Get Help Now
    24/7 Support

    Imaging Apple FileVault2 encrypted drives

    Recently our lab has faced a lot of Apple FileVault2 encrypted drives. Thankfully, in most cases we got the pass phrase used for encryption. Nevertheless, imaging of such drives could be a bit challenging, that’s why we decided to write a short article about it.

    About FileVault2

    FileVault2 was introduced with Mac OS Lion. It encrypts the entire OS X startup volume. The user’s login password is used as the encryption pass phrase. AES-XTS mode of AES with 128 bit blocks and a 256 bit key is used to encrypt the disk.

    Imaging

    The first thing an examiner should do is to create a classic bit-for-bit copy of the entire drive. You can use, for example, this solution.

    Let’s look at our image via FTK Imager:

    FileVault2_forensics

    As you can see, we have two partitions: Recovery and Macintosh HD, the first is browsable, the second is not – the file system is uncategorized. That’s because it’s encrypted.

    Now we need a Mac based computer. First, change the image extension from DD to DMG and mount the file using the following command:

    hdiutil attach –nomount /path/to/the/image

    Let’s list the core storage partitions available:

    diskutil cs list

    Now you need to copy Logical Volume GUID value and paste it in the following command:

    diskutil cs unlockVolume <GUID>

    Type the pass phrase. That’s it – the volume is unlocked. Now you can create a bit-for-bit image of the unlocked volume using, for example, dd.

    About the authors:

    Igor Mikhaylov

    Interests: Computer, Cell Phone & Chip-Off Forensics

    Oleg Skulkin

    Interests: iOS forensics, Android forensics, Mac OS X forensics, Windows forensics, Linux forensics