All Projects → nrvana → macOS-triage

nrvana / macOS-triage

Licence: MIT License
macOS triage is a python script to collect various macOS logs, artifacts, and other data.

Programming Languages

python
139335 projects - #7 most used programming language

Projects that are alternatives of or similar to macOS-triage

Vol3xp
Volatility Explorer Suit
Stars: ✭ 31 (+55%)
Mutual labels:  forensics
MacForensics
Scripts to process macOS forensic artifacts
Stars: ✭ 118 (+490%)
Mutual labels:  forensics
siemstress
Very basic CLI SIEM (Security Information and Event Management system).
Stars: ✭ 24 (+20%)
Mutual labels:  forensics
sqbrite
SQBrite is a data recovery tool for SQLite databases
Stars: ✭ 27 (+35%)
Mutual labels:  forensics
toolset
Useful tools for CTF competitions
Stars: ✭ 31 (+55%)
Mutual labels:  forensics
LevelDBDumper
Dumps all of the Key/Value pairs from a LevelDB database
Stars: ✭ 23 (+15%)
Mutual labels:  forensics
DFIR-O365RC
PowerShell module for Office 365 and Azure log collection
Stars: ✭ 158 (+690%)
Mutual labels:  forensics
ManTraNet-pytorch
Implementation of the famous Image Manipulation\Forgery Detector "ManTraNet" in Pytorch
Stars: ✭ 47 (+135%)
Mutual labels:  forensics
smram parse
System Management RAM analysis tool
Stars: ✭ 50 (+150%)
Mutual labels:  forensics
pyaff4
The Python implementation of the AFF4 standard.
Stars: ✭ 37 (+85%)
Mutual labels:  forensics
EventTranscriptParser
Python based tool to extract forensic info from EventTranscript.db (Windows Diagnostic Data)
Stars: ✭ 22 (+10%)
Mutual labels:  forensics
WELA
WELA (Windows Event Log Analyzer): The Swiss Army knife for Windows Event Logs! ゑ羅(ウェラ)
Stars: ✭ 442 (+2110%)
Mutual labels:  forensics
robot hacking manual
Robot Hacking Manual (RHM). From robotics to cybersecurity. Papers, notes and writeups from a journey into robot cybersecurity.
Stars: ✭ 169 (+745%)
Mutual labels:  forensics
UnifiedLogReader
A parser for Unified logging tracev3 files
Stars: ✭ 56 (+180%)
Mutual labels:  forensics
ir scripts
incident response scripts
Stars: ✭ 17 (-15%)
Mutual labels:  forensics
PSTrace
Trace ScriptBlock execution for powershell v2
Stars: ✭ 38 (+90%)
Mutual labels:  forensics
ForensicsTools
A list of free and open forensics analysis tools and other resources
Stars: ✭ 392 (+1860%)
Mutual labels:  forensics
mini-kali
Docker image for hacking
Stars: ✭ 15 (-25%)
Mutual labels:  forensics
truehunter
Truehunter
Stars: ✭ 30 (+50%)
Mutual labels:  forensics
CTF-Script-And-Template-Thrift-Shop
[180+ scripts] There are a few genuine gems in there. And a lot of spaghetti code. Most of these scripts were for solving CTF's. If you googles something for a CTF and landed here look at the scripts they're all fairly malleable. Sorry for the shitty naming conventions (not really). If you are a recruiter stop. I wont be able to rewrite half thi…
Stars: ✭ 38 (+90%)
Mutual labels:  forensics

macOS triage

macOS triage is a python script to collect various macOS logs, artifacts, and other data.

Getting Started

These instructions will get you a copy of the project up and running on your local machine for development and testing purposes. See deployment for notes on how to deploy the project on a live system.

Prerequisites

There are a few basic dependencies for macOS triage. Ideally you would not want to install any additional programs on a target system. Eventually I will have a method to build a single executable which will be all that is needed for collection.

pip install -r requirements.txt

Triage

First, edit the list of triage_items in the Triage class to specify which categories are to be collected.

Next, edit the rsa_public_key in the Triage class if you plan on encrypting the output (it currently has my public key and I won't give you the private key.) See the Encrpytion Setup section for additional information.

To run the triage script, run the following:

sudo python main.py

To run the triage script without encrypting the output, run the following:

sudo python main.py --plaintext

The output will be a .tar.gz or .tar.gz.enc file depending on whether or not encryption was used.

Encryption Setup

To make your own public/private key pair follow the example in a python console below:

>>> from Crypto.PublicKey import RSA
>>> random_generator = Random.new().read
>>> key = RSA.generate(2048, random_generator)
>>> print key.exportKey()
-----BEGIN RSA PRIVATE KEY-----
...
-----END RSA PRIVATE KEY-----
# save this entire output to a file in a safe place for decryption later
>>> print key.publickey().exportKey()
-----BEGIN PUBLIC KEY-----
...
-----END PUBLIC KEY-----
# save this entire output to a file named 'id_rsa.pub' in the root of the script directory

.enc Package Decryption

To decrypt an encrypted package, perform the following steps:

python decryption/collection_package_decryptor.py -k <private key> -f <encrypted collection package>

"Operation not permitted" Error in macOS Mojave

As of macOS 10.14 (Mojave), the Terminal app no longer has full disk access. In order to enable it, you must do the following:

  • Open System Preferences from the Apple menu ()
  • Select Security & Privacy
  • Select the Privacy tab
  • Select Full Disk Access from the left pane
  • Click the plus (+) button to add the Terminal app to the list of apps approved to access the full disk (you likely need to click the lock in the lower lefthand corner and authenticate with administrator privileges to unlock this functionality)
  • Navigate to /Applications/Utilities/Terminal.app to add the Terminal app to the list of approved applications
  • Relaunch the Terminal and you will now have full disk access

The good news is this should be sufficient for full disk access without having to disable SIP as of macOS 10.4 (Mojave).

To learn more, see this blog post by Paul Horowitz.

TODO

License

This project is licensed under the MIT License. See the LICENSE file for details.

Acknowledgments

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].