One of the first steps in any forensic examination should be to check the logs. Remember that logs are very important when examining a Windows or a Linux computer. They are just as important when examining a Macintosh computer. This section examines the Macintosh logs and what is contained in them.
The name of this log should suggest that it is a general repository for a lot of information. The naming structure should also seem familiar. Remember that Mac OS X is based on FreeBSD, so seeing file structures similar to Linux should be no surprise.
This directory has many logs in it. The /var/log/daily.out contains data on all mounted volumes, including the dates they were mounted. This is very important in cases involving stolen data. You can see what devices have been attached and get data from them.
This folder includes data on removable media, including serial numbers.
In this folder, you will find information about printed documents. If you need to know what documents have been printed from this Macintosh, this folder can give you that information. This includes the name of the document printed and the user who printed it.
This folder contains information about system and software updates. It is less useful for a forensic investigation than some of the other folders; however, it can be useful to know if a given patch was applied and when it was applied. This might be of some interest in investigating malware crimes.
As you know, Mac OS X is based on FreeBSD, a UNIX variant. When you launch the terminal window, what you actually get is a Bash shell. So, this particular log can be very interesting. It will show you a variety of commands. You might look for commands such as rm, which would be removing or deleting something, or dd, indicating the user might have tried to make an image of the drive.
In this folder, you will find a subfolder named app profile. This will contain lists of recently opened applications, as well as temporary data used by applications. Both of these can be very interesting in a forensic examination.
This is where various users’ files are stored. It is always a good idea to check in this directory to find out if users have saved data here that could be used as evidence.
As you probably suspect, this folder contains user preferences. This might not seem that interesting for a forensic investigation, except for one small issue: This folder even maintains the preferences of programs that have been deleted. This could be a very valuable place to get clues about programs that have been deleted from the system.