Forensic Tools For Mac



Using forensic software does not, on its own, make the user a forensic analyst or the output court admissible. Publishing the whole or part of this list is licensed under the terms of the Creative Commons – Attribution Non-Commercial 4.0 license. Mac OS Tools Mobile Devices. Digital Forensics Framework. Digital Forensics Framework is another popular platform dedicated to.

Version 8 Beta

A Beta release of V8 of OSForensics for community testing and feedback is now available. Please see this forum post about the new features and the download link.

For

Older Versions

We are no longer working on older versions of OSForensics, but you can download the older versions of OSForensics on our website. This is purely for supporting users of the previous versions.

We recommend upgrading to Version 7 where possible, as we have improved many aspects of OSForensics and have addressed many issues based on user feedback.

If you do not wish to upgrade to Version 7, you can download old software releases here.

VersionDownload
OSForensics v6.1.1005Download
OSForensics v5.2.1007Download
OSForensics v4.0.1002Download

System requirements

Windows Vista, Win 7, Win 8, Win 10
Windows Server 2000, 2003, 2008, 2012, 2016, 2019
32bit and 64bit support, (64bit recommended)
Minimum 1GB of RAM. (8GB+ recommended)
200MB of free disk space, or can be run from USB drive

Download Hash Sets

OSForensics allows you to use Hash Sets to quickly identify known safe files (such as operating system and program files) or known suspected files (such as viruses, trojans, hacker scripts) to reduce the need for further time-consuming analysis. You can download some sample hash sets below. They are individually zipped.

Hash setsSizeDownload
Windows 10 Home v1709 build:16299 (x64) hash set37,376 KBDownload
Windows 8.1 Professional (x64) hash set10,228 KBDownload
Windows 8.1 (x64) hash set10,232 KBDownload
Windows 8 Professional (x64) hash set9,785 KBDownload
Windows 8 (x64) hash set9,785 KBDownload
Win7 Ultimate (32-bit) hash set18,825 KBDownload
Win7 Enterprise (x64) hash set11,670 KBDownload
Vista Business (32-bit) hash set8,475 KBDownload
Vista Business (x64) hash set8,069 KBDownload
XP Professional SP3 (32-bit) hash set1,889 KBDownload
XP Professional SP2 (x64) hash set1,456 KBDownload
Office 365 v1806 build:10228 (Win10) hash set1,528 KBDownload
Office 2007 Enterprise (Vista) hash set1,313 KBDownload
Office 2007 Enterprise (Win7) hash set1,978 KBDownload
Common Keyloggers hash set. Old set from 2010124 KBDownload
Common Keyloggers hash set on Win10 64bit, 2019
Already bundled with OSF V7
281 KBDownload
Common Peer to Peer P2P tools hash set on Win10 64bit, 2019.
Already bundled with OSF V7
1177 КВDownload
Common Cryptocurrency tools hash set on Win10 64bit, 2019.
Already bundled with OSF V7
761 KBDownload
Common VPN tools hash set on Win10 64bit, 2019.
Already bundled with OSF V7
761 KBDownload

The hash sets can also be purchased as a complete set pre-loaded onto a hard disk.

Installing the Hash Sets

To install the hash sets, you must download the individual zip files (linked above), and unzip them into the OSForensics program data folder.

On Vista, Windows 7, Server 2008+ & Win10, this would typically be the following folder (you may need to enable viewing of hidden directories to see it or enter it directly into the Explorer address bar):
C:ProgramDataPassMarkOSForensicshashSets

On XP and Server 2000/2003, it is typically something like this:
C:Documents and SettingsAll UsersApplication DataPassMarkOSForensicshashSets

You will then need to restart OSForensics if you have it currently open. When you next start OSForensics, you should now find additional sets listed in the tree view under the 'Hash Sets' module.

Download Rainbow Tables

OSForensics enables you to utilize Rainbow Tables to retrieve passwords given that you have the hash (encrypted text) of that password. The use of rainbow tables serve essentially as a time-memory trade off in the decryption of a hash. That is, they store precomputed password to hash pairs, so that instead of generating these pairs on the fly, you can just search for a hash in the table to recover the password corresponding to that hash. OSForensics can generate Rainbow Tables for different input parameters. Some example Rainbow Tables are available below for download. They are individually zipped. To install the Rainbow Tables for use with OSForensics, refer to the paragraph below. To use these rainbow tables for password retrieval, click the 'Retrieve Password with Rainbow Table' tab in the Passwords module of OSForensics. You can also download and use Indexed Rainbow Tables from rainbowtables.com (use RTI1 files only) with OSForensics.

Hash setsSizeDownload
md5_loweralpha-numeric#1-7_0_72656x4797112_OSF32.6 MBDownload
lm_alpha-numeric#1-7_0_23680x23656320_OSF172 MBDownload
sha1_loweralpha-numeric#1-6_0_4235x3708576_OSF20.4 MBDownload

The rainbow tables can also be purchased as a set pre-loaded onto a hard disk.

Installing the Rainbow Tables

Mac Marshall Forensic

Mac

To install the Rainbow Tables, you must download the individual zip files (linked above), and unzip them into the RainbowTables folder located in the OSForensics program data folder.

On Vista, Windows 7-10, and Server 2008 and up, this would typically be the following folder (you may need to enable viewing of hidden directories to see it or enter it directly into the Explorer address bar):
C:ProgramDataPassMarkOSForensicsRainbowTables

On XP and Server 2000/2003, it is typically something like this:
C:Documents and SettingsAll UsersApplication DataPassMarkOSForensicsRainbowTables

Mac os x forensics imager

If you already have OSForensics open, then you may need to click the 'Refresh' button under the rainbow tables display window to view the rainbow table/s you have added.

Home > Articles > Apple > Operating Systems

Forensic Tools For Mac

  1. Hardware Write Blockers
Page 1 of 4Next >
Part 1 of Ryan Faas' security series discussed the processes behind investigating inappropriate or criminal activities using data forensics, including the importance of not contaminating evidence by acquiring and working with forensic-quality disk images of affected hard drives. This article moves from the basic methods for performing a forensic investigation under Mac OS X to profiling the various tools that are available to perform such investigative work.
Like this article? We recommend
Real World Mac Maintenance and Backups

Like this article? We recommend

Like this article? We recommend

Mac Forensic Software

Hardware Write Blockers

Write blockers are physical devices that attach to SCSI, IDE, and SATA hard drives at one end and to a computer via FireWire or USB 2.0 on the other end. Similar to external drive enclosures, write blockers have one important additional feature: they prevent the computer from writing any data to the drive. As discussed in part 1 of this series, one of the principal rules of forensic investigation is to not contaminate your evidence, which even mounting a hard drive under normal conditions with Mac OS X (and most other operating systems) will do. While there are methods to acquire a disk image or copy of a disk using Mac OS X without using a write blocker, those methods are not foolproof and it is possible to accidentally mount or modify the evidentiary drive. Write blockers ensure that you cannot contaminate the drive and offer a way to prove that fact. They range in price from around $100 to upward of $500 depending on the features included.

Related Resources

  • Book $55.99

Autopsy Mac Os

  • eBook (Watermarked) $55.99

Mac Os X Forensics Imager

  • Web Edition $55.99