Aftermath: A free and open-source event response framework for macOS

0 22
With the help of Aftermath, researchers can easily collect and analyze the data...

Aftermath: A free and open-source event response framework for macOS

With the help of Aftermath, researchers can easily collect and analyze the data of infected hosts. In addition, in an ideal situation, we can deploy Aftermath through MDM or directly run it from the infected device via the command line.

Operation Mechanism

Aftermath will first run a series of data collection modules, and then support storing the results of data collection through -o or --output to the specified file. By default, the tool will store the results of data collection in the /tmp directory.

After data collection is completed, we can obtain the final zip compressed file from the disk of the terminal user, then use the --analyze parameter to select the archive file for reading and analysis. The results of the analysis will also be stored in the /tmp directory. Next, researchers can unzip and read the analysis results directory, and then view the database parsing view of this collection, which will include file creation time, last access time, and last modification date file timeline, file metadata, database change timeline, and browser information timeline, and track potential infection media.

Tool Download & Code Build

Firstly, we need to use the following command to clone the source code of the project locally:

git clone https://github.com/jamf/aftermath.git

Next, switch to the project directory and build the project code using Xcode:

cd <path_to_aftermath_directory>

xcodebuild

After the build is completed, enter the project's Release directory:

cd build/Release

Run Aftermath using the following command:

sudo https://www.freebuf.com/articles/system/aftermath

Tool Usage

The normal operation of Aftermath requires root privileges to execute and provide full disk access (FDA), and we can provide FDA permissions through the terminal application before running the tool.

The default usage of Aftermath is as follows:

sudo https://www.freebuf.com/articles/system/aftermath

You can also specify special parameter options:

sudo https://www.freebuf.com/articles/system/aftermath [option1] [option2]

Tool usage examples

sudo https://www.freebuf.com/articles/system/aftermath -o /Users/user/Desktop --deep
sudo https://www.freebuf.com/articles/system/aftermath --analyze <path_to_collection_zip>

release version uses

This project'sReleases page】Below you can directly obtain the Aftermath.pkg file, which is a signed installation file that will install Aftermath to the /usr/local/bin directory, and the operation method is as follows:

sudo aftermath [option1] [option2]

Tool help menu

--analyze -> Analyze the results of Aftermath data collection

usage: --analyze <path_to_aftermath_collection_file>

--collect-dirs -> Specify the path for the dump file metadata

usage: --collect-dirs <path_to_dir> <path_to_another_dir>

--deep or -d -> Perform a deep scan of the file system (time-sensitive scan, high memory consumption)

-o or --output -> Specify the path for Aftermath to store data collection results, the default is /tmp

usage: -o Users/user/Desktop

--pretty -> Highlight terminal colors

--cleanup -> Delete the Aftermatch directory from the default path ("/tmp", "/var/folders/zz/)

License Agreement

The development and release of this project followMITOpen Source License Agreement.

Project address

Aftermath:【GitHub Gateway

Reference materials

https://github.com/themittenmac/TrueTree

https://github.com/jamf/aftermath/releases

你可能想看:

Ensure that the ID can be accessed even if it is guessed or cannot be tampered with; the scenario is common in resource convenience and unauthorized vulnerability scenarios. I have found many vulnerab

5. Collect exercise results The main person in charge reviews the exercise results, sorts out the separated exercise issues, and allows the red and blue sides to improve as soon as possible. The main

It is possible to perform credible verification on the system boot program, system program, important configuration parameters, and application programs of computing devices based on a credible root,

After studying, we classify the aforementioned AMSI components according to the documents provided by Microsoft:

Data security can be said to be a hot topic in recent years, especially with the rapid development of information security technologies such as big data and artificial intelligence, the situation of d

4.5 Main person in charge reviews the simulation results, sorts out the separated simulation issues, and allows the red and blue teams to improve as soon as possible. The main issues are as follows

04/7 The systematic security risks of outsourcing and crowdsourcing are no different from those of formal employees

In today's rapidly developing digital economy, data has become an important engine driving social progress and enterprise development. From being initially regarded as part of intangible assets to now

A Brief Discussion on the Establishment of Special Security Management Organizations for Operators of Key Information Infrastructure

Counting the top 10 free and open-source WAFs in 2024

最后修改时间:
admin
上一篇 2025年03月26日 21:30
下一篇 2025年03月26日 21:53

评论已关闭