dfm covers
 
 

Mac Memory Forensics


Mac Memory Forensics

WeChat Analysis on a live system, Kelvin Wong investigates...

Rapid growth of the use of Mac OS X requires forensics researchers to analyse devices such as iPad, iPhone and Mac in depth. OS X forensics really started with Jonathan Zdziarski in 2008, but soon became widespread with most of the research and training focused on file system analysis. There are a number of tools available to analyse OS X, e.g. Volatility, Volafox, Memoryze for Mac, Mac Memory Reader, MacLockPick and Rekall, however the ability to analyse Mac memory will be complex and disconcerting to the novice. We have attempted in this article to demonstrate a fast track method of Mac memory forensic analysis by studying the evidence of a very popular Chinese social networking application ‘WeChat’. Memory Forensics is the art of analyzing computer memory (RAM) to solve digital crimes’ defined by Michael Hale Ligh, Andrew Case and, Jamie Levy. Computer forensics science is not only considered a science but an art. With the global use of smart phones and the Internet, a great number of individuals now communicate with their friends using some form of mobile social networking application, e.g. ‘Facebook, Whatsapp, SnapChat etc.’ In China and surrounding countries, especially Hong Kong, the most famous and commonly used chatting platform is WeChat. These applications provide not only a smart phone but also a desktop version. Therefore, we cannot ignore any possibility of evidence in either the file system or memory from a desktop machine. Memory analysis is an important intersection, therefore in this article we will examine the memory dump from a Mac machine, by acquisition, process analysis and data collection through an example of running WeChat on OS X.




Find out more - subscribe to DFM today and read the full article. Or if you're a subscriber, login and read the article online.


 
Please make cache directory writable.
 

Submit an Article

Call for Articles

We are keen to publish new articles from all aspects of digital forensics. Click to contact us with your completed article or article ideas.

Featured Book

Learning iOS Forensics

A practical hands-on guide to acquire and analyse iOS devices with the latest forensic techniques and tools.

Meet the Authors

Andrew Harbison

Andrew Harbison is a Director and IT Forensics Lead at Grant Thornton

 

Coming up in the Next issue of Digital Forensics Magazine

Coming up in Issue 31 on sale from May 2017:


DDOS Attacks on Mobile Devices

Denial of service attacks (DoS), distributed denial of service attacks (DDoS) and reflector attacks (DRDoS) are well known and documented. More recently however we have seen that these attacks have been directed at mobile communication devices.  Read More »

Advancements in Windows Hibernation File Forensics

Brian Gerdon looks at how the windows hibernation files can be a valuable source of information for digital forensic investigators. Read More »

Subscribe today


Testing Damage Sustainability on SD Cards

A growing number of companies and agencies are now specializing in repair and recovery of data and not on the forensic examination of the data. Read More »

Every Issue
Plus the usual Competition, Book Reviews, 360, IRQ, Legal

Click here to read more about the next issue