone method will allow the forensic examiner/analyst to transfer all user-created files and current settings from one CDMA phone into another phone, so that the target phone (CDMA Fraternal Clone) can be examined. The CDMA Fraternal Clone is used as a means to view the user created data and settings from the original phone in their native format allowing the forensic examiner/analyst to view and work with the extracted data in a way that emulates the original phone. Index Terms - CDMA Cell Phone, CDMA Clone, Mobile Phone, BitPim, broken cell phone, broken mobile phone, Mobile Phone Forensics, Cell Phone Forensics, Cell Phone Forensics Techniques, CDMA, ESN, MIN, CDMA Protected Files…

    • 3477 Words
    • 14 Pages
    Good Essays
  • Best Essays

    log files

    • 2845 Words
    • 12 Pages

    2013 Third International Conference on Intelligent System Design and Engineering Applications A Log-based Approach to Make Digital Forensics Easier on Cloud Computing Ting Sang Shanghai Jiao Tong University, Shanghai, 200240, China. saintogod@gmail.com…

    • 2845 Words
    • 12 Pages
    Best Essays