Sigfind Installation On A Debian, Ubuntu, Alpine, Arch, Kali, Fedora, Raspbian And MacOS
Install sigfind
-
Debian
apt-get install sleuthkit
Click to copy -
Ubuntu
apt-get install sleuthkit
Click to copy -
Alpine OS
apk add sleuthkit
Click to copy -
Arch Linux
pacman -S sleuthkit
Click to copy -
Kali Linux
apt-get install sleuthkit
Click to copy -
Fedora
dnf install sleuthkit
Click to copy -
Raspbian
apt-get install sleuthkit
Click to copy -
macOS
brew install sleuthkit
Click to copy
sleuthkit
tools for forensics analysis on volume and filesystem dataThe Sleuth Kit, also known as TSK, is a collection of UNIX-based command line file and volume system forensic analysis tools. The filesystem tools allow you to examine filesystems of a suspect computer in a non-intrusive fashion. Because the tools do not rely on the operating system to process the filesystems, deleted and hidden content is shown. The volume system (media management) tools allow you to examine the layout of disks and other media. You can also recover deleted files, get information stored in slack spaces, examine filesystems journal, see partitions layout on disks or images etc. But is very important clarify that the TSK acts over the current filesystem only. The Sleuth Kit supports DOS partitions, BSD partitions (disk labels), Mac partitions, Sun slices (Volume Table of Contents), and GPT disks. With these tools, you can identify where partitions are located and extract them so that they can be analyzed with filesystem analysis tools. Currently, TSK supports several filesystems, as NTFS, FAT, exFAT, HFS+, Ext3, Ext4, UFS and YAFFS2. This package contains the set of command line tools in The Sleuth Kit.