Logo
RSS Feed

👥 Users

Created: 02.06.2023

macOS

/Users/%username%/

Password hashes

sudo plutil -p /var/db/dslocal/nodes/Default/users/<usename>.plist

Account Info

sudo plutil -p /private/var/db/dslocal/nodes/Default/Users/<User>.plist

Contains name, profile name, password hint, account image, UID

Get uids of users (incuding services’ uids): /private/var/db/dslocal/nodes/Default/sqlindex (SQLite DB).

Login History

sudo su
cd /private/var/log/asl 
cat BB.<date>.asl

BB.date.asl - Best before.

⚠️ When grabbing volumes from APFS system, better acquire Recovery volume as well, since it may contain account information as well (password hints, for example).

Tools 🛠: plutil (built-in on Macs).

Also, FSEvents can give you a lot of information. Tools 🛠: FSEventsParser.

Linux

/etc/passwd and /etc/shadow.

User Account/Data

• /home/%username%/* • /etc/passwd
• /etc/shadow
• /etc/sudoers

• /etc/group

Unused accounts

Look for unexpected account, especially those that don’t have password (empty).

cat /etc/shadow | awk -F: '($2==""){print $1}' # 

Effective ID vs Real ID

References

Expand… Something here