OSXAuditor-a free Mac OS X computer forensics tool.
OS X Auditor
OS X Auditor is a free Mac OS X computer forensics tool.OS X Auditor parses and hashes the following artifacts on the running system or a copy of a system you want to analyze:
- the kernel extensions
- the system agents and daemons
- the third party's agents and daemons
- the old and deprecated system and third party's startup items
- the users' agents
- the users' downloaded files
- the installed applications
- the users' quarantined files
- the users' Safari history, downloads, topsites, LastSession, HTML5 databases and localstore
- the users' Firefox cookies, downloads, formhistory, permissions, places and signons
- the users' Chrome history and archives history, cookies, login data, top sites, web data, HTML5 databases and local storage
- the users' social and email accounts
- the WiFi access points the audited system has been connected to (and tries to geolocate them)
It can verify the reputation of each file on:
- Team Cymru's MHR
- VirusTotal
- your own local database
- /var/log (-> /private/var/log)
- /Library/logs
- the user's ~/Library/logs
- rendered as a simple txt log file (so you can cat-pipe-grep in them… or just grep)
- rendered as a HTML log file
- sent to a Syslog server
If you plan to run OS X Auditor on a Mac, you will get a full plist parsing support with the OS X Foundation through pyobjc: Dependencies
pip install pyobjc
pip install biplist
pip install plist
How to run
- OS X Auditor runs well with python >= 2.7.2 (2.7.9 is OK). It does not run with a different version of python yet (due to the plist nightmare)
- OS X Auditor is maintained to work on the lastest OS X version. It will do its best on older OS X versions.
- You must run it as root (or via sudo) if you want to use is on a running system, otherwise it won't be able to access some system and other users' files
- If you're using API keys from environment variables (see below), you need to use the
sudo -E
to use the users environment variables
osxauditor.py -h
to get all the available options, then run it with the selected optionseg.[sudo -E] python osxauditor.py -a -m -l localhashes.db -H log.html
Post a Comment