Month: September 2006

samhain-2.2.4.tar.gz released

samhain

Description:
Samhain is a file system integrity checker that can be used as a client/server application for centralized monitoring of networked hosts. Databases and configuration files can be stored on the server. Databases, logs, and config files can be signed for tamper resistance. In addition to forwarding reports to the log server via authenticated TCP/IP connections, several other logging facilities (e-mail, console, and syslog) are available. Tested on Linux, AIX, HP-UX, Unixware, Sun and Solaris.

Author: Rainer Wichmann
Homepage: http://samhain.sourceforge.net
Changes: Various updates.
File Size: 1525691
Last Modified: Sep 13 10:13:01 2006
MD5 Checksum: 66b81869578b1295ed8cc0d811457173

Version 2.06 of The Sleuth Kit was released…

sleuthThe long awaited Windows version of Brian Carrier’s famous file system analysis tool The Sleuth Kit has been released as of September 1, 2006.

Description

The Sleuth Kit (previously known as TASK) is a collection of UNIX-based command line file and volume system forensic analysis tools. The file system tools allow you to examine file systems of a suspect computer in a non-intrusive fashion. Because the tools do not rely on the operating system to process the file systems, deleted and hidden content is shown.

The volume system (media management) tools allow you to examine the layout of disks and other media. The Sleuth Kit supports DOS partitions, BSD partitions (disk labels), Mac partitions, Sun slices (Volume Table of Contents), and GPT disks. With these tools, you can identify where partitions are located and extract them so that they can be analyzed with file system analysis tools.

When performing a complete analysis of a system, we all know that command line tools can become tedious. The Autopsy Forensic Browser is a graphical interface to the tools in The Sleuth Kit, which allows you to more easily conduct an investigation. Autopsy provides case management, image integrity, keyword searching, and other automated operations.

The Future of Hacking?

clippy

Scroll to top