Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/ydkhatri/mac_apt
macOS (& ios) Artifact Parsing Tool
https://github.com/ydkhatri/mac_apt
dfir forensics macos
Last synced: about 1 month ago
JSON representation
macOS (& ios) Artifact Parsing Tool
- Host: GitHub
- URL: https://github.com/ydkhatri/mac_apt
- Owner: ydkhatri
- License: mit
- Created: 2017-08-24T15:37:33.000Z (over 7 years ago)
- Default Branch: master
- Last Pushed: 2024-05-11T09:42:09.000Z (7 months ago)
- Last Synced: 2024-05-19T06:06:13.270Z (7 months ago)
- Topics: dfir, forensics, macos
- Language: Python
- Homepage: https://swiftforensics.com
- Size: 6.95 MB
- Stars: 719
- Watchers: 44
- Forks: 99
- Open Issues: 7
-
Metadata Files:
- Readme: README.md
- Changelog: CHANGES.txt
- License: LICENSE.txt
- Authors: AUTHORS.md
Awesome Lists containing this project
- awesome-rainmana - ydkhatri/mac_apt - macOS (& ios) Artifact Parsing Tool (Python)
- ForensicsTools - mac_apt (macOS Artifact Parsing Tool) - Extracts forensic artifacts from disk images or live machines (Challenges / OS X Forensics)
- osx-and-ios-security-awesome - mac_apt - macOS Artifact Parsing Tool for forensic analysis. (macOS Security)
- awesome-apple-security - mac_apt - Plugin based forensics framework for quick mac triage that works on live machines, disk images or individual artifact files. (Forensics / Acquisition and Evidence Collection)
README
# mac_apt - macOS (and iOS) Artifact Parsing Tool
[![Latest version](https://img.shields.io/badge/version-v1.5.8-blue)](https://github.com/ydkhatri/mac_apt/releases/tag/v1.5.8-dev)
[![status](https://img.shields.io/badge/status-stable-green)]()[![Latest version](https://img.shields.io/badge/version-v1.7.5.dev-blue)](https://github.com/ydkhatri/mac_apt/releases/tag/v1.7.5.dev)
[![status](https://img.shields.io/badge/status-development-orange)]()mac_apt is a DFIR (Digital Forensics and Incident Response) tool to process Mac computer full disk images (**or _live_ machines**) and extract data/metadata useful for forensic investigation. It is a python based framework, which has plugins to process individual artifacts (such as Safari internet history, Network interfaces, Recently accessed files & volumes, ..)
mac_apt now also includes **[ios_apt](https://swiftforensics.com/2020/12/introducing-iosapt-ios-artifact-parsing.html)**, for processing ios images.
#### Requirements: Python 3.9 or above (64 bit)
_Note: Tested upto Python 3.12 on Windows and macOS._
#### Features
* Cross platform (no dependency on pyobjc)
* Works on E01, VMDK, AFF4, DD, split-DD, DMG (no compression), SPARSEIMAGE & mounted images
* XLSX, CSV, TSV, Sqlite outputs
* Analyzed files/artifacts are exported for later review
* zlib, lzvn, lzfse compressed files are supported!
* Native HFS & APFS parser
* Reads the Spotlight database and Unified Logging (tracev3) files#### Latest
:heavy_check_mark: Can read Axiom created targeted collection zip files
:heavy_check_mark: ios_apt can read GrayKey extracted file system
:heavy_check_mark: Can read [RECON](https://sumuri.com/software/recon-itr/) and [ASLA](https://github.com/giuseppetotaro/asla) created .sparseimage files
:heavy_check_mark: Support for macOS Big Sur Sealed volumes (11.0)
:heavy_check_mark: Introducing **ios_apt** for processing iOS/ipadOS images
:heavy_check_mark: FAST mode :hourglass_flowing_sand:
:heavy_check_mark: Encrypted :lock: APFS images can now be processed using password/recovery-key :key:
:heavy_check_mark: macOS Catalina (10.15+) separately mounted SYSTEM & DATA volumes now supported
:heavy_check_mark: AFF4 images (including Macquisition/DigitalCollector created) are supportedAvailable Plugins (artifacts parsed) | Description
------------------ | ---------------
APPLIST | Reads apps & printers installed and/or available for each user from appList.dat
ARD | Reads ARD (Apple Remote Desktop) cached databases about app usage
ASL | Reads ASL (Apple System Log) from asl.log, asl.db and ".asl" files
AUTOSTART | Retrieves programs, daemons, services set to start at boot/login
BASICINFO | Basic machine & OS configuration like SN, timezone, computer name, last logged in user, HFS info
BLUETOOTH | Gets Bluetooth Artifacts
CALLHISTORY | Reads call history database
CFURLCACHE | Reads CFURL cache to URLs, requests and responses
CHROMIUM | Read Chromium Browsers (Edge, Chrome, Opera,..) History, Top Sites, Downloads and Extension info
COOKIES | Reads .binarycookies, .cookies files and HSTS.plist for each user
CRASHREPORTER | Reads crash reporter plists
DOCKITEMS | Reads the Dock plist for every user
DOCUMENTREVISIONS | Reads DocumentRevisions database
DOMAINS | Active Directory Domain(s) that the mac is connected to
FILESHARING | Read shared folder info
FIREFOX | Read internet history from Mozilla Firefox browser
FSEVENTS | Reads file system event logs (from .fseventsd)
IDEVICEBACKUPS | Reads and exports iPhone/iPad backup databases
IDEVICEINFO | Reads and exports connected iDevice details
IMESSAGE | Read iMessage chats
INETACCOUNTS | Retrieve configured internet accounts (iCloud, Google, Linkedin, facebook..)
INSTALLHISTORY | Software Installation History
MSOFFICE | Reads Word, Excel, Powerpoint and other office MRU/accessed file paths
MSRDC | Reads connection history from Microsoft Remote Desktop database and extracts thumbnails
NETUSAGE | Read network usage data statistics per application
NETWORKING | Interfaces, last IP address, MAC address, DHCP ..
NOTES | Reads notes databases
NOTIFICATIONS | Reads mac notification data for each user
PRINTJOBS | Parses CUPS spooled print jobs to get information about files/commands sent to a printer
QUARANTINE | Reads the quarantine database and .LastGKReject file
QUICKLOOK | Reads the QuickLook index.sqlite and carves thumbnails from thumbnails.data
RECENTITEMS | Recently accessed Servers, Documents, Hosts, Volumes & Applications from .plist and .sfl files. Also gets recent searches and places for each user
SAFARI | Internet history, downloaded file information, cookies and more from Safari caches
SAVEDSTATE | Gets window titles from Saved Application State info
SCREENSHARING | Reads the list of connected hosts with Screen Sharing
SCREENTIME | Reads ScreenTime database for program and app usage
SPOTLIGHT | Reads the spotlight index databases
SPOTLIGHTSHORTCUTS | User typed data in the spotlight bar & targeted document/app
SUDOLASTRUN | Gets last time sudo was used and a few other times earlier (if available)
TCC | Reads Transparency, Consent and Control (TCC) database
TERMINALSTATE | Reads Terminal saved state files which includes full text content of terminal windows
TERMSESSIONS | Reads Terminal (bash & zsh) history & sesions for every user
UNIFIEDLOGS | Reads macOS unified logging logs from .tracev3 files
USERS | Local & Domain user information - name, UID, UUID, GID, account creation & password set dates, pass hints, homedir & Darwin paths
UTMPX | Reads utmpx file
WIFI | Gets wifi network information
XPROTECT | Reads XProtect diagnostic files and XProtect Behavior Service database### Coming soon..
* More plugins
* More documentationFor installation (to run from code) see https://github.com/ydkhatri/mac_apt/wiki/Installation-for-Python3
**Please read the documentation here:** https://github.com/ydkhatri/mac_apt/wikiTo download windows binaries, proceed here - https://github.com/ydkhatri/mac_apt/releases
## Bugs
Feel free to send comments and feedback to [email protected], or open an [issue](https://github.com/ydkhatri/mac_apt/issues).[![Tweet](https://img.shields.io/twitter/url?style=social&url=https%3A%2F%2Ftwitter.com%2Fswiftforensics)](https://twitter.com/swiftforensics)