An Introduction to macOS Forensics with Open Source Software
Abstract
There are only fewer open-source tools available for macOS forensics compared with Windows, but some are practical in the actual analysis. One such tool is mac_apt.
mac_apt is developed as an open-source forensic analysis framework for macOS and enables analysis of various artifacts with more than 40 plugins. With its own file system parsers (HFS+ and APFS), it analyzes disk images without mounting them, regardless of the OS. This user-friendly tool performs an analysis by simply specifying a disk image. Nevertheless, not so much detailed instruction on how to comprehend the analysis results is publicly available. It is therefore especially difficult for beginners of macOS forensics to analyze effectively without prior knowledge of what kind of artifacts exist and how they are stored in the analysis results.
This workshop will begin with explaining the basics of macOS forensics and artifacts and share the know-how with hands-on using the mac_apt analysis result of a disk image created based on a simple scenario of malware infection.
The analysis focuses on Intel macOS as the lecturer does not own a Mac with Apple Silicon, and the malware sample is an Intel binary. However, the knowledge can be applied to Apple Silicon macOS as well.
Speaker
Minoru Kobayashi
Requirements
- A laptop PC
- Virtualization software (VMware Workstation/Fusion, Paralles, etc.)
Advance Preparation
- VM that can run zsh (macOS or Linux)
- jq (https://stedolan.github.io/jq/)
- If you would like to conduct dynamic analysis, install on VM earlier than Intel version macOS 10.15.5. ProcessMonitor, FileMonitor (https://objective-see.com/products/utilities.html)
- DB Browser for SQLite (https://sqlitebrowser.org/)
Skills
- Experienced in basic digital forensics. ※
- Able to install and run OSS Python scripts (including installation of required libraries).
- Able to understand the content of a short script (Shell script, Python script) roughly in a short time.
※ EX: Familiar with the terms used in forensics (e.g. artifacts, persistence). Able to retrieve, mount and unmount disk images. Familiar with basic file system concepts. Able to use tools such as The Sleuth Kit to access files and metadata in a disk image. Able to use analysis tools to analyse disk images and artifacts.
Slides
Japanese
English
Hands-on Data
Data