macOS Forensics Artifacts
macOS Forensics Artifacts
This room builds upon the knowledge gained from the “macOS Forensics: The Basics” room, diving deeper into the forensic artifacts present in macOS systems and how to analyze them effectively.
Task 1: Introduction
To mount the provided disk image, we use the apfs-fuse
command:
1
apfs-fuse -v 4 mac-disk.img ~/mac
Task 2: Before We Begin
For parsing plist files in macOS, we can use the plistutil
utility.
Task 3: System Information
OS Installation Date
The OS was installed on: 2024-12-08 17:42:28 GMT
Country Code
The machine’s country code is: AE
Last Boot Time
The last system boot occurred at: 2025-01-19 15:47:05 GMT
Task 4: Network Information
Network Interface
The built-in network interface is: en0
Router IP
The last connected router’s IP address was: 192.168.64.1
Task 5: Account Activity
Last Logged-in User
Username: thm
Password Hint
The password hint is: count to 5
Last Logout
The last user logout occurred at: Jan 19 07:52:43
Task 6: Evidence of Execution
Last Command
The last executed command was: vim creds.txt
Terminal Session GUID
Session GUID: 452AEA93-AEE7-420B-871E-C57053E15DD0
Terminal Closure
The terminal was last closed at: 2025-01-19 15:52:33
Terminal Focus Duration
The terminal was in focus for: 176
seconds
Task 7: File System Activity
Users/thm Folder View
Viewing options: Open in list view
Last Finder Directory
Last visited directory: Recents
Task 8: Connected Devices
Bluetooth Information
The relevant stream in the knowledgeC database is: Bluetooth/isConnected
Task 9: Conclusion
This room provided valuable insights into macOS forensic artifacts and their analysis. Understanding these artifacts is crucial for effective digital forensics investigations on macOS systems.