![]() The locations are being documented with screenshots. Currently, we are going through the image of the data gen VM and are finding the locations of the artifacts. The Mac OS X Forensics section is going great. Once the data generation was done for the Mac OS X Forensics section of this project, our team was split up: two members to continue on with Mac OS X Forensics to find the default locations of the artifacts and the other two members to start up the iOS Handoff section of the project. We were able to copy the VM we used for the data generation over to a Windows machine and use FTK Imager to create an e01 image of the VM to be analyzed in FTK. We used a virtual machine (VM) with the program VMware Fusion, running Yosemite 10.10 for the data generation. ![]() ![]() The plan was to to generate all the artifacts in this list in order to compare it to OS X Yoesmite and create a lit of our own. We used this list as our initial starting point and point of reference for our data generation. We were able to find a list of Mac OS X Lion artifacts and their location used in a OS X Lion Artifact report by Sean Cavanaugh. Our team has made a lot of progress over the months since the start of this project. Mac OS X Forensics: Mac OS x yOSEMITE and iOS Handoff Mac OS x and iOS Handoff Progress and Roadblocks
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |