Highlights from the 2014 LA Auto Show

It’s Apple Mac-Guyver: pocket sized detective tool hacks into computers

By

May 3, 2007

It’s Apple Mac-Guyver: pocket sized detective tool hacks into computers

It’s Apple Mac-Guyver: pocket sized detective tool hacks into computers

May 4, 2007 SubRosaSoft’s MacLockPick is a USB sized gizmo that can extract passwords, e-mail addresses, recently accessed files, search strings, bookmarks and internet history from running or sleeping computers. But the US$499 device can only penetrate the defences of Macs running OSX – apparently, anyone who manages to build an empire of crime using Windows deserves to keep it. The “live forensics tool” is based on Flash drive technology and is available only to law enforcement officials - amateur gumshoes will have to tread the mean streets of the internet superhighway without it.

MacLockPick takes advantage of the fact that the default state of the Apple Keychain is open, even if the system has been put to sleep. It also makes use of the openly readable settings files used to keep track of your suspect's contacts, activities and history. These data sources even include items that your suspect may have previously deleted or has migrated from previous Mac OS X computers. The MacLockPick extracts data from the Apple Keychain and system settings to provide the examiner fast access to the suspect's critical information with as little interaction or trace as possible.

A database of the suspect’s information is compiled on the Flash Drive to allow for easy transportation away from the suspect's system. This database can be read by the included log readers on Microsoft Windows, Linux, or Apple Mac OS X computers back at base.

The following is a list of file items that can be extracted using SubRosaSoft’s MacLockPick:

Apple Keychain Passwords

System: The user password of the logged in user. General: Includes (but is not limited to) passwords for encrypted disk images, wifi base stations, iTunes music store, iChat login and Apple Remote Desktop. Internet: Includes (but is not limited to) login and password details for web sites, email accounts, some peer to peer networks, online services and stores, auction sites, and .mac accounts. AppleShare: A list of login and password details for appleshare servers this mac has connected to.

Files and Folder details

Folder Dates: A list of all the key user folders along with their creation date, date of last modification, date of first access, and date of the most recent access. Disk Images: Paths to the most recent disk images that have been mounted on this mac. Preview: Full paths to recent files that have been viewed in the preview program. QuickTime: File names for recently viewed movies for the QuickTime player applications Recent Applications, Documents, and Servers: Program names for the most recently used items on this Macintosh computer.

Instant Messaging

Default Login: For iChat instant messenger system. Complete buddy list: Includes buddies who have since been deleted.

E-Mail

Account Details: Login names and server addresses used. Address Book: Address details for entries in the address book including contacts that have been deleted. Opened Attachments: Paths to files that have been received as an attachment then saved or opened including the date and time of opening.

Web History and Preferences

Search Strings: The most recent items that the user has searched for using the Google toolbar in safari. Cached Bookmarks: Sites that have been bookmarked in Safari, including items that have been deleted. Current Bookmarks: Sites that are currently bookmarked in Safari. Cookies: A full list of cookies include the server address, the cookie value and the date and time of assignment. History: Complete details of browsing history including the number of times visited and the date and time of the most recent visit.

Hardware Preferences

iPod: Serial numbers of any iPod that have been connected to this Mac along with the date and time it was first used. Bluetooth Devices: Hardware address of any bluetooth devices that have been paired with this mac along with the most recent time these devices have been paired. Wifi Connections: Listings for wifi base stations that have been used on this computer including the base address and the date and time of the first connection. Network Interfaces: MAC address for each integrated network interface on the suspect's machine.

Purchasers will be required to provide proof that they are a licensed law enforcement professional. Users are required to ensure that the use of this technology is legal on federal, state, and local level. Licensed Investigators can purchase MacLockPick for US$500. State and Local law enforcement professionals can purchase MacLockPick for US$500. Federal law enforcement professionals and purchases of 5 or more can purchase MacLockPick for US$400.

About the Author
Mike Hanlon After Editing or Managing over 50 print publications primarily in the role of a Magazine Doctor, Mike embraced the internet full-time in 1995 and became a "start-up all-rounder" – quite a few start-ups later, he founded Gizmag in 2002. Now he can write again.   All articles by Mike Hanlon
Tags
Post a Comment

Login with your gizmag account:

Or Login with Facebook:


Related Articles
Looking for something? Search our 29,482 articles