Wes Lambert · @weslambert
415 followers · 54 posts · Server infosec.exchange

🦖Day 90 of the @velocidex series

Artifact: Exchange.MacOS.UnifiedLogHunter

Link:
docs.velociraptor.app/exchange

----

With macOS 10.12 (Sierra) came a new way to log system events in a more centralized, unified fashion -- Unified Logs.

Read more here:

devstreaming-cdn.apple.com/vid

These logs can be of great importance to investigators searching for artifacts of adversary activity.

----

@crowdstrike , @Mandiant, and others have done a great job covering the usefulness and technical details surrounding the Unified Logging system.

crowdstrike.com/blog/how-to-le

mandiant.com/resources/blog/re

----

This artifact is a wrapper around the 'log' command, allowing defenders to easily review events from the logs from the many subsystems of the Unified Logging infrastructure.

It provides the ability to search using a custom or pre-defined filter, and is great for live hunting.

----

If you are looking to collect only raw files and parse them later, or for a third party tool to process the data, check out the Exchange.MacOS.UnifiedLogParser artifact.

docs.velociraptor.app/exchange

----

This information provided by this artifact includes:

- Event time/message/type
- Message type
- Category
- Subsystem
- PID
- Process image Path/UUID
- Sender image Path/UUID
- Sender program counter
- Activity ID
- Parent activity ID

----

That's it for now! Stay tuned to learn about more artifacts! 🦖






#velociraptor #artifactsofautumn #dfir #forensics #infosec #macos #threathunting #unifiedlogs

Last updated 2 years ago