THE DFIR BLOG
Menu

Blog

Top 10 Must-Read Cybersecurity Books for 2024: Protect Yourself in the Digital Age

8/10/2024

0 Comments

 
Picture
In an era where digital threats loom larger than ever, staying informed about cybersecurity is crucial for everyone, from tech enthusiasts to business leaders. As cyber attacks become more sophisticated, the need for robust defense strategies has never been more critical. Whether you're looking to safeguard your personal data or fortify your organization against potential breaches, these top 10 cybersecurity books for 2024 offer invaluable insights and practical knowledge to keep you one step ahead of cybercriminals.
Why Cybersecurity Matters More Than EverBefore we dive into our list, let's consider why cybersecurity has become a hot topic:
  • Rising Cyber Threats: The frequency and complexity of cyber attacks are increasing yearly.
  • Data Privacy Concerns: With more of our lives online, protecting personal information is paramount.
  • Economic Impact: Cybercrime costs the global economy billions annually.
  • National Security: Cyber warfare is now a significant concern for governments worldwide.
Now, let's explore the must-read cybersecurity books that will equip you with the knowledge to navigate this digital minefield.

1. "The Art of Invisibility" by Kevin Mitnick
Genre: Cybersecurity, Privacy
Key Themes: Online anonymity, privacy protection, surveillance evasion

Kevin Mitnick, once the world's most wanted hacker, now shares his expertise on staying invisible in our hyper-connected world. This book is your ultimate guide to:
  • Protecting your identity online
  • Safeguarding your personal information from prying eyes
  • Understanding and countering modern surveillance techniques
Why It's a Must-Read: In an age where our digital footprints are constantly tracked, Mitnick's insights are invaluable for anyone concerned about their online privacy.

2. "Cybersecurity for Dummies" by Joseph Steinberg
Genre: Cybersecurity, Guidebook
Key Themes: Basic cybersecurity concepts, personal and workplace security

Don't let the title fool you – this book is a goldmine of information for both beginners and those looking to refresh their knowledge. Steinberg breaks down complex concepts into easily digestible chunks, covering:
  • Fundamental cybersecurity principles
  • Practical tips for securing your devices and networks
  • Strategies for protecting yourself against common cyber threats
Why It's a Must-Read: Its accessibility makes it perfect for anyone looking to build a solid foundation in cybersecurity.

3. "Cult of the Dead Cow" by Joseph Menn
Genre: Cybersecurity, History
Key Themes: Ethical hacking, evolution of cybersecurity

This book offers a fascinating look into one of the most influential hacking groups in history. Menn's narrative:
  • Traces the group's impact on modern cybersecurity practices
  • Explores the ethical dilemmas faced by hackers
  • Highlights the importance of responsible disclosure in cybersecurity
Why It's a Must-Read: It provides crucial historical context for understanding today's cybersecurity landscape.

4. "The Fifth Domain" by Richard A. Clarke and Robert K. Knake
Genre: Cybersecurity, National Security
Key Themes: Cyber warfare, national defense strategies

Clarke and Knake, both former White House cybersecurity experts, offer a comprehensive look at:
  • The challenges of defending against nation-state cyber attacks
  • Strategies for improving national cybersecurity
  • The future of cyber warfare and its global implications
Why It's a Must-Read: Essential for understanding the broader geopolitical implications of cybersecurity.

5. "Ghost in the Wires" by Kevin Mitnick
Genre: Autobiography, Cybersecurity
Key Themes: Hacking techniques, cybersecurity from a hacker's perspective

In this thrilling autobiography, Mitnick recounts his journey from notorious hacker to respected security consultant. Readers will gain insights into:
  • The mindset and methods of hackers
  • The evolution of cybersecurity measures
  • The cat-and-mouse game between hackers and law enforcement
Why It's a Must-Read: It offers a unique, insider's perspective on the world of hacking and cybersecurity.

6. "Sandworm" by Andy Greenberg
Genre: Cybersecurity, Investigative Journalism
Key Themes: Cyber warfare, state-sponsored hacking

Greenberg's investigation into the notorious Sandworm hacking group reveals:
  • The reality of modern cyber warfare
  • The potential for cyber attacks to cause real-world damage
  • The challenges of attributing and combating state-sponsored cyber attacks
Why It's a Must-Read: It provides a sobering look at the potential for cyber attacks to disrupt critical infrastructure.

7. "Countdown to Zero Day" by Kim Zetter
Genre: Cybersecurity, Technology
Key Themes: Cyber weapons, Stuxnet, cyber espionage

Zetter's deep dive into the Stuxnet virus offers:
  • A detailed analysis of the world's first digital weapon
  • Insights into the development and deployment of cyber weapons
  • A look at the future of cyber warfare
Why It's a Must-Read: It's crucial for understanding the evolving nature of cyber threats and warfare.

8. "Hacking: The Art of Exploitation" by Jon Erickson
Genre: Cybersecurity, Technical Guide
Key Themes: Exploitation techniques, hacking methodology

This technical guide is perfect for those wanting to understand hacking from a hands-on perspective:
  • Explains fundamental concepts of system exploitation
  • Provides practical examples and exercises
  • Covers both offensive and defensive techniques
Why It's a Must-Read: It's an essential resource for aspiring cybersecurity professionals and ethical hackers.

9. "Operationalizing Threat Intelligence" by Kyle Wilhoit and Joseph Opacki
Genre: Cybersecurity, Professional Guide
Key Themes: Threat intelligence, operational security

This book offers actionable insights for organizations looking to enhance their cybersecurity posture:
  • Strategies for developing effective threat intelligence programs
  • Methods for integrating threat intelligence into security operations
  • Best practices for responding to emerging threats
Why It's a Must-Read: It's invaluable for cybersecurity professionals looking to improve their organization's defense strategies.

10. "The DevSecOps Playbook" by Sean D. Mack
Genre: Cybersecurity, DevOps
Key Themes: DevSecOps, secure software development

Mack's guide is essential for integrating security into the software development lifecycle:
  • Explains the principles of DevSecOps
  • Offers practical strategies for implementing security in agile environments
  • Provides tools and techniques for continuous security testing
Why It's a Must-Read: It's crucial for anyone involved in software development and security, especially in fast-paced environments.

Empower Yourself with Knowledge
As cyber threats continue to evolve, staying informed is your best defense. These top 10 cybersecurity books for 2024 offer a comprehensive overview of the current digital security landscape, from personal privacy to national security concerns. By delving into these works, you'll gain the knowledge and skills needed to protect yourself, your data, and potentially your organization from the ever-present dangers lurking in the digital world.
Remember, in the realm of cybersecurity, knowledge truly is power. Start your journey towards better digital security today by picking up one of these essential reads. Your future self will thank you for taking this crucial step towards cyber resilience.

What's your favorite cybersecurity book? Have you read any of the ones on this list? Share your thoughts and recommendations in the comments below!
0 Comments

Study Plan for CISSP Certification: Tips, Resources, and Strategies

7/6/2024

0 Comments

 
Picture
Action: Please share your Tips, Techniques, and Strategies in the comment section for the Aspirants.
​
Introduction

The CISSP (Certified Information Systems Security Professional) certification is a globally recognized standard of achievement in the cybersecurity field. Earning this certification demonstrates your expertise and commitment to the profession. However, passing the CISSP exam requires a well-structured study plan and dedication. This guide will walk you through a comprehensive study plan, essential resources, and key strategies to help you succeed.

Understanding the CISSP Domains:
The CISSP exam covers eight domains that encompass a broad range of cybersecurity topics:
  1. Security and Risk Management
  2. Asset Security
  3. Security Architecture and Engineering
  4. Communication and Network Security
  5. Identity and Access Management (IAM)
  6. Security Assessment and Testing
  7. Security Operations
  8. Software Development Security
Understanding these domains is crucial as they form the foundation of the CISSP exam.

Study Plan
I started my CISSP preparation with the Sybex Official Study Guide. Initially, it felt overwhelming. While the content was simple and effective for a security professional, it was extensive and seemed daunting for the exam.

Realizing I needed a different approach, I turned to online video courses and YouTube tutorials. There are numerous options available, so you can choose based on your budget. I found that handwritten notes based on the exam outline (through my research work) were incredibly beneficial. This method helped me focus on the key concepts, and I highly recommend it.
Essential ResourcesTo enhance my understanding, I referred to several essential resources:
  • Sunny Classroom for Domain 4 concepts.
  • Prabh Nair for the core concepts of each domain.
  • Destination Certification MindMaps for regular revision.
  • Pete Zerger for memorization tips.
  • Andrew Ramdayal for practice questions.
Practice QuestionsI found that practicing questions was crucial. Boson and LearnZapp were my go-to platforms for this. They provided a wide range of questions that helped me familiarize myself with the exam format and the types of questions asked.

Exam Experience
The exam itself was relatively straightforward, but it included some research questions that were particularly challenging. These questions caused confusion, and at times, I felt like I might fail. However, the exam ended at 100 questions. I took a 5-minute break during the exam to calm my nerves, which was very helpful.
Key Takeaways
  1. Understand Core Concepts: Focus on grasping the core concepts of each domain instead of rote memorization.
  2. Read Carefully: Read each question twice and use the elimination technique to narrow down your answers.
  3. Stay Calm: Don’t panic if the exam confuses you with research questions. Stay focused.
  4. Practice Makes Perfect: More practice questions lead to a higher chance of passing the exam.
  5. Revision is Essential: The volume of content can be overwhelming. Regular revision is key to retaining information.
  6. Personalized Notes: Create your notes from various sources. This not only aids in passing the exam but also helps you become a better security professional.

Setting a Study Schedule
Creating a realistic and effective study schedule is crucial. Dedicate a certain number of hours per week to studying, balancing work and study. Set milestones to track your progress and ensure you cover all the domains thoroughly.

Study Techniques
Implement various study techniques such as active recall, spaced repetition, and mind mapping. These techniques can improve retention and understanding, making your study sessions more effective.
Choosing the Right Study Materials
Select the best study materials, including books, online courses, and practice exams. Recommendations include:
  • Sybex Official Study Guide
  • Destination Certification
  • Cybrary
  • Prabh Nair
  • Prashant Mohan
  • Andrew Ramdayal
  • Study Notes and Theory

Joining Study Groups
Joining study groups or online forums can provide additional support and resources. Engage with communities of CISSP aspirants to share knowledge, ask questions, and stay motivated.

Taking Care of Mental and Physical Health
Maintaining mental and physical health during the preparation period is essential. Manage stress, stay motivated, and ensure proper rest and nutrition to keep your mind sharp and focused.

Exam Day Tips
Practical tips for exam day include:
  • Bring necessary identification and materials.
  • Manage your time effectively during the exam.
  • Stay calm and focused, especially during difficult questions.
  • Take breaks if needed to clear your mind.

Post-Exam Steps
After the exam, whether you pass or fail, there are important steps to take. If you pass, celebrate your achievement and plan your next career move. If you don’t pass, review your study plan, identify weak areas, and prepare to retake the exam.

Frequently Asked Questions (FAQs)
Q: How long should I study for the CISSP exam? A: It varies, but typically, 3-6 months of dedicated study is recommended.
Q: What are the best resources for CISSP preparation? A: Sybex Official Study Guide, Boson practice exams, and video courses from platforms like CBT Nuggets and Cybrary.
Q: How many practice questions should I do? A: Aim for at least 1,000 practice questions to cover a wide range of topics and question types.
Additional ResourcesList additional resources such as blogs, websites, books, and courses that can further aid in their CISSP preparation:
  • CISSP Exam Cram
  • Kelly Handerhan’s CISSP course on Cybrary
  • CISSP Study Guide by Eric Conrad
​
By following this study plan and leveraging these resources, you can effectively prepare for the CISSP certification and ace the exam. Good luck!


Download the Customizable CISSP Study Plan Tracker

cissp_study_plan_tracker.xlsx
File Size: 10 kb
File Type: xlsx
Download File

Subscribe to Newsletter
0 Comments

31 fun cybersecurity search engines

1/2/2023

0 Comments

 

1. DeHashed—View leaked credentials.

2. SecurityTrails—Extensive DNS data.
3. DorkSearch—Really fast Google dorking.
4. ExploitDB—Archive of various exploits.
5. ZoomEye—Gather information about targets.
6. Pulsedive—Search for threat intelligence.
7. GrayHatWarfare—Search public S3 buckets.
8. PolySwarm—Scan files and URLs for threats.
9. Fofa—Search for various threat intelligence.
10. LeakIX—Search publicly indexed information.
11. DNSDumpster—Search for DNS records quickly.
12. FullHunt—Search and discovery attack surfaces.
13. AlienVault—Extensive threat intelligence feed.
14. ONYPHE—Collects cyber-threat intelligence data.
15. Grep App—Search across a half million git repos.
16. URL Scan—Free service to scan and analyse websites.
17. Vulners—Search vulnerabilities in a large database.
18. WayBackMachine—View content from deleted websites.
19. Shodan—Search for devices connected to the internet.
20. Netlas—Search and monitor internet connected assets.
21. CRT sh—Search for certs that have been logged by CT.
22. Wigle—Database of wireless networks, with statistics.
23. PublicWWW—Marketing and affiliate marketing research.
24. Binary Edge—Scans the internet for threat intelligence.
25. GreyNoise—Search for devices connected to the internet.
26. Hunter—Search for email addresses belonging to a website.
27. Censys—Assessing attack surface for internet connected devices.
28. IntelligenceX—Search Tor, I2P, data leaks, domains, and emails.
29. Packet Storm Security—Browse latest vulnerabilities and exploits.
30. SearchCode—Search 75 billion lines of code from 40 million projects.
31 Snusbase — Search OSINT Data

0 Comments

Hackthebox Easy Phish

10/20/2019

 
Challenge: Customers of secure-startup.com have been recieving some very convincing phishing emails, can you figure out why?
Picture

Hack the box - Illumination Forensic challenge

10/20/2019

 
Challenge: A Junior Developer just switched to a new source control platform. Can you find the secret token?

Hackthebox has provided a Zip File for the analysis. Please see the content of the Zip file below (Notice the .git folder)


Picture
Picture

Why every organization must have a Digital Forensics and Incident Response Team?

9/13/2019

 
The point of security is to keep the bad things from happening and support the occurrence of good things. When Bad things happen to an organization, they usually go to law enforcement and the legal system for compensations. To get the legal support - they must demonstrate that the crime was committed that the suspect committed the crime. It means that the organization must provide a trail of evidence to convince the legal system to support them. This is relatively challenging things to do, and an organization will need Digital Forensics and Incident response teams to run and develop evidence for them. Security teams must think in terms of Legally Defensible Security. 

Fast Flux - DNS

9/7/2019

 
Domain Name Server (DNS) is one of the most common protocol. We use it multiple times a day without realizing it. Popularly known for converting a do main name into an IP address. Think of it as a glue between human and the network. Newer Content Delivery Networks (CDN) use DNS to ensure a client is send to the server closest to it's geography.

In today's post we are going to talk about the common DNS attacks used by malwares called Fast Flux. This may fall under the "Command and Control" Category in MITRE ATT&CK Framework.

In order to avoid blocking a malware owner quickly changes the resolved IP Addresses. So, every-time you'll query a host-name it'll give you a different IP Address. Usually, time to live (TTL) for each IP address is around 300 Seconds.  This technique is most commonly used by Botnets. A key thing to remember is the DNS Servers participates in the Fast-Flux is usually for Malicious purpose.

Investigation Tips:

Look for TTL < 300
DNS Count > 12
Recently registered domain.
Learn more about Fast Flux: http://www.honeynet.org/node/136


Hack the box - Reminiscent

7/29/2019

 
Suspicious traffic was detected from a recruiter's virtual PC. A memory dump of the offending VM was captured before it was removed from the network for imaging and analysis. Our recruiter mentioned he received an email from someone regarding their resume. A copy of the email was recovered and is provided for reference. Find and decode the source of the malware to find the flag.

Note: Find and Decode the source of the malware to find the flag. The reading the email file we know following information

Filename: resume.zip
IP: http://10.10.99.55:8080/resume.zip

Used following command to analyze the process
Picture
Found some suspicious stuff
Picture
Used netscan plugin to analyze the network connection and identified that process powershell is connecting to the Malicious IP address found the email. The malicious process is powershell 2752.
Picture
Lets perform a filescan and see if we can find the resume file in the memory.
Picture
We have some hits - lets dump them out and do strings on them.
Picture
Lets do strings on the dumped files.
Picture
There is some data in Base 64 - lets use cyberchef to decode it.
Picture
The output of base 64 has another base64 encoding in it. Looks like someone is running powershell
Picture
Finally we got some readable text and I can see the flag HTB{$_j0G_y0uR_M3m0rY_$}  in it.

Picture

Hack the box - "Took the byte"

7/21/2019

 
Someone took my bytes! Can you recover my password for me?

Well, this challenge is not as easy as it looks for 20 points, but tools like CyberChef helps us in solving it quickly. Load the file in CyberChef and enjoy the magic!

Upload the password file to cyber chef and use the following Recipe available in the image below:
​
Picture

Google Rapid Response (GRR) for the Blue Team - Docker

7/21/2019

 
Docker has a great possibilities in the incident response space. In this post, we'll talk about implementing Google Rapid Response via Docker. If you are new to docker please read my previous post about Docker Primer. I'll walk you though the step by step process to implement GRR with Docker and perform some forensic operations on Mac, Windows, Linux and Cloud endpoints. Here is the docker image of GRR: hub.docker.com/r/grrdocker/grr
Run this command to pull the docker image on your server.



Picture

    
Picture

    
Picture

    

What is Endpoint Detection and Response (EDR)?

7/20/2019

 
Pretty much are security-savvy companies uses EDR Tools like CrowdStrike, Carbon Black, Sentinel One, Endgame, etc. They are host-based continuous monitoring tools. They are primarily used for Anomaly Detection, Threat Hunting, and Incident Response Support.  Agents are deployed over a large volume of endpoints hosts, and all the activity is sent to a centralized database. 
What can you do with the data from the EDR Tool?
  • Historical Searching, Scoping, and Remediation.
  • Real-time visibility
  • Pattern Analysis and IOC matching 

All the data can also be sent to SIEM Application like Splunk, Humio, or ELK Stack. Choice of the free text search depends on a budget of the team. EDR tools are great and offer visibility across the organization. Visibility is critical during an event of intrusion.

One key thing to remember is EDR is not a forensic tool. It'll not collect the complete data set. EDR tools are Proactive, and Forensic tools are Reactive. 
​

If you wish to learn more about the EDR and SIEM Application.Lima Charlie(https://www.limacharlie.io/), an EDR Tool, offers two free agents, and Humio Cloud a SIEM application provides a free tier (https://cloud.humio.com/). You can deploy the free agents on your home lab and forward the data to Humio simulating the small size corporate environment. 

Docker Primer

7/16/2019

 
The image below is an older way to doing things. The image is pretty much self explanatory. Setting up a full stack manually is pretty complex plus you've to deal with compatibility issues as the things changes. The solution is using containerized approach via Docker. Imaging a situation where you've to enter all the commands manually to setup this environment plus keep a track of changes. Isn't it too much?
Picture
Why you need docker?
Below is an image of Dockerized approach. Each component (App) is inside a standalone container fulfilling all it's requirement (Libraries and Dependencies) completely isolated from other app containers.
Picture

Setting up the container environment is hard and complex as they are very low level. Here, Docker offers a high level tool with powerful functions and making it easy for end user to create a container. Solves - Compatibility issue, Easy to use



Picture
So the question is what is a container?
Containers are completely isolated environment. Think of them as a Virtual Machine except they all share same OS kernel.Key thing to remember here is Docker is not meant to run different OS on top of same hardware like Hypervisor in VM.

Docker only cares about the underlying Kernel. In case of Linux, it dosen't matter what distribution (RHEL, Ubuntu, Suse etc) you are running - Docker only care about the Linux kernel.
Container vs VMs
As you can see below in the image. Docker can manage container with Library and Dependencies alone while in case of Hypervisor each virtual machine has it's own Operating System inside it. This is an overhead and due to multiple OS and Kernels it's not efficient and have higher utilization. Consumes higher disk spaces as compared to docker container which also results in quicker boot times for dockerized environment.

With Hypervisor - Higher Utilization of resources, Consumes more space and takes longer to boot up.
Picture
What is the difference between Docker Image and Docker Container?
Well Docker Image is a package/template/plan to create one or more container and containers are running instances of the images. Lot of products are already dockerized but if you cannot find one for your app - you can create your own image too.
What's next?
Install Community Edition and create an account on docker hub.
Docker Hub: https://hub.docker.com/
Docker Installation
Docker installation is pretty straight forward and well documented. Please use the link below to access installation documentation: 
https://docs.docker.com/install/linux/docker-ce/ubuntu/
Docker Commands

    

Docker & Forensics

While searching across docker hub, I stumbled upon a working image of SANS SIFT.
Here is the link: https://hub.docker.com/r/gourav5660/sans_sift_forensics

Enable Ex-fat in Ubuntu

7/4/2019

 
I often face problem in mounting/accessing ex-fat drives/usb sticks in Ubuntu. You can access/mount exfat drives by running following commands:
  • sudo add-apt-repository universe
  • sudo apt update
  • sudo apt install exfat-fuse exfat-utils

SSH (Secure shell) Primer & Attacks

7/2/2019

 
I use SSH Command Pretty much everyday. Just want to share some basics of SSH here in my blog
  • It’s a communication Protocol
  • Traffic is encrypted unlike telnet (Telnet is not encrypted) 
  • SSH is the client and SSHD is there server ( Open SSH Daemon)
  • SSHD sits and listen for SSH Connection 
  • SSHD config file for security hardening
# Authentication Methods:
Command:> ssh [email protected] 
  • Password
  • Public/Private Key Pair (Recommended way)
  • Host based - file known host

# Generating Keys 
Command:>  ssh-keygen 
  • ~/.ssh/id_rsa (Private Key)
  • ~/.ssh/id_rsa.pub (Public Key)
Public key goes into server “Authorized_keys” file 

# Invalidate SSH certificates?
  • ssh-add -D

Hack the Box - MarketDump

6/17/2019

 
The Forensics CTF Challenge is from Hackthebox.eu. Please see the details of the challenge and download the file from this link: 
https://www.hackthebox.eu/home/challenges/Forensics

We have got informed that a hacker managed to get into our internal network after pivoiting through the web platform that runs in public internet. He managed to bypass our small product stocks logging platform and then he got our costumer database file. We believe that only one of our costumers was targeted. Can you find out who the customer was?

They have provided a pcap file for the analysis. For the analysis you need to follow the TCP Stream. 
Picture
Once you start following in TCP Stream, you'll find the exfiltration information in the 1056 Stream.
Picture
Scroll down and review the content, it's fairly easy to notice the encoded flag in the data.
Picture
Use CyberChef Magic Recipe to decode the flag.
Picture

Critical Web Security Risks - Injection

6/12/2019

 
#Injection: 
Websites and apps occasionally need to run commands on the underlying databases or operating system to add or delete data, execute a script, or start other apps. If unverified inputs are added to a commands string or a database command, attackers can launch commands at will to take control of a server, device or data.

How does it work?
​If a website, app or device incorporates user input within a command, an attacker can insert a "payload" command directly into said input. If that input is not verified, an attacker then "injects" and runs their own commands.

Why it's bad?
Once attacker can make commands, they can control your website, apps and data.

Example:
SQL Injection was used in SONY Hack in 2014. The attackers used Server Message Block Worm tool to install several malicious components, including a backdoor and other tools. 
The SMB Worm Tool was equipped with five components, including a Listening Implant, Lightweight Backdoor, Proxy Tool, Destructive Hard Drive Tool, and Destructive Target Cleaning Tool. The worm moves throughout an infected network through brute-force authentication attacks on windows SMB Share and connects to a command and control (C2) infrastructure with servers located in Thailand, Poland, Italy, Bolivia, Singapore, and the United States​

Linux Group Command

5/14/2019

 
Code Editor

    

Marshal in the Middle

3/10/2019

 
Hack the box Forensic Challenge Library:
The security team was alerted to suspicious network activity from a production web server.Can you determine if any data was stolen and what it was?

Solution:
 Hackinthebox will provide you following data - pcapng file, and lot of bro logs:
Picture
While reviewing the log files - I noticed pastebin.com access from ip 10.10.20.13
Picture

​

Picture
Decrypte the data by the secrets.log file provided by hackthebox to view the content in plain text
Picture
Followed the TCP Stream for ip.addr == 10.10.20.13
Picture
There was a post request made (as seen in about screenshot). Filters packets by HTTP Post
Picture
Credit Card Data in Plain Text
Picture
Hack the box key below:
Picture





How to add TimeStamp to Bash History in Mac

4/5/2018

 
echo 'export HISTTIMEFORMAT="%d/%m/%y %T "' >> ~/.bash_profile
source
~/.bash_profile

Filesystem HFS+/APFS

4/4/2018

 
​Filesystem 
HFS+ (Hierarchical File System) (1998 – 2018)
  • macOS 10.12-
  • iOS 10.2-
  • Big Endian (Flip Hex Editor)
 
APFS (Apple File System)
  • macOS 10.13+
  • iOS 10.3+
  • Similar to HFS and Additional Stuff like highly nested stuff
  • Keep eye on Blog
 
HFS+ Volume Header & Special FilesCatalog File (Forensics Gold) - BTree
Extents Overflow – B Tree
Attributes File (Forensics Gold)  – BTree
 
Volume Header & Example
  • Lot of meta data
  • Fsstat/hdiutil
 
B-TreesThink of it as a FLAT File
  • Also used in APFS
  • Used by Catalog, Attributes, Extents Overflow File
  • Used for efficiency in searching stored data
  • Made up of Nodes, Records, Keys (Catalog ID – Unique Value) & Data
  • Ordered Key
  • Header Node (always 1 and always at 0)
  • Map Node (Allocation type of data)
  • Index Data is like Pointers
  • Leaf Node (Forensic Gold) – This will contain filesystem metadata.
  • Read page 18-19
  • FF notified a leaf node
  • 01 is header
Leaf Node
  • Bottom of  a tree
  • Key Length – Always 2 Bytes in HFS +
  • There are random null bytes for padding
Catalog File
  • Hold File System Metadata
  • CNID or i-node number
  • First 15 Reserved by Apple
  • 4 is catalog Files
  • 6 is allocation File
  • Sort by CNID
  • Sleuth kit is used to extract out catalog file
  • Used MMLS to find offset
Catalog file key
  • 2 bytes | Key length
  • 4 Bytes | Parent CNID
  • Variable | Node Name (File Name)
  • Folder Record
  • File Record
  • Extense Overflow File
  • KMDI Where from is the data downloaded via Internet
 
<<Previous

    Subscribe to Newsletter

    Mac Forensics
    Windows Forensics
    Forensic Tools

    Categories

    All
    Attack
    Bash
    Bigdata
    CISSP
    Corporate
    Ctf
    Data
    Digital Forensics
    Docker
    EDR
    Forensics
    Hacking
    Hadoop
    HDFS
    Health Care
    Linux
    Memory
    Network
    Network Forensics
    PCIP
    SQL
    Windows
    Wireshark

    Archives

    August 2024
    July 2024
    January 2023
    October 2019
    September 2019
    July 2019
    June 2019
    May 2019
    March 2019
    April 2018
    March 2018
    February 2018
    July 2017
    June 2017
    May 2017
    November 2015
    October 2015
    July 2015
    June 2015
    May 2015
    April 2015
    March 2015

    RSS Feed

  • Infosec
  • Mac Forensics
  • Windows Forensics
  • Linux Forensics
  • Memory Forensics
  • Incident Response
  • Blog
  • About Me
  • Infosec
  • Mac Forensics
  • Windows Forensics
  • Linux Forensics
  • Memory Forensics
  • Incident Response
  • Blog
  • About Me