SlideShare a Scribd company logo
EXAMINING MAC FILE
STRUCTURES
Understanding Macintosh File Structures
• Current Mac OS X version 10.12
• Code-named Sierra
• Themed: Cats Yosemite MountainTheme
• MAC OS X is built on a core called Darwin
• Consists of a Berkeley Software Distribution (BSD) UNIX application layer
• With OS X, Macintosh moved to the Intel processor and became UNIX based
• Before OS X, Hierarchical File System (HFS)
• Files stored in nested directories (folders)
• Extended Format File System (HFS+)
• Introduced with MacOS 8.1
• Supports smaller file sizes on larger volumes, resulting in more efficient disk use
An Overview of Mac File Structures
• In Mac, a file consists of two parts:
• Data fork and resource fork
• The data fork typically contains data the user
creates, such as text or spreadsheets
• Applications also read and write to the data fork
• The resource fork typically contains data in a specific form, containing details such
as icon bitmaps, the shapes of windows, definitions of menus and their contents,
finder data, and application code.
• Stores file metadata and application information
• For example, a word processing file might store its text in the data fork, while storing
any embedded images in the same file's resource fork. Applications also read and write
to the data fork
An Overview of MacVolumes
• A volume is any storage medium used to store files
• It can be all or part of the storage media for hard disks
• Volumes have allocation and logical blocks
• Logical blocks cannot exceed 512 bytes
• Allocation blocks are a set of consecutive logical blocks
• Two end of file (EOF) descriptors
• Logical EOF
• Actual size of the file
• Physical EOF
• The number of allocation blocks for that file
An Overview of MacVolumes(cont.)
• Clumps
• Groups of contiguous allocation blocks
• Reduce fragmentation
• First two logical blocks, 0 and 1, as
boot blocks
• Master Directory Block (MDB) or
Volume Information Block (VIB)
• Stores all information about a volume
• Volume Control Block (VCB)
• Stores information from the MDB when
OS mounts
• Extents overflow file
• Stores any file information not in the
MDB or aVCB
• Catalog
• The listing of all files and directories on
the volume
• Maintains relationships between files
and directories
• B*-tree file system in earlier Mac
version
• Actual file data is stored on the leaf
nodes
• B*-tree also uses header, index, and
map nodes
Forensics Procedures in Mac
• There are some differences between Linux and Mac OS X file systems
• Linux has the /home/username and /root directories
• In Mac, the folders are /users/username and /private/var/root
• The /home directory exists in the Mac OS but it is empty
• Mac users have limited access to other user accounts’ files and the guest account is
disabled
• For forensics procedures in Mac OS X:
• You must know where file system components are located and how both files and file
components are stored
Key Mac Files
• Application settings are in three formats:
• Plaintext, plist files, and the SQLite database
• Plist files are preference files for installed applications on a system
• FileVault is used to encrypt and decrypt a user’s /users directory
• Keychains
• Files used to manage passwords for applications,Web sites,Wi-Fi, Remote desktop, and
other system files
• Deleted files are in theTrashes folder
• If a file is deleted at the command line, however, it doesn’t show up in the trash
MacintoshAcquisition Methods
• Make an image of the drive
• Static acquisition of the suspect drive is preferable to a live acquisition
• Removing the drive from a Macintosh Mini’s CPU case is difficult
• Attempting to do so without Apple factory training could damage the computer
• Use a Macintosh-compatible forensic boot CD to make an image
• MacQuisition is a forensic boot CD that makes an image of a Macintosh drive
• Being able to turn off the auto mount function in OS X (disable Disk Arbitration)
• Allows you to connect a suspect drive to a Macintosh Forensic workstation without a write-
blocking device, ie Linux vs.Windows
Macintosh ForensicTools andVendors
• BlackBagTechnologies Macintosh Forensic Software (OS X only)
• Acquisition products specifically designed for OS 9 and earlier
• As well as OS X
• SubRosaSoft MacForensicsLab (OS X only)
• Guidance EnCase
• X-Ways Forensics
• AccessData FTK
Summary
• Before Mac OS X, the file systems HFS and HFS+ were used
• In Mac, a file consists of two parts: a data fork and a resource fork
• A volume is any storage medium used to store files
• Plist files are files for installed applications on a Mac system
• The biggest challenge in acquiring images from Mac systems is often physical
access to the drive
• Linux forensic tools are often free
Ad

More Related Content

What's hot (20)

Linux command ppt
Linux command pptLinux command ppt
Linux command ppt
kalyanineve
 
Cloud testing
Cloud testingCloud testing
Cloud testing
Khizra Sammad
 
Windows Registry Forensics - Artifacts
Windows Registry Forensics - Artifacts Windows Registry Forensics - Artifacts
Windows Registry Forensics - Artifacts
MD SAQUIB KHAN
 
Microsoft Azure alerts
Microsoft Azure alertsMicrosoft Azure alerts
Microsoft Azure alerts
Student
 
Microsoft Active Directory.pptx
Microsoft Active Directory.pptxMicrosoft Active Directory.pptx
Microsoft Active Directory.pptx
masbulosoke
 
11. operating-systems-part-2
11. operating-systems-part-211. operating-systems-part-2
11. operating-systems-part-2
Muhammad Ahad
 
Introduction to Microsoft Azure Cloud
Introduction to Microsoft Azure CloudIntroduction to Microsoft Azure Cloud
Introduction to Microsoft Azure Cloud
Dinesh Kumar Wickramasinghe
 
AWS EC2
AWS EC2AWS EC2
AWS EC2
Mahesh Raj
 
Windowsforensics
WindowsforensicsWindowsforensics
Windowsforensics
Santosh Khadsare
 
Backup tools
Backup toolsBackup tools
Backup tools
university of Gujrat, pakistan
 
Ibm spectrum scale fundamentals workshop for americas part 4 Replication, Str...
Ibm spectrum scale fundamentals workshop for americas part 4 Replication, Str...Ibm spectrum scale fundamentals workshop for americas part 4 Replication, Str...
Ibm spectrum scale fundamentals workshop for americas part 4 Replication, Str...
xKinAnx
 
Cloud backup you say? Azure Backup of course!
Cloud backup you say? Azure Backup of course!Cloud backup you say? Azure Backup of course!
Cloud backup you say? Azure Backup of course!
Wim Matthyssen
 
Windows 2019
Windows 2019Windows 2019
Windows 2019
Gary Williams
 
Software-Defined Data Center Case Study – Financial Institution and VMware
Software-Defined Data Center Case Study – Financial Institution and VMwareSoftware-Defined Data Center Case Study – Financial Institution and VMware
Software-Defined Data Center Case Study – Financial Institution and VMware
VMware
 
Linux forensics
Linux forensicsLinux forensics
Linux forensics
Santosh Khadsare
 
Chapter09 Implementing And Using Group Policy
Chapter09      Implementing And  Using  Group  PolicyChapter09      Implementing And  Using  Group  Policy
Chapter09 Implementing And Using Group Policy
Raja Waseem Akhtar
 
Forensics of a Windows System
Forensics of a Windows SystemForensics of a Windows System
Forensics of a Windows System
Conferencias FIST
 
Course 102: Lecture 26: FileSystems in Linux (Part 1)
Course 102: Lecture 26: FileSystems in Linux (Part 1) Course 102: Lecture 26: FileSystems in Linux (Part 1)
Course 102: Lecture 26: FileSystems in Linux (Part 1)
Ahmed El-Arabawy
 
Let's Talk About: Azure Monitor
Let's Talk About: Azure MonitorLet's Talk About: Azure Monitor
Let's Talk About: Azure Monitor
Pedro Sousa
 
CloudDesk - Cloud operating system
CloudDesk - Cloud operating systemCloudDesk - Cloud operating system
CloudDesk - Cloud operating system
Rajesh Hegde
 
Linux command ppt
Linux command pptLinux command ppt
Linux command ppt
kalyanineve
 
Windows Registry Forensics - Artifacts
Windows Registry Forensics - Artifacts Windows Registry Forensics - Artifacts
Windows Registry Forensics - Artifacts
MD SAQUIB KHAN
 
Microsoft Azure alerts
Microsoft Azure alertsMicrosoft Azure alerts
Microsoft Azure alerts
Student
 
Microsoft Active Directory.pptx
Microsoft Active Directory.pptxMicrosoft Active Directory.pptx
Microsoft Active Directory.pptx
masbulosoke
 
11. operating-systems-part-2
11. operating-systems-part-211. operating-systems-part-2
11. operating-systems-part-2
Muhammad Ahad
 
Ibm spectrum scale fundamentals workshop for americas part 4 Replication, Str...
Ibm spectrum scale fundamentals workshop for americas part 4 Replication, Str...Ibm spectrum scale fundamentals workshop for americas part 4 Replication, Str...
Ibm spectrum scale fundamentals workshop for americas part 4 Replication, Str...
xKinAnx
 
Cloud backup you say? Azure Backup of course!
Cloud backup you say? Azure Backup of course!Cloud backup you say? Azure Backup of course!
Cloud backup you say? Azure Backup of course!
Wim Matthyssen
 
Software-Defined Data Center Case Study – Financial Institution and VMware
Software-Defined Data Center Case Study – Financial Institution and VMwareSoftware-Defined Data Center Case Study – Financial Institution and VMware
Software-Defined Data Center Case Study – Financial Institution and VMware
VMware
 
Chapter09 Implementing And Using Group Policy
Chapter09      Implementing And  Using  Group  PolicyChapter09      Implementing And  Using  Group  Policy
Chapter09 Implementing And Using Group Policy
Raja Waseem Akhtar
 
Forensics of a Windows System
Forensics of a Windows SystemForensics of a Windows System
Forensics of a Windows System
Conferencias FIST
 
Course 102: Lecture 26: FileSystems in Linux (Part 1)
Course 102: Lecture 26: FileSystems in Linux (Part 1) Course 102: Lecture 26: FileSystems in Linux (Part 1)
Course 102: Lecture 26: FileSystems in Linux (Part 1)
Ahmed El-Arabawy
 
Let's Talk About: Azure Monitor
Let's Talk About: Azure MonitorLet's Talk About: Azure Monitor
Let's Talk About: Azure Monitor
Pedro Sousa
 
CloudDesk - Cloud operating system
CloudDesk - Cloud operating systemCloudDesk - Cloud operating system
CloudDesk - Cloud operating system
Rajesh Hegde
 

Viewers also liked (20)

Examining Linux File Structures
Examining Linux File StructuresExamining Linux File Structures
Examining Linux File Structures
primeteacher32
 
Virtual Machine Forensics
Virtual Machine ForensicsVirtual Machine Forensics
Virtual Machine Forensics
primeteacher32
 
Social Media Forensics for Investigators
Social Media Forensics for InvestigatorsSocial Media Forensics for Investigators
Social Media Forensics for Investigators
Case IQ
 
Web Browser Artifacts
Web Browser ArtifactsWeb Browser Artifacts
Web Browser Artifacts
primeteacher32
 
Logs = Accountability
Logs = AccountabilityLogs = Accountability
Logs = Accountability
Anton Chuvakin
 
Processes
ProcessesProcesses
Processes
primeteacher32
 
Cron Jobs
Cron JobsCron Jobs
Cron Jobs
primeteacher32
 
Bigtable and Boxwood
Bigtable and BoxwoodBigtable and Boxwood
Bigtable and Boxwood
Evan Weaver
 
Oracle DBA Online Training in India
Oracle DBA Online Training in IndiaOracle DBA Online Training in India
Oracle DBA Online Training in India
united global soft
 
Top 10 Oracle SQL tuning tips
Top 10 Oracle SQL tuning tipsTop 10 Oracle SQL tuning tips
Top 10 Oracle SQL tuning tips
Nirav Shah
 
1.9 b tree
1.9 b tree1.9 b tree
1.9 b tree
Krish_ver2
 
Network Forensics
Network ForensicsNetwork Forensics
Network Forensics
primeteacher32
 
Tpr star tree
Tpr star treeTpr star tree
Tpr star tree
Win Yu
 
B trees
B treesB trees
B trees
PRAKASH RANJAN SINGH
 
Mac OS X Manual
Mac OS X ManualMac OS X Manual
Mac OS X Manual
Tiago Carvalho
 
Лекция 5: B-деревья (B-trees, k-way merge sort)
Лекция 5: B-деревья (B-trees, k-way merge sort)Лекция 5: B-деревья (B-trees, k-way merge sort)
Лекция 5: B-деревья (B-trees, k-way merge sort)
Mikhail Kurnosov
 
Algorithm Introduction #18 B-Tree
Algorithm Introduction #18 B-TreeAlgorithm Introduction #18 B-Tree
Algorithm Introduction #18 B-Tree
Satoshi Asano
 
File system Os
File system OsFile system Os
File system Os
Nehal Naik
 
floor planning
floor planningfloor planning
floor planning
Team-VLSI-ITMU
 
Examining Linux File Structures
Examining Linux File StructuresExamining Linux File Structures
Examining Linux File Structures
primeteacher32
 
Virtual Machine Forensics
Virtual Machine ForensicsVirtual Machine Forensics
Virtual Machine Forensics
primeteacher32
 
Social Media Forensics for Investigators
Social Media Forensics for InvestigatorsSocial Media Forensics for Investigators
Social Media Forensics for Investigators
Case IQ
 
Bigtable and Boxwood
Bigtable and BoxwoodBigtable and Boxwood
Bigtable and Boxwood
Evan Weaver
 
Oracle DBA Online Training in India
Oracle DBA Online Training in IndiaOracle DBA Online Training in India
Oracle DBA Online Training in India
united global soft
 
Top 10 Oracle SQL tuning tips
Top 10 Oracle SQL tuning tipsTop 10 Oracle SQL tuning tips
Top 10 Oracle SQL tuning tips
Nirav Shah
 
Tpr star tree
Tpr star treeTpr star tree
Tpr star tree
Win Yu
 
Лекция 5: B-деревья (B-trees, k-way merge sort)
Лекция 5: B-деревья (B-trees, k-way merge sort)Лекция 5: B-деревья (B-trees, k-way merge sort)
Лекция 5: B-деревья (B-trees, k-way merge sort)
Mikhail Kurnosov
 
Algorithm Introduction #18 B-Tree
Algorithm Introduction #18 B-TreeAlgorithm Introduction #18 B-Tree
Algorithm Introduction #18 B-Tree
Satoshi Asano
 
File system Os
File system OsFile system Os
File system Os
Nehal Naik
 
Ad

Similar to Examining Mac File Structures (20)

CNIT 152 13 Investigating Mac OS X Systems
CNIT 152 13 Investigating Mac OS X SystemsCNIT 152 13 Investigating Mac OS X Systems
CNIT 152 13 Investigating Mac OS X Systems
Sam Bowne
 
CNIT 152: 13 Investigating Mac OS X Systems
CNIT 152: 13 Investigating Mac OS X SystemsCNIT 152: 13 Investigating Mac OS X Systems
CNIT 152: 13 Investigating Mac OS X Systems
Sam Bowne
 
CNIT 121: 13 Investigating Mac OS X Systems
CNIT 121: 13 Investigating Mac OS X SystemsCNIT 121: 13 Investigating Mac OS X Systems
CNIT 121: 13 Investigating Mac OS X Systems
Sam Bowne
 
Windows Forensics- Introduction and Analysis
Windows Forensics- Introduction and AnalysisWindows Forensics- Introduction and Analysis
Windows Forensics- Introduction and Analysis
Don Caeiro
 
File000128
File000128File000128
File000128
Desmond Devendran
 
Regarding About Operating System Structure
Regarding About Operating System StructureRegarding About Operating System Structure
Regarding About Operating System Structure
sankarkvdc
 
macospptok.pptx
macospptok.pptxmacospptok.pptx
macospptok.pptx
MadanAcharya7
 
The Linux System
The Linux SystemThe Linux System
The Linux System
husnaina_akhtar
 
Windows File Systems
Windows File SystemsWindows File Systems
Windows File Systems
primeteacher32
 
Windows File Systems
Windows File SystemsWindows File Systems
Windows File Systems
primeteacher32
 
UNIT 4-UNDERSTANDING VIRTUAL MEMORY.pptx
UNIT 4-UNDERSTANDING VIRTUAL MEMORY.pptxUNIT 4-UNDERSTANDING VIRTUAL MEMORY.pptx
UNIT 4-UNDERSTANDING VIRTUAL MEMORY.pptx
LeahRachael
 
12-UnixCaseStudy.pdf of operating system
12-UnixCaseStudy.pdf of operating system12-UnixCaseStudy.pdf of operating system
12-UnixCaseStudy.pdf of operating system
DuaRajpoot2
 
Mac Memory Analysis with Volatility
Mac Memory Analysis with VolatilityMac Memory Analysis with Volatility
Mac Memory Analysis with Volatility
Andrew Case
 
The evolution of linux file system
The evolution of linux file systemThe evolution of linux file system
The evolution of linux file system
Gang He
 
Lecture 9 file system
Lecture 9 file systemLecture 9 file system
Lecture 9 file system
Tanveer Malik
 
Operating System Structure Part-II.pdf
Operating System Structure Part-II.pdfOperating System Structure Part-II.pdf
Operating System Structure Part-II.pdf
Harika Pudugosula
 
Shadow forensics print
Shadow forensics printShadow forensics print
Shadow forensics print
n|u - The Open Security Community
 
Selecting and Installing Operating System
Selecting and Installing Operating SystemSelecting and Installing Operating System
Selecting and Installing Operating System
Amir Villas
 
Ubuntu OS Presentation
Ubuntu OS PresentationUbuntu OS Presentation
Ubuntu OS Presentation
Loren Schwappach
 
Lecture 1
Lecture 1Lecture 1
Lecture 1
Tanveer Malik
 
CNIT 152 13 Investigating Mac OS X Systems
CNIT 152 13 Investigating Mac OS X SystemsCNIT 152 13 Investigating Mac OS X Systems
CNIT 152 13 Investigating Mac OS X Systems
Sam Bowne
 
CNIT 152: 13 Investigating Mac OS X Systems
CNIT 152: 13 Investigating Mac OS X SystemsCNIT 152: 13 Investigating Mac OS X Systems
CNIT 152: 13 Investigating Mac OS X Systems
Sam Bowne
 
CNIT 121: 13 Investigating Mac OS X Systems
CNIT 121: 13 Investigating Mac OS X SystemsCNIT 121: 13 Investigating Mac OS X Systems
CNIT 121: 13 Investigating Mac OS X Systems
Sam Bowne
 
Windows Forensics- Introduction and Analysis
Windows Forensics- Introduction and AnalysisWindows Forensics- Introduction and Analysis
Windows Forensics- Introduction and Analysis
Don Caeiro
 
Regarding About Operating System Structure
Regarding About Operating System StructureRegarding About Operating System Structure
Regarding About Operating System Structure
sankarkvdc
 
UNIT 4-UNDERSTANDING VIRTUAL MEMORY.pptx
UNIT 4-UNDERSTANDING VIRTUAL MEMORY.pptxUNIT 4-UNDERSTANDING VIRTUAL MEMORY.pptx
UNIT 4-UNDERSTANDING VIRTUAL MEMORY.pptx
LeahRachael
 
12-UnixCaseStudy.pdf of operating system
12-UnixCaseStudy.pdf of operating system12-UnixCaseStudy.pdf of operating system
12-UnixCaseStudy.pdf of operating system
DuaRajpoot2
 
Mac Memory Analysis with Volatility
Mac Memory Analysis with VolatilityMac Memory Analysis with Volatility
Mac Memory Analysis with Volatility
Andrew Case
 
The evolution of linux file system
The evolution of linux file systemThe evolution of linux file system
The evolution of linux file system
Gang He
 
Lecture 9 file system
Lecture 9 file systemLecture 9 file system
Lecture 9 file system
Tanveer Malik
 
Operating System Structure Part-II.pdf
Operating System Structure Part-II.pdfOperating System Structure Part-II.pdf
Operating System Structure Part-II.pdf
Harika Pudugosula
 
Selecting and Installing Operating System
Selecting and Installing Operating SystemSelecting and Installing Operating System
Selecting and Installing Operating System
Amir Villas
 
Ad

More from primeteacher32 (20)

Software Development Life Cycle
Software Development Life CycleSoftware Development Life Cycle
Software Development Life Cycle
primeteacher32
 
Variable Scope
Variable ScopeVariable Scope
Variable Scope
primeteacher32
 
Returning Data
Returning DataReturning Data
Returning Data
primeteacher32
 
Intro to Functions
Intro to FunctionsIntro to Functions
Intro to Functions
primeteacher32
 
Introduction to GUIs with guizero
Introduction to GUIs with guizeroIntroduction to GUIs with guizero
Introduction to GUIs with guizero
primeteacher32
 
Function Parameters
Function ParametersFunction Parameters
Function Parameters
primeteacher32
 
Nested Loops
Nested LoopsNested Loops
Nested Loops
primeteacher32
 
Conditional Loops
Conditional LoopsConditional Loops
Conditional Loops
primeteacher32
 
Introduction to Repetition Structures
Introduction to Repetition StructuresIntroduction to Repetition Structures
Introduction to Repetition Structures
primeteacher32
 
Input Validation
Input ValidationInput Validation
Input Validation
primeteacher32
 
Nesting Conditionals
Nesting ConditionalsNesting Conditionals
Nesting Conditionals
primeteacher32
 
Conditionals
ConditionalsConditionals
Conditionals
primeteacher32
 
Intro to Python with GPIO
Intro to Python with GPIOIntro to Python with GPIO
Intro to Python with GPIO
primeteacher32
 
Variables and Statements
Variables and StatementsVariables and Statements
Variables and Statements
primeteacher32
 
Variables and User Input
Variables and User InputVariables and User Input
Variables and User Input
primeteacher32
 
Intro to Python
Intro to PythonIntro to Python
Intro to Python
primeteacher32
 
Raspberry Pi
Raspberry PiRaspberry Pi
Raspberry Pi
primeteacher32
 
Hardware vs. Software Presentations
Hardware vs. Software PresentationsHardware vs. Software Presentations
Hardware vs. Software Presentations
primeteacher32
 
Block chain security
Block chain securityBlock chain security
Block chain security
primeteacher32
 
Hashes
HashesHashes
Hashes
primeteacher32
 

Recently uploaded (20)

CHAPTER 7 - Foreign Direct Investment.pptx
CHAPTER 7 - Foreign Direct Investment.pptxCHAPTER 7 - Foreign Direct Investment.pptx
CHAPTER 7 - Foreign Direct Investment.pptx
72200337
 
remakingyourselfpresentation-250430095415-6476ade1.pptx
remakingyourselfpresentation-250430095415-6476ade1.pptxremakingyourselfpresentation-250430095415-6476ade1.pptx
remakingyourselfpresentation-250430095415-6476ade1.pptx
lakhmanpindariya9176
 
SEMINAR REPORT PPT.pptxSDJADADGGDYSADGSGJSFDH
SEMINAR REPORT PPT.pptxSDJADADGGDYSADGSGJSFDHSEMINAR REPORT PPT.pptxSDJADADGGDYSADGSGJSFDH
SEMINAR REPORT PPT.pptxSDJADADGGDYSADGSGJSFDH
123candemet2003
 
Lecture 4.pptx which is need for microeconomic
Lecture 4.pptx which is need for microeconomicLecture 4.pptx which is need for microeconomic
Lecture 4.pptx which is need for microeconomic
mdrakibhasan1427
 
Stakeholders Management GT 11052021.cleaned.pptx
Stakeholders Management GT 11052021.cleaned.pptxStakeholders Management GT 11052021.cleaned.pptx
Stakeholders Management GT 11052021.cleaned.pptx
SaranshJeena
 
SHIPPING CONTAINdccdcdERS BC (2).pdf.pptx
SHIPPING CONTAINdccdcdERS BC (2).pdf.pptxSHIPPING CONTAINdccdcdERS BC (2).pdf.pptx
SHIPPING CONTAINdccdcdERS BC (2).pdf.pptx
ArshjotSingh30
 
Research Project csi1 - This presentation compares popular web browsers such ...
Research Project csi1 - This presentation compares popular web browsers such ...Research Project csi1 - This presentation compares popular web browsers such ...
Research Project csi1 - This presentation compares popular web browsers such ...
bomisung0207
 
Introduction on Speaking skills Power Point
Introduction on Speaking skills Power PointIntroduction on Speaking skills Power Point
Introduction on Speaking skills Power Point
helenswarna
 
Top Business Schools in Delhi For Quality Education
Top Business Schools in Delhi For Quality EducationTop Business Schools in Delhi For Quality Education
Top Business Schools in Delhi For Quality Education
top10privatecolleges
 
Placement cell of college - why choose me
Placement cell of college - why choose mePlacement cell of college - why choose me
Placement cell of college - why choose me
mmanvi024
 
For ssrvm school Admission Campaign.pptx
For ssrvm school Admission Campaign.pptxFor ssrvm school Admission Campaign.pptx
For ssrvm school Admission Campaign.pptx
ArunTYltp
 
Best Fashion Designing Colleges in Delhi
Best Fashion Designing Colleges in DelhiBest Fashion Designing Colleges in Delhi
Best Fashion Designing Colleges in Delhi
top10privatecolleges
 
Huckel_Molecular orbital _Theory_8_Slides.pptx
Huckel_Molecular orbital _Theory_8_Slides.pptxHuckel_Molecular orbital _Theory_8_Slides.pptx
Huckel_Molecular orbital _Theory_8_Slides.pptx
study2022bsc
 
Huckel_MO_Theory_Colorful_Presentation (1).pptx
Huckel_MO_Theory_Colorful_Presentation (1).pptxHuckel_MO_Theory_Colorful_Presentation (1).pptx
Huckel_MO_Theory_Colorful_Presentation (1).pptx
study2022bsc
 
Green Colorful House Simple Illustration Presentation.pdf.pdf
Green Colorful House Simple Illustration Presentation.pdf.pdfGreen Colorful House Simple Illustration Presentation.pdf.pdf
Green Colorful House Simple Illustration Presentation.pdf.pdf
RhyzCharmSolis
 
!Warshauer Paul Curriculum Vitae, Resume
!Warshauer Paul Curriculum Vitae, Resume!Warshauer Paul Curriculum Vitae, Resume
!Warshauer Paul Curriculum Vitae, Resume
PaulWarshauer1
 
Science Lab Safety PPT.pptxwgyie ulbyaaaaaaaaaaaaaaaaaaaaaau
Science Lab Safety PPT.pptxwgyie ulbyaaaaaaaaaaaaaaaaaaaaaauScience Lab Safety PPT.pptxwgyie ulbyaaaaaaaaaaaaaaaaaaaaaau
Science Lab Safety PPT.pptxwgyie ulbyaaaaaaaaaaaaaaaaaaaaaau
atifkhan990367
 
NATIONALISM IN EUROPE class 10 best ppt.pdf
NATIONALISM IN EUROPE class 10 best ppt.pdfNATIONALISM IN EUROPE class 10 best ppt.pdf
NATIONALISM IN EUROPE class 10 best ppt.pdf
leenamakkar79
 
material-17438335 to the third floor in 47-gsms.pptx
material-17438335 to the third floor in 47-gsms.pptxmaterial-17438335 to the third floor in 47-gsms.pptx
material-17438335 to the third floor in 47-gsms.pptx
JyotirmayNirankari
 
Traditional Medicine aDRTYSRTYSRTnd HIV.ppt
Traditional Medicine aDRTYSRTYSRTnd HIV.pptTraditional Medicine aDRTYSRTYSRTnd HIV.ppt
Traditional Medicine aDRTYSRTYSRTnd HIV.ppt
XolaniRadebe7
 
CHAPTER 7 - Foreign Direct Investment.pptx
CHAPTER 7 - Foreign Direct Investment.pptxCHAPTER 7 - Foreign Direct Investment.pptx
CHAPTER 7 - Foreign Direct Investment.pptx
72200337
 
remakingyourselfpresentation-250430095415-6476ade1.pptx
remakingyourselfpresentation-250430095415-6476ade1.pptxremakingyourselfpresentation-250430095415-6476ade1.pptx
remakingyourselfpresentation-250430095415-6476ade1.pptx
lakhmanpindariya9176
 
SEMINAR REPORT PPT.pptxSDJADADGGDYSADGSGJSFDH
SEMINAR REPORT PPT.pptxSDJADADGGDYSADGSGJSFDHSEMINAR REPORT PPT.pptxSDJADADGGDYSADGSGJSFDH
SEMINAR REPORT PPT.pptxSDJADADGGDYSADGSGJSFDH
123candemet2003
 
Lecture 4.pptx which is need for microeconomic
Lecture 4.pptx which is need for microeconomicLecture 4.pptx which is need for microeconomic
Lecture 4.pptx which is need for microeconomic
mdrakibhasan1427
 
Stakeholders Management GT 11052021.cleaned.pptx
Stakeholders Management GT 11052021.cleaned.pptxStakeholders Management GT 11052021.cleaned.pptx
Stakeholders Management GT 11052021.cleaned.pptx
SaranshJeena
 
SHIPPING CONTAINdccdcdERS BC (2).pdf.pptx
SHIPPING CONTAINdccdcdERS BC (2).pdf.pptxSHIPPING CONTAINdccdcdERS BC (2).pdf.pptx
SHIPPING CONTAINdccdcdERS BC (2).pdf.pptx
ArshjotSingh30
 
Research Project csi1 - This presentation compares popular web browsers such ...
Research Project csi1 - This presentation compares popular web browsers such ...Research Project csi1 - This presentation compares popular web browsers such ...
Research Project csi1 - This presentation compares popular web browsers such ...
bomisung0207
 
Introduction on Speaking skills Power Point
Introduction on Speaking skills Power PointIntroduction on Speaking skills Power Point
Introduction on Speaking skills Power Point
helenswarna
 
Top Business Schools in Delhi For Quality Education
Top Business Schools in Delhi For Quality EducationTop Business Schools in Delhi For Quality Education
Top Business Schools in Delhi For Quality Education
top10privatecolleges
 
Placement cell of college - why choose me
Placement cell of college - why choose mePlacement cell of college - why choose me
Placement cell of college - why choose me
mmanvi024
 
For ssrvm school Admission Campaign.pptx
For ssrvm school Admission Campaign.pptxFor ssrvm school Admission Campaign.pptx
For ssrvm school Admission Campaign.pptx
ArunTYltp
 
Best Fashion Designing Colleges in Delhi
Best Fashion Designing Colleges in DelhiBest Fashion Designing Colleges in Delhi
Best Fashion Designing Colleges in Delhi
top10privatecolleges
 
Huckel_Molecular orbital _Theory_8_Slides.pptx
Huckel_Molecular orbital _Theory_8_Slides.pptxHuckel_Molecular orbital _Theory_8_Slides.pptx
Huckel_Molecular orbital _Theory_8_Slides.pptx
study2022bsc
 
Huckel_MO_Theory_Colorful_Presentation (1).pptx
Huckel_MO_Theory_Colorful_Presentation (1).pptxHuckel_MO_Theory_Colorful_Presentation (1).pptx
Huckel_MO_Theory_Colorful_Presentation (1).pptx
study2022bsc
 
Green Colorful House Simple Illustration Presentation.pdf.pdf
Green Colorful House Simple Illustration Presentation.pdf.pdfGreen Colorful House Simple Illustration Presentation.pdf.pdf
Green Colorful House Simple Illustration Presentation.pdf.pdf
RhyzCharmSolis
 
!Warshauer Paul Curriculum Vitae, Resume
!Warshauer Paul Curriculum Vitae, Resume!Warshauer Paul Curriculum Vitae, Resume
!Warshauer Paul Curriculum Vitae, Resume
PaulWarshauer1
 
Science Lab Safety PPT.pptxwgyie ulbyaaaaaaaaaaaaaaaaaaaaaau
Science Lab Safety PPT.pptxwgyie ulbyaaaaaaaaaaaaaaaaaaaaaauScience Lab Safety PPT.pptxwgyie ulbyaaaaaaaaaaaaaaaaaaaaaau
Science Lab Safety PPT.pptxwgyie ulbyaaaaaaaaaaaaaaaaaaaaaau
atifkhan990367
 
NATIONALISM IN EUROPE class 10 best ppt.pdf
NATIONALISM IN EUROPE class 10 best ppt.pdfNATIONALISM IN EUROPE class 10 best ppt.pdf
NATIONALISM IN EUROPE class 10 best ppt.pdf
leenamakkar79
 
material-17438335 to the third floor in 47-gsms.pptx
material-17438335 to the third floor in 47-gsms.pptxmaterial-17438335 to the third floor in 47-gsms.pptx
material-17438335 to the third floor in 47-gsms.pptx
JyotirmayNirankari
 
Traditional Medicine aDRTYSRTYSRTnd HIV.ppt
Traditional Medicine aDRTYSRTYSRTnd HIV.pptTraditional Medicine aDRTYSRTYSRTnd HIV.ppt
Traditional Medicine aDRTYSRTYSRTnd HIV.ppt
XolaniRadebe7
 

Examining Mac File Structures

  • 2. Understanding Macintosh File Structures • Current Mac OS X version 10.12 • Code-named Sierra • Themed: Cats Yosemite MountainTheme • MAC OS X is built on a core called Darwin • Consists of a Berkeley Software Distribution (BSD) UNIX application layer • With OS X, Macintosh moved to the Intel processor and became UNIX based • Before OS X, Hierarchical File System (HFS) • Files stored in nested directories (folders) • Extended Format File System (HFS+) • Introduced with MacOS 8.1 • Supports smaller file sizes on larger volumes, resulting in more efficient disk use
  • 3. An Overview of Mac File Structures • In Mac, a file consists of two parts: • Data fork and resource fork • The data fork typically contains data the user creates, such as text or spreadsheets • Applications also read and write to the data fork • The resource fork typically contains data in a specific form, containing details such as icon bitmaps, the shapes of windows, definitions of menus and their contents, finder data, and application code. • Stores file metadata and application information • For example, a word processing file might store its text in the data fork, while storing any embedded images in the same file's resource fork. Applications also read and write to the data fork
  • 4. An Overview of MacVolumes • A volume is any storage medium used to store files • It can be all or part of the storage media for hard disks • Volumes have allocation and logical blocks • Logical blocks cannot exceed 512 bytes • Allocation blocks are a set of consecutive logical blocks • Two end of file (EOF) descriptors • Logical EOF • Actual size of the file • Physical EOF • The number of allocation blocks for that file
  • 5. An Overview of MacVolumes(cont.) • Clumps • Groups of contiguous allocation blocks • Reduce fragmentation • First two logical blocks, 0 and 1, as boot blocks • Master Directory Block (MDB) or Volume Information Block (VIB) • Stores all information about a volume • Volume Control Block (VCB) • Stores information from the MDB when OS mounts • Extents overflow file • Stores any file information not in the MDB or aVCB • Catalog • The listing of all files and directories on the volume • Maintains relationships between files and directories • B*-tree file system in earlier Mac version • Actual file data is stored on the leaf nodes • B*-tree also uses header, index, and map nodes
  • 6. Forensics Procedures in Mac • There are some differences between Linux and Mac OS X file systems • Linux has the /home/username and /root directories • In Mac, the folders are /users/username and /private/var/root • The /home directory exists in the Mac OS but it is empty • Mac users have limited access to other user accounts’ files and the guest account is disabled • For forensics procedures in Mac OS X: • You must know where file system components are located and how both files and file components are stored
  • 7. Key Mac Files • Application settings are in three formats: • Plaintext, plist files, and the SQLite database • Plist files are preference files for installed applications on a system • FileVault is used to encrypt and decrypt a user’s /users directory • Keychains • Files used to manage passwords for applications,Web sites,Wi-Fi, Remote desktop, and other system files • Deleted files are in theTrashes folder • If a file is deleted at the command line, however, it doesn’t show up in the trash
  • 8. MacintoshAcquisition Methods • Make an image of the drive • Static acquisition of the suspect drive is preferable to a live acquisition • Removing the drive from a Macintosh Mini’s CPU case is difficult • Attempting to do so without Apple factory training could damage the computer • Use a Macintosh-compatible forensic boot CD to make an image • MacQuisition is a forensic boot CD that makes an image of a Macintosh drive • Being able to turn off the auto mount function in OS X (disable Disk Arbitration) • Allows you to connect a suspect drive to a Macintosh Forensic workstation without a write- blocking device, ie Linux vs.Windows
  • 9. Macintosh ForensicTools andVendors • BlackBagTechnologies Macintosh Forensic Software (OS X only) • Acquisition products specifically designed for OS 9 and earlier • As well as OS X • SubRosaSoft MacForensicsLab (OS X only) • Guidance EnCase • X-Ways Forensics • AccessData FTK
  • 10. Summary • Before Mac OS X, the file systems HFS and HFS+ were used • In Mac, a file consists of two parts: a data fork and a resource fork • A volume is any storage medium used to store files • Plist files are files for installed applications on a Mac system • The biggest challenge in acquiring images from Mac systems is often physical access to the drive • Linux forensic tools are often free