Jump to content

The Sleuth Kit

From Wikipedia, the free encyclopedia

This is an old revision of this page, as edited by Yobot (talk | contribs) at 06:19, 31 August 2016 (→‎top: WP:CHECKWIKI error fixes using AWB (12082)). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.

The Sleuth Kit
Original author(s)Brian Carrier
Stable release
4.3.0 / July 19, 2016 (2016-07-19)
Repository
Written inC, Perl
Operating systemUnix-like, Windows
TypeComputer forensics
LicenseIPL, CPL, GPL
Websitehttp://www.sleuthkit.org/

The Sleuth Kit (TSK) is a library and collection of Unix- and Windows-based utilities to facilitate the forensic analysis of computer systems. It was written and is maintained primarily by digital investigator Brian Carrier.[1]

The Sleuth Kit is capable of parsing NTFS, FAT/ExFAT, UFS 1/2, Ext2, Ext3, Ext4, HFS, ISO 9660 and YAFFS2 file systems either separately or within disk images stored in raw (dd), Expert Witness or AFF formats.[2] The Sleuth Kit can be used to examine most Microsoft Windows, most Apple Macintosh OSX, many Linux and some other UNIX computers.

The Sleuth Kit can be used:

  • Via the included command line tools; or
  • As a library embedded within a separate digital forensic tool such as Autopsy or log2timeline/plaso.

The Sleuth Kit is a free, open source suite that provides a large number of specialized command-line based utilities.

It is based on The Coroner's Toolkit, and is the official successor platform.[3]

Tools

Some of the tools included in The Sleuth Kit include:

  • ils lists all metadata entries, such as an Inode.
  • blkls displays data blocks within a file system (formerly called dls).
  • fls lists allocated and unallocated file names within a file system.
  • fsstat displays file system statistical information about an image or storage medium.
  • ffind searches for file names that point to a specified metadata entry.
  • mactime creates a timeline of all files based upon their MAC times.
  • disk_stat (currently Linux-only) discovers the existence of a Host Protected Area.

See also

References

  1. ^ "www.sleuthkit.org: About". www.sleuthkit.org. Retrieved 2016-08-30.
  2. ^ "The Sleuth Kit: File and Volume System Analysis". www.sleuthkit.org. Retrieved 2016-08-30.
  3. ^ http://www.porcupine.org/forensics/tct.html

External links