Skip to main content

Macintosh Forensic Analysis Using OS X

Computer forensic analysis is a method of studying and acquiring digital evidence in a manner that ensures the data's integrity. The duty to perform such an analysis often falls upon a police officer in his quest to gather valuable evidence of a crime. Sometimes, however, system administrators and security professionals are required to partake in such functions when they suspect that someone has tampered with their system. The ability to do a proper analysis using sound forensic practices that are accepted in a court of law, opens the door to the possibility of pursuing criminal or civil action against the perpetrator. The purpose of this paper is to describe sound forensic techniques as they pertain to the Macintosh. In order to accomplish this task, I must first describe basic forensic techniques that apply to all computer systems. Then I will provide a brief history of the various Macintosh models and operating systems, as each one can provide some intriguing problems. Finally, I will follow this up with a specific outline of how to perform the proper analysis of a Macintosh computer system using an OS X based system as the analysis machine. The result of this paper will be a useful reference to those people who may be required to perform a computer forensic analysis on a Macintosh.

269 (PDF, 1.65MB)

8 Oct 2002
ByPeter Hawkins
Share
All papers are copyrighted

No re-posting of papers is permitted

Related Content

Threat Intelligence-Driven Attack Surface Management

Research Paper

Defenders struggle to keep up with the pace of digital transformation in the face of an expanding...

  • 9 Aug 2022

How to Build and Use an Incident Response Playbook Effectively

Research Paper

An effective incident response playbook provides structure and clarity during high-pressure security events.

  • 25 Jul 2022

Windows 10 vs. Windows 11, What Has Changed?

Research Paper

Windows 10 was released on July 29, 2015. It has since become the most installed desktop operating...

  • 25 Jul 2022

Malware Function-based encryption technique

Research Paper

Recent malware often uses techniques to evade detection by cybersecurity products. One of the...

  • 22 Jun 2022

Detecting Unauthorized Behavior From Legitimate Accounts

Research Paper

Incident Responders face an almost insurmountable amount of log events, and the move to the Cloud...

  • 22 Jun 2022

Recommendations for small/medium-sized businesses enabling incident response

Research Paper

Security incidents are inevitable. While large businesses can afford security teams to prepare and...

  • 17 Jan 2022

Cloud Forensics Triage Framework (CFTF)

Research Paper

Digital media forensic investigations come in multiple forms and span single assets - from thumb...

  • 28 Jul 2021

EDR Evasion: Stranger things in a payload

Research Paper

Tackling enterprise security has many pitfalls. Yet, the emergence of Endpoint Detection & Response...

  • 28 Jul 2021

CIS CSC Controls vs. Ransomware: An Evaluation

Research Paper

Cybercriminals continue to develop and enhance both new and existing ransomware variants, exploiting...

  • 19 May 2021

Missing SQLite Records Analysis

Research Paper

This article will specifically discuss the identification of missing records, within the SQLite...

  • 12 Mar 2021
  • Ian Whiffin

Insider Threat The Theft of Intellectual Property in Windows 10

Research Paper

The prevalence of the theft of intellectual property investigations has grown over the past years...

  • 11 Mar 2021

A Forensic Analysis of the Encrypting File System

Research Paper

EFS or the Encrypting File System is a feature of the New Technology File System (NTFS). EFS...

  • 24 Feb 2021

Tactical Linguistics: Language Analysis in Cyber Threat Intelligence

Research Paper

The capability to effectively collect and analyze data in strategic foreign languages when...

  • 15 Jan 2021

Practical Process Analysis - Automating Process Log Analysis with PowerShell

Research Paper

Windows event log analysis is an important and often time-consuming part of endpoint forensics. Deep...

  • 29 Dec 2020

Incident Response in a Security Operation Center

Research Paper

Cybercrime dates back to the late 1700s and remains a threat today. By observing current threats,...

  • 27 Aug 2020

Applying the Scientific Method to Threat Hunting

Research Paper

Threat hunting is a proactive approach to discover attackers within an organization. Without the use...

  • 28 May 2020

Tips and Scripts for Reconnaissance and Scanning

Research Paper

Nowadays, information is the key to success. Pentesters' and bounty hunters' first step is to...

  • 12 Feb 2020

Threat Hunting and Incident Response in a post-compromised environment

Research Paper

If you give an attacker 100 days to move freely in your compromised environment, the evidence is...

  • 3 Dec 2019

Exploring the Human Fingerprints on Malware

Research Paper

Much of the focus of cyber threat intelligence is countering adversaries and the tools and...

  • 22 Nov 2019
  • SANS Institute

The Value of Contemporaneous Notes and Why They Are a Requirement for Security Professionals

Research Paper

Contemporaneous notes, or notes taken as soon as practicable after an event or action takes place, are invaluable to analysts in security roles performing activities such as digital forensics and incident response.

  • 30 Sep 2019
  • Seth Enoka

Subscribe to GIAC’s Monthly Newsletter

Receive expert insights, priority access to certifications, essential updates on regulatory changes and industry developments.