dfm covers
 
 

Mac Memory Forensics

Written by DFMag


Mac Memory Forensics

WeChat Analysis on a live system, Kelvin Wong investigates...

Rapid growth of the use of Mac OS X requires forensics researchers to analyse devices such as iPad, iPhone and Mac in depth. OS X forensics really started with Jonathan Zdziarski in 2008, but soon became widespread with most of the research and training focused on file system analysis. There are a number of tools available to analyse OS X, e.g. Volatility, Volafox, Memoryze for Mac, Mac Memory Reader, MacLockPick and Rekall, however the ability to analyse Mac memory will be complex and disconcerting to the novice. We have attempted in this article to demonstrate a fast track method of Mac memory forensic analysis by studying the evidence of a very popular Chinese social networking application ‘WeChat’. Memory Forensics is the art of analyzing computer memory (RAM) to solve digital crimes’ defined by Michael Hale Ligh, Andrew Case and, Jamie Levy. Computer forensics science is not only considered a science but an art. With the global use of smart phones and the Internet, a great number of individuals now communicate with their friends using some form of mobile social networking application, e.g. ‘Facebook, Whatsapp, SnapChat etc.’ In China and surrounding countries, especially Hong Kong, the most famous and commonly used chatting platform is WeChat. These applications provide not only a smart phone but also a desktop version. Therefore, we cannot ignore any possibility of evidence in either the file system or memory from a desktop machine. Memory analysis is an important intersection, therefore in this article we will examine the memory dump from a Mac machine, by acquisition, process analysis and data collection through an example of running WeChat on OS X.




Find out more - subscribe to DFM today and read the full article. Or if you're a subscriber, login and read the article online.


 
Please make cache directory writable.
 

Submit an Article

Call for Articles

We are keen to publish new articles from all aspects of digital forensics. Click to contact us with your completed article or article ideas.

Featured Book

Learning iOS Forensics

A practical hands-on guide to acquire and analyse iOS devices with the latest forensic techniques and tools.

Meet the Authors

Noemi Kuncik

Noemi Kuncik is an IT Forensics Specialist at Grant Thornton

 

Coming up in the Next issue of Digital Forensics Magazine

Coming up in Issue 37 on sale from November 2018:


Crowd Sourcing Digital Evidence The Risk v The Reward

All digital devices used today can be considered as a potential source for digital evidence. Andrew Ryan investigates the current state in the art of crowd sourced digital evidence. Read More »

Recovery of Forensic Artifacts from Deleted Jump-List in Windows 10

Jump-Lists are widely discussed in forensics community since the release of Windows 7 and are having more capabilities to reveal forensics artifacts in Windows 10. Read More »

Subscribe today


Voice Biometrics

This article looks at the research and development in the field of Voice Biometrics and Speech Analytics, specifically Speaker Identification, Language and Gender Identification, Speech-to-Text Transcription, Keyword Spotting, and others. Read More »

Every Issue
Plus the usual Competition, Book Reviews, 360, IRQ, Legal

Click here to read more about the next issue