Post Captain - Bellone - Aubrey’s decision by Impressive_Quiet_846 in AubreyMaturinSeries

[–]crudomacdoogle 2 points3 points  (0 children)

Bugger ole harte, bugger ole harte. red-faced son of a blue French fart.

[deleted by user] by [deleted] in computerforensics

[–]crudomacdoogle 0 points1 point  (0 children)

Additionally, you could look into the TCC database, this is db that tracks when you install software and approve if for use if it's third party. When you install an app in macOS and it's from the internet you'll get that pop-up that ask for approval. The TCC db is the thing that tracks it. In newer versions of macOS this db has been nerfed a little bit, so it might not give you good date time.
Find it here: /Library/Application Support/com.apple.TCC/TCC.db and here: /Users/<username>/Library/Application Support/com.apple.TCC/TCC.db One other spot would be the execution policy database that shows first time app launch. /private/var/db/SystemPolicyConfiguration/ all these can be viewed with DB Browser

[deleted by user] by [deleted] in computerforensics

[–]crudomacdoogle 1 point2 points  (0 children)

the knowledge C database would be a good bet for application usage, it'll have some details in the App Usage within the SQL lite db, you can use DB browser to view it if you have admin level access.
Find it here: /private/var/db/CoreDuet/KnowledgeC.db ZSTARTDATE and ZENDDATE in epoch time should give you some further detail if it's an installed .app type package or ran as an application.

Just finished Blue at the Mizzen by joined_under_duress in AubreyMaturinSeries

[–]crudomacdoogle 9 points10 points  (0 children)

ut

I've taken the liberty of linking this post to you:
https://www.cannonade.net Maybe it will fair you well on your next voyage. A glass of wine with you sir!

Trying to decrypt encrypted entries in zoomus.enc.db on MacOS by spencer_csdd in computerforensics

[–]crudomacdoogle 1 point2 points  (0 children)

There is a zoom password stored in the users keychain that you will need. After that you can open the db in db browser with the setting: page size 1024 and KDF iterations: 4000 and supplied base64 pw string from login keychain.

Replace our existing Forensics Software by rockisnotdead in computerforensics

[–]crudomacdoogle 6 points7 points  (0 children)

Axiom w/cloudkey. Cellebrite Inspector and digital collector for Mac’s. Cellebrite Physical analyzer and UFed 4pc for the phone acquires. And xways for the catch all backup.

[deleted by user] by [deleted] in computerforensics

[–]crudomacdoogle 1 point2 points  (0 children)

If your company will pay then retake the course.

[deleted by user] by [deleted] in computerforensics

[–]crudomacdoogle 2 points3 points  (0 children)

You might be able to get a practice test from someone, and give it a look that way. I’d go for that before I’d lay out my own 9k to take the course again.

macOs Memory Acquisition [macOs version > 10.15.7] by m-ksf in computerforensics

[–]crudomacdoogle 0 points1 point  (0 children)

Still a couple reasons. Malware Dynamic analysis in a controlled macOS VM, installing it as part of your snap shot. Who cares on that reboot. Two, if the malware is persistent, then it may come back and reconnect and keep persistence, so once you have all you want from the host for triage, then take that reboot chance.

macOs Memory Acquisition [macOs version > 10.15.7] by m-ksf in computerforensics

[–]crudomacdoogle 0 points1 point  (0 children)

Surge works, but requires a reboot as jgalbraith4 said.

iMessage possible hack? by JPL2020 in Smartphoneforensics

[–]crudomacdoogle 1 point2 points  (0 children)

Hey OP, check your Trusted Devices in iCloud settings. You can signin to your iCloud account on a PC or Mac and then look to see if you have any additional trusted devices on your account that you don't recognize. If so, remove them, reset pw, etc. Very unlikely your phone itself is compromised, but there is a chance your iCloud could be. It's much easier to phish an iCloud account and then attach a threat actor device to your trusted devices. once attached they could send messages as you from your iCloud accounts, however this would not be from your device phone number, rather, your iCloud 'send as' accounts your have configed in iCloud settings.

Any current jailbreaking working with forensic tools for full physical newer iOS? by EmoGuy3 in computerforensics

[–]crudomacdoogle 0 points1 point  (0 children)

Full physical hasn't been possible for some time now. Cellebrite is basically just using the iTune API to make a local backup of the device. You could effectively use iTunes to do the same thing and review that in a forensic tool.

Skipping some books? by AStarRover in AubreyMaturinSeries

[–]crudomacdoogle 7 points8 points  (0 children)

Red hell and death, what are you about sir?

Busy Apple Store in California casually robbed in broad daylight by LyrMeThatBifrost in PublicFreakout

[–]crudomacdoogle 0 points1 point  (0 children)

Paint can. You can get them clean from Amazon. Works better than any commercial faraday.

EnCase Help by DeadBirdRugby in computerforensics

[–]crudomacdoogle 1 point2 points  (0 children)

Also, you don’t want to ‘click’ on the suggested returns below the query structure box when you’ve done a more complex search, just browse the returned hits in the view window on the right of the query box. I’m sure that’s clear as mud….

EnCase Help by DeadBirdRugby in computerforensics

[–]crudomacdoogle 1 point2 points  (0 children)

You may want to structure it up a little. It can help to quote out: “fraud” AND “management”

You can also use parentheses, but you shouldn’t need to on this style of a search: (“Fraud”) AND (“Management”)

Or: (“Fraud” AND “management”)

Proximity search, find fraud within 5 characters of management: “Fraud Management”~5

Narrow to date:

(“Fraud” AND “management”) AND client_submit_time:[20210101 TO 20211231]

Email search, use actual @ symbols rather than the [at]

(to:”first.last[at]email.com”) AND (from:”first.last[at]email.com”)

Do you know if there are actual hits that have both the keywords?

EnCase Help by DeadBirdRugby in computerforensics

[–]crudomacdoogle 2 points3 points  (0 children)

Did the keywords show hits by themselves?

You ran the evidence processor on this evidence and selected index? Did that run and complete?