David Martin describes how to use OSX as a forensic platform

David Martin describes how to use OSX as a forensic platform


https://www.sans.org/reading-room/whitepapers/apple/os-forensic-platform-37637

Abstract: The Apple Macintosh and its OS X operating system have seen increasing adoption by technical professionals, including digital forensic analysts. Forensic software support for OSX remains less mature than that of Windows or Linux. While many Linux forensic tools will work on OS X, instructions for how to configure the tool in OS X are often missing or confusing. OS X also lacks an integrated package management system forcommand line tools. Python, which serves as the basis for many open-source forensic tools, can be difficult to maintain and easy to misconfigure on OS X.

Due to these challenges, many OS X users choose to run their forensic tools from Windows or Linux virtual machines.While this can be an effective and expedient solution, those users miss out on the much of the power of the Macintosh platform.

This research will examine the process of configuring a native OS X forensic environment that includes many open source forensic tools, including Bulk Extractor, Plaso, Rekall, Sleuthkit, Volatility and Yara.This process includes choosing the correct hardware and software, configuring it properly, and overcoming some of the unique challenges of the OSX environment. A series of performance tests will help determine the optimal hardware and software configuration and examine the performance impact of virtualization options


Ben Strother, CISSP

Cybersecurity expert building a safer Internet

8 年

Great paper. Well done David M. Martin, and thanks for sharing it Stephen Northcutt

回复

要查看或添加评论,请登录

Stephen Northcutt的更多文章

  • Surreality, is an AI powered art movement that is similar to Surrealism inevitable?

    Surreality, is an AI powered art movement that is similar to Surrealism inevitable?

    When I see an image like a Mona Lisa with the head of a cat, I often think that looks like Surrealism or Dadaism…

  • Amazon S3 Security Step-by-Step

    Amazon S3 Security Step-by-Step

    Bucket Policies and Defense-in-Depth: Amazon S3 Excellent paper by Rajat Ravinder Varuni and Rafael Marcelino Koike. I…

    9 条评论
  • Open letter to Chrysler from a customer

    Open letter to Chrysler from a customer

    5/30/18 I am now the owner of a Pacifica hybrid, limited van. It has been a journey of over 6 weeks dealing with…

    12 条评论
  • Please contribute 30 minutes to an open voice project

    Please contribute 30 minutes to an open voice project

    I am going to share some thoughts about smart speakers, personal assistants, voice activated assistants, whatever you…

    4 条评论
  • Common Sense Privacy: Browsers

    Common Sense Privacy: Browsers

    Browsers track your web surfing activities and report them to large corporations. You already know that, probably…

    2 条评论
  • Please participate in the SANS Threat Landscape Survey

    Please participate in the SANS Threat Landscape Survey

    What Threats Keep You Up at Night? Tell Us in the SANS 2017 Threat Landscape Survey The intent of this survey is to…

  • Stretch out payments at SANS.EDU

    Stretch out payments at SANS.EDU

    Students Now Have More Reimbursement Options for SANS Graduate Degree Programs ? Students may qualify for new funding…

    10 条评论
  • John Pescatore Analyst Paper 2017 Trends

    John Pescatore Analyst Paper 2017 Trends

    This is a link to it, https://www.sans.

    2 条评论
  • Cyberdefense - COIN Doctrine

    Cyberdefense - COIN Doctrine

    This was a new one for me, the COIN doctrine for cyber defense: https://www.sans.

    2 条评论
  • First time SANS NetWars - Bryan Inagaki

    First time SANS NetWars - Bryan Inagaki

    This is an interview with one of the folks that took on SANS NetWars for the first time, none other than Linkedin's…

    3 条评论

社区洞察

其他会员也浏览了