Digital Forensics with Open Source Tools: Using Open Source Platform Tools for Performing Computer Forensics on Target Systems: Windows, Mac, Linux, Unix, etc by Altheide Cory & Carvey Harlan
Author:Altheide, Cory & Carvey, Harlan [Altheide, Cory]
Language: eng
Format: mobi, pdf
Published: 0101-01-01T00:00:00+00:00
FIGURE 6.1 File
system information
in HFSExplorer.
We can continue our
examination
using fls
from the Sleuth Kit.
forensics:~$ fls nps-2009-
hfsjtest1/image.gen1.dmg
r/r 3: $ExtentsFile
r/r 4: $CatalogFile
r/r 5: $BadBlockFile
r/r 6: $AllocationFile
r/r 7: $StartupFile
r/r 8: $AttributesFile
d/d 21: .fseventsd
d/d 19: .HFS+ Private
Directory Data^
r/r 16: .journal
r/r
17:
.journal_info_block
d/d 20: .Trashes
r/r 24: file1.txt
r/r 25: file2.txt
d/d 18: ^^^^HFS+ Private
Data
T he “dollar” files are
HFS+ special files used as
the backbone of the HFS+
file system.
HFS+ Special Files
T he bulk of the structures
that an HFS+ relies upon
for proper function are
stored in the volume as
hidden files, much like
the MFT and associated
files on an NT FS volume.
An HFS+ volume has five
such files, which are not
directly accessible using
standard
file
system
utilities:
1. The allocation file is a
bitmap that tracks the
allocation status of
each block of the
volume.
2. The catalog file
contains records for
each file and directory
on the volume. It
serves many of the
same functions that
the Master File Table
serves on an NTFS file
system. By necessity,
the location of the
first extent of the
catalog file is stored
in the volume header.
The location of all
other files is stored in
catalog records. HFS+
catalog records are 8K
in length and include
the catalog node ID
(CNID) of the file or
folder, the parent
CNID, time stamp
metadata, and
information about the
data and resource
forks of the file.
3. The extents overflow
file contains records
for forks that have
more than eight
extents allocated to
them. This file should
be fairly sparse, as
having more than
eight extents indicates
fairly severe
fragmentation on an
HFS+ file system.
4. The startup file is
used to hold
information used
when booting from a
system that doesn’t
have knowledge of
HFS+.
5. The attributes file can
be used to store
extended attributes for
files. The attributes
file is used in the per-
file compression
found in OS X 10.6.
One important item to
note is that the allocation
strategy for CNIDs is
interesting
from
an
analysis
perspective.
CNIDs are 32-bit values
allocated
sequentially
starting from 16. T hey
are not reused until all
32-bit integers (minus the
reserved CNIDs) have
been
assigned.
T his
allows the CNID to serve
as a relative time marker.
Files with higher CNID
values are newer than
files with lower CNID
values, despite what any
time stamp information
would
indicate.
Additionally,
missing
CNID values indicate that
a file was once present
and
has
been
subsequently deleted. See
Chapter 9
for
more
information on relative
time values and extended
time analysis.
Next, we will examine
metadata for a single
regular file in detail
using istat.
forensics:~$ istat nps-
2009-
hfsjtest1/image.gen1.dmg 24
Catalog Record: 24
Allocated
Type: File
Mode: rrw-r--r--
Size: 28
uid / gid: 501 / 501
Link count: 1
Admin flags: 0
Owner flags: 0
File type: 0000
File creator: 0000
Text encoding: 0
Resource fork size: 0
Times:
Created:
Thu
Jan
29
09:33:35 2009
Content Modified: Thu Jan
29 09:33:42 2009
Attributes Modified: Thu
Jan 29 09:33:42 2009
Accessed:
Thu
Jan
29
09:33:35 2009
Backed Up: Wed Dec 31
16:00:00 1969
Data Fork Blocks:
2315
As you can see from
the output just given, a
Catalog Record supports
five
time
stamps;
however, only the first
four are in active use on
current
HFS+
implementations.
Created: Updated when
the file is created.
Content Modified:
Updated when the file
content is modified.
Attributes Modified:
Updated when
attributes (metadata)
associated with the
file are modified. This
is similar to the
inoded/metadata
change time on Linux
file systems.
Accessed: Updated
when the file content
is accessed.
Backed Up: Field is
deprecated and
usually null (as seen
earlier).
Finally, to extract the
file content we can use
two different methods.
First, the indirect method
using icat.
forensics:~$
icat
nps-
2009-
hfsjtest1/image.gen1.dmg 24
New file 1 contents -
snarf
Alternatively, we can
dump
the
allocation
block
directly
using
blkcat. We can see the
block value in the istat
output
shown
earlier
under
“Data
Fork
Blocks”:
forensics:~$ blkcat nps-
2009-
hfsjtest1/image.gen1.dmg
2315
New file 1 contents -
snarf
Note
that
HFS+
volumes are capable of
maintaining a journal;
however, currently there
are
no
open
source
forensic utilities capable
of processing the journal
for artifacts.
T ip
DMG/UDIF
Containers
T he majority
of
OS
X
software
is
distributed as
“DMG” files.
DMG
files
are
standalone
disk-like
images in the
Universal
Disk Image
Format
(UDIF). UDIF
is the native
image
file
format
for
OS X and, as
expected,
these image
files
will
generally
contain
a
HFS+
file
system. UDIF
images
can
be
compressed,
sparse,
or
encrypted.
UDIF/DMG
images
can
be examined
using
HFSExplorer.
Deleted Data
Unfortunately, recovery
of deleted files from
HFS+ volumes is quite
difficult. Because of the
constant rebalancing of
the
B-T ree
structures
inside of the Catalog
Download
Digital Forensics with Open Source Tools: Using Open Source Platform Tools for Performing Computer Forensics on Target Systems: Windows, Mac, Linux, Unix, etc by Altheide Cory & Carvey Harlan.pdf
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
What's Done in Darkness by Kayla Perrin(26957)
The Ultimate Python Exercise Book: 700 Practical Exercises for Beginners with Quiz Questions by Copy(20855)
De Souza H. Master the Age of Artificial Intelligences. The Basic Guide...2024 by Unknown(20609)
D:\Jan\FTP\HOL\Work\Alien Breed - Tower Assault CD32 Alien Breed II - The Horror Continues Manual 1.jpg by PDFCreator(20536)
The Fifty Shades Trilogy & Grey by E L James(19456)
Shot Through the Heart: DI Grace Fisher 2 by Isabelle Grey(19378)
Shot Through the Heart by Mercy Celeste(19241)
Wolf & Parchment: New Theory Spice & Wolf, Vol. 10 by Isuna Hasekura and Jyuu Ayakura(17384)
Python GUI Applications using PyQt5 : The hands-on guide to build apps with Python by Verdugo Leire(17353)
Peren F. Statistics for Business and Economics...Essential Formulas 3ed 2025 by Unknown(17182)
Wolf & Parchment: New Theory Spice & Wolf, Vol. 03 by Isuna Hasekura and Jyuu Ayakura & Jyuu Ayakura(17095)
Wolf & Parchment: New Theory Spice & Wolf, Vol. 01 by Isuna Hasekura and Jyuu Ayakura & Jyuu Ayakura(16712)
The Subtle Art of Not Giving a F*ck by Mark Manson(14825)
The 3rd Cycle of the Betrayed Series Collection: Extremely Controversial Historical Thrillers (Betrayed Series Boxed set) by McCray Carolyn(14441)
Stepbrother Stories 2 - 21 Taboo Story Collection (Brother Sister Stepbrother Stepsister Taboo Pseudo Incest Family Virgin Creampie Pregnant Forced Pregnancy Breeding) by Roxi Harding(14216)
Cozy crochet hats: 7 Stylish and Beginner-Friendly Patterns from Baby Beanies to Trendy Bucket Hats by Vanilla Lazy(13499)
Scorched Earth by Nick Kyme(13094)
Reichel W. Numerical methods for Electrical Engineering, Meteorology,...2022 by Unknown(12976)
Drei Generationen auf dem Jakobsweg by Stein Pia(11256)