Part 3: Step-by-step Tooling for iOS Research (via @bizzybarney)
mac4n6.com
by Sarah Edwards
3y ago
This is the third and final piece of the Mac and iPhone setup process!  Sorry for the long delay between the last one and this one, but better late than never right? This guide will help you setup your iDevice with two binaries that can greatly assist with targeted testing and analysis.  My goal is to equip you to do your own research and testing to confidently answer the questions you will surely have as you learn this beautiful dance we call DFIR.  If you currently rely on a commercial tool to extract your iDevice data and then parse the data for you, that is totally normal a ..read more
Visit website
APOLLO v1.4 - Now with 'Gather' Function from iOS/macOS and updates to iOS14 and macOS 11 modules
mac4n6.com
by Sarah Edwards
3y ago
I’ve been working hard on a big update to improve core functionality of APOLLO to include methods to gather up the database files needed so they can be extracted from using the APOLLO modules. New APOLLO Functions: ‘gather_macos’ - Automagically finds and collects database files on macOS using modules. Any directory, mounted volume, etc. Ability to ignore certain directories ‘gather_ios’ - Automagically finds and collects database files on jailbroken iOS devices using modules. IP and Port Required Ability to ignore certain directories ‘extract’ - Nearly the same as before, ri ..read more
Visit website
Analysis of Apple Unified Logs [Entry 12] – Quick & Easy Unified Log Collection from iOS Devices for Testing
mac4n6.com
by Sarah Edwards
3y ago
Collection of Unified Logs on macOS systems is pretty straight forward. You can use the command, and yes – you do have to be root. sudo log collect Collection from iOS device is not as obvious. I think most of us are doing the sysdiagnose/AirDrop method which is tricky. Trying to trigger a sysdiagnose on an iOS device can be frustrating to get the right button hits with the right timing. (Not completely unlike trying to get a device in DFU mode!) In my recent testing, I noticed the argument--device-udid in ‘log’ man page. This functionality seems to have made an appearance in 10.15. The fol ..read more
Visit website
Part 2: Step-by-step iPhone Setup for iOS Research (via @bizzybarney)
mac4n6.com
by Sarah Edwards
3y ago
This is a follow-on to the previous post showing how to setup your Mac for iOS testing. If you haven’t read over that one - this article draws assumptions that your Mac is setup in a certain way, or that you know what you’re doing otherwise. Feel free to go read that first, I’ll wait.. Alright, now that we are all on the same page, let’s tackle the second piece and get your iPhone setup for research and testing. This guide will be very similar to the last in its simplicity, with the assumption that you are not a command line expert. But before we move on, let me repeat - THIS IS FOR RESEARCH A ..read more
Visit website
Step-by-step macOS Setup for iOS Research (via @bizzybarney)
mac4n6.com
by Sarah Edwards
3y ago
CLI…WTF Command line interface (CLI) isn’t for everyone.  Trust me; I get it.  @iamevltwin forced me out of my comfort zone a few years ago and opened my eyes to the power of Terminal (command prompt on Mac).  Now it is pinned to the Dock on every Mac I use, but I still struggle at times and that is okay!  The internet provides plenty of support to help me along when I just can’t make something work.  I use and abuse my Notes application with random commands and ways to accomplish certain tasks in Terminal that I know I will want to recall sometime in the future.  ..read more
Visit website
Follow-on to DFIR Summit Talk: Lucky (iOS) 13: Time To Press Your Bets (via @bizzybarney)
mac4n6.com
by Sarah Edwards
4y ago
Facial Recognition in Photos One facet of my DFIR Summit talk I want to expand upon is a look into the Photos application, and a few of the derivative pieces of that endeavor.  While trying to focus on the topic of facial recognition, it seemed prudent to include a brief progression from snapping a photo thru to a persons name being placed beside their face in the Photos application.   When you use the Native camera and snap a photo, depending on user options, at least a few standard things occur.  It ultimately writes the newly taken photo to /private/var/mobile/Media/DCIM/1**A ..read more
Visit website
Socially Distant but Still Interacting! New and Improved Updates to macOS/iOS CoreDuet interactionC.db APOLLO Modules
mac4n6.com
by Sarah Edwards
4y ago
The interactionC.db database certainly does not get as much as attention as its CoreDuet partner in crime, knowledgeC.db. However, I think it has quite a bit of investigative potential. I’ve written about it before in a prior blog, however I’d like to give it more attention here. I spent this weekend updating the APOLLO modules to have more contextual support and better backwards compatibility with older iOS versions. This database was also introduced to the macOS side with 10.15.  I’ve added a new query for this database for the ZKEYWORDS table. This tables appears to capture keywords th ..read more
Visit website
APOLLO and tvOS – It Just Works! (...and judges me for binging TV)
mac4n6.com
by Sarah Edwards
4y ago
It’s been a while since I last jailbroke an Apple TV and had a forensic look at it. Using the checkra1n jailbreak, I decided to give it a try. The jailbreak itself was easy and went very smooth. This was using an 4th Gen Apple TV running tvOS 13.4 I wanted to run it through some of my APOLLO modules to see if any needed to be updated. Fortunately, none do as it acts just like iOS! (whew!) There is a noticeable lack of some files and databases compared to iOS proper, but some good ones are still accessible!  KnowledgeC.db Starting with my favorite database, knowledgeC.db you will ..read more
Visit website
Analysis of Apple Unified Logs: Quarantine Edition [Entry 11] – AirDropping Some Knowledge
mac4n6.com
by Sarah Edwards
4y ago
I’ve written about this before in this article but wanted to revisit it for this series. For this scenario I want to test what certain items might look like when they are AirDrop’ed from an unknown source. Many schools have been receiving bomb threats via AirDrop, I want to see if there is a way to discover where they originated from. In my testing you will see artifacts from two iOS devices: Sender: Elwood’s iPhone Receiver: miPhone11  Starting with the AirDrop basics – we need to determine the AirDrop ID for each user. One thing I’ve discovered since my last analysis was that the ..read more
Visit website
Guest Post by @bizzybarney! A Peek Inside the PPSQLDatabase.db Personalization Portrait Database
mac4n6.com
by Sarah Edwards
4y ago
The DFIR Twitter-sphere exploded this morning when @mattiaep mentioned /private/var/mobile/Library/PersonalizationPortrait/PPSQLDatabase.db. I’ve been doing some research work on this file and plan to present pieces of it during my talk at the upcoming SANS DFIR Summit. I reached out to @iamevltwin and asked if she would host a quick blog post and she graciously agreed - but I now owe her gin, and steak and cheese egg rolls. In all seriousness, a huge thank you to my good friend and mentor! Check out the upcoming Summit agenda here. View fullsize The PersonalizationPortrait directory is nativ ..read more
Visit website

Follow mac4n6.com on FeedSpot

Continue with Google
Continue with Apple
OR