
- #Wechat for mac review for mac os x
- #Wechat for mac review mac os
- #Wechat for mac review archive
- #Wechat for mac review windows
You could also create your favor profile for your own use. The profile repository contains over 300 different OS profiles. For OS X, it supports up to version 10.9.x. Likes Volatility, it processes with corresponding OS profile, but it could detect automatically. The distribution is available from Internet. The project is officially launched at the end of year 2013.
#Wechat for mac review mac os
Of course, a custom-profile for Linux or Mac OS might be created, if necessary.Īnother analysis tool is Rekall Memory Forensics Analysis Framework. The user should know and select the correct profile when processing.
#Wechat for mac review windows
However, it builds in only 20 Windows operation system profiles. It supports Windows, Linux and Mac memory. Volatility is a powerful memory forensics tool and delivers both Linux and Windows versions.
#Wechat for mac review archive
The archive of the pre-built profiles up to version Mountain Lion 10.8.3 could be downloaded from its official website.

It requires corresponding OS profiles while performing the process. Volatility 2.3.1 is fully supporting the analysis on mac memory. Once the process is identified, analysis progress is required. Super user privilege is required while dumping the memory.
#Wechat for mac review for mac os x
It is an open source memory acquisition tool for Mac OS X which supports up to OS version 10.9. The latest version of OSXPmem is RC3, developed by Rekall Memory Forensics Framework. Although there is an alternative to recover the lost memory, for example ‘hibfil.sys’ in Windows OS, the best way is to acquire the memory dump as soon as possible. All the data were gone if the machine is powered off. Under the path /Application/WeChat.app/Contents/MacOS/WeChat on.

It could be configured in the MacLockPick Manager depended on the examiner ’ s preference.Ī process of ‘WeChat’ was identified by the MacLockPick. The MacLockPick 3.0 is come with a USB Flash Drive with many of built-in Plugins. LE version includes Apple Keychain Extractor. It also supports gathering information from iPhone and iPad using Apple Mobile Sync application. MacLockPick is a cross-platform forensics triage which could capture the live data such as system information and process in the field. One is MacLockPick 3.0 from MacForensicsLab and the other is OSXPmem from Rekall Memory Forensics Framework. Two acquisition methods are suggested and preformed in this research. The application ‘WeChat’ was downloaded from the official website of ‘Weixin’. In this paper, a Mac machine with MountainLion OS X 10.8.3 installed was selected as a testing platform. Now, it is a good time to study much more of the OS X attributes. With the effect from the ‘end-of-life’ of Windows XP, Mac OS X might occupy more market share afterwards. Therefore, we could not ignore any possibility of evidence (either file system or memory) from a desktop machine.Īs memory analysis would be an important intersection, this paper will perform this ‘Art’of science to examine the memory dump from a Mac machine, by acquisition, process analysis and data collection through an example of running WeChat on OS X.Īccording to the research of Desktop Operation System from Net Application as of April 2014, the market share of Mac OS X is around 8% which is followed by the latest operation system Windows 8. These applications provide not only the smart phone version but also the desktop version. Meanwhile, WeChat is the most famous chatting platform in China and the areas nearby, especially Hong Kong. With the wide use of smart phones and the internet, most people communicate with their friends using mobile social networking applications ‘Facebook and Whatsapp’. Computer forensics science is not only a science but an art. ‘ Memory Forensics is the art of analyzing computer memory (RAM) to solve digital crimes ’ defined by Michael Hale Ligh, Andrew Case and, Jamie Levy.

This paper is to demonstrate a fast track of mac memory forensics via studying the evidence of a very popular social networking application ‘WeChat’. Although there are some methods: eg Volatility, Volafox, Memoryze for Mac, Mac Memory Reader, MacLockPick and Rekall, able to analyze mac memory, mac memory analysis is relatively strange.

However, most of the research and trainings are focused on file system analysis. Therefore, OS X forensics, starting from Jonathan Zdziarski in 2008, became a very hot topic. Rapid growth of the usage of OS X has inspired forensic researchers to analyze devices such as the iPad, iPhone and Mac deeply.
