πŸ›‘οΈ Defence Mechanisms

πŸ“š MacOS Basics

Firewall

You can set specific rules to limit the traffic.

FileVault

No recovery once this password is lost.

Partitions

It has a hidden partition installed (MacOS recovery). It replaces the installation disks that came with older PCs. Restart and hold down the R-key. It doesn’t touch the user directories, only reinstalls the OS. If this option is not available, Internet recovery will be launched.

Disk Utility

When erasing data choose from the three options:

⛅️ AWS Evidence Collection

Are there any Shadow Cloud Accounts? Could be the first place to look when investigating.

A β€˜without-reboot’ snapshot is equivalent to a live acquisition, and a snapshot with a reboot is more like a traditional powered-off. Sheward, Mike. Hands-on Incident Response and Digital Forensics (p. 175). BCS Learning & Development Limited. Kindle Edition.

EC2 instance metadata

Expand …

Some sensitive information can be stored in IMDS if it’s not configured properly. T1522 (MITRE). Not the case with service-managed accounts.

🍎 iOS Evidence Collection

General Considerations

First of all, all the Apple devices support remote wiping which has evolved significantly over the year and now support Bluetooth. When I say wiping over Bluetooth, it doesn’t mean that the person wiping and the device need to be in the Bluetooth range (which is quite short). It could be an examiner with a Bluetooth enabled standing near the iPhone with Bluetooth on and the person of interest somewher within the range of the first responder. I didn’t try this myself, but I should. This is based on the interview given on the Surviving Digital Forensics podcast on T1 and T2 Apple devices and the challenges the forensic examiners now face.

🐧 Linux Evidence Collection

File Systems

EXT 2,3,4, ReiserFS, XFS, JFS, Btrfs.

Logical Backup - doesn’t copy all, doesn’t copy slack, free space and deleted files. Imaging - bit-by-bit copy. Should not be used on a live system!

Live Acquisition

https://github.com/Dead-Simple-Scripts/AutoLLR Automatically collection live info. Quite a heavy footprint. But if we are not collecting RAM, not the biggest issue.

References

https://www.sans.org/presentations/long-live-linux-forensics/ https://www.sans.org/blog/getting-started-with-linux-memory-forensics/ https://www.sans.org/blog/digital-forensics-ps3-linux-file-system-analysis-and-network-forensics/ https://www.sans.org/blog/bring-me-my-pipe/