diff options
author | V3n3RiX <venerix@koprulu.sector> | 2022-10-20 07:59:50 +0100 |
---|---|---|
committer | V3n3RiX <venerix@koprulu.sector> | 2022-10-20 07:59:50 +0100 |
commit | 2eda3a3b8ebdb3fc8552feb6f49e466d3bc8e88c (patch) | |
tree | 69a469da2fa8c3f4920325ac5595300929f5d884 /app-forensics | |
parent | 9ed0c42eb618229fa6f45e10155ee535e1f605a2 (diff) |
gentoo auto-resync : 20:10:2022 - 07:59:49
Diffstat (limited to 'app-forensics')
-rw-r--r-- | app-forensics/Manifest.gz | bin | 4874 -> 4881 bytes | |||
-rw-r--r-- | app-forensics/mac-robber/Manifest | 2 | ||||
-rw-r--r-- | app-forensics/mac-robber/metadata.xml | 22 |
3 files changed, 12 insertions, 12 deletions
diff --git a/app-forensics/Manifest.gz b/app-forensics/Manifest.gz Binary files differindex ba20caf372bc..d939ccbd3fab 100644 --- a/app-forensics/Manifest.gz +++ b/app-forensics/Manifest.gz diff --git a/app-forensics/mac-robber/Manifest b/app-forensics/mac-robber/Manifest index f3411d040459..92aa7f284884 100644 --- a/app-forensics/mac-robber/Manifest +++ b/app-forensics/mac-robber/Manifest @@ -1,3 +1,3 @@ DIST mac-robber-1.02.tar.gz 11708 BLAKE2B d6d35be3c52b5bc93eb779ca3693c4213c57dcb4ecfb24912e92f47b3f896d948c8ccadef39f49af3c455cdff3a92adbca7e3d1e35ef0ebc885034bfa3c0743b SHA512 5330f766eb08aa766ca3f430684e0a40ecf29b7230a582c30a36bbaaa481d52c2a8519fa04e82762f09259ada9e77466c1430aebdff22615a511d519916d54a7 EBUILD mac-robber-1.02.ebuild 612 BLAKE2B 2e24716d4da4657367314593b8293916b63db195e968bc772e3249b6235b5b1d3deac0db616b88a6f72cd29855ed803262839f3469142088378f5a268089aaf7 SHA512 e9a37e85ec1036237297036b789e4fe35f6c6b047b04a42704ccc2f87a6b00713d15bcfb4626027f007b69eda74976759600356d81588da62755d04416b09c08 -MISC metadata.xml 1424 BLAKE2B 1a753087b90e3145fa739fa3cd1cf4b3430754c81786055febc5ba5bf8eac5319af8183e49a489b03eb6802961f63dc31d611ed88d6ca76d0c23c438f4015889 SHA512 f4b0be5dafa7d5044fd84e259c8b98ca560803b477b2ef67524e7a5a6592167fe83b187183878ce4cec3299aed7482633127494a3f4df8879cfa75d3c0f386f9 +MISC metadata.xml 1426 BLAKE2B 70b2972d19b70b4c0f0a1827e832605a46ceb9ee80eefffe309ecedbd2b12bf0d41fed3b426c725fe206f945d0f1507983e04b2069cd2cd57de73093d577e764 SHA512 3a582effe63123460595884d1be07fb041af6f19839cd226b3b80aa2296caf51a0ecbc6f72d6d3470e45ec19e3740a350ceba98caba721d2c7da57a02d6fdd4a diff --git a/app-forensics/mac-robber/metadata.xml b/app-forensics/mac-robber/metadata.xml index 4cf2ee79205f..0c56b2d46030 100644 --- a/app-forensics/mac-robber/metadata.xml +++ b/app-forensics/mac-robber/metadata.xml @@ -3,20 +3,20 @@ <pkgmetadata> <!-- maintainer-needed --> <longdescription> -mac-robber is a digital forensics and incident response tool that collects data from allocated files in a mounted file system. -The data can be used by the mactime tool in The Sleuth Kit to make a timeline of file activity. The mac-robber tool is based on -the grave-robber tool from TCT and is written in C instead of Perl. + mac-robber is a digital forensics and incident response tool that collects data from allocated files in a mounted file system. + The data can be used by the mactime tool in The Sleuth Kit to make a timeline of file activity. The mac-robber tool is based on + the grave-robber tool from TCT and is written in C instead of Perl. -mac-robber requires that the file system be mounted by the operating system, unlike the tools in The Sleuth Kit that process the -file system themselves. Therefore, mac-robber will not collect data from deleted files or files that have been hidden by -rootkits. mac-robber will also modify the Access times on directories that are mounted with write permissions. + mac-robber requires that the file system be mounted by the operating system, unlike the tools in The Sleuth Kit that process the + file system themselves. Therefore, mac-robber will not collect data from deleted files or files that have been hidden by + rootkits. mac-robber will also modify the Access times on directories that are mounted with write permissions. -"What is mac-robber good for then", you ask? mac-robber is useful when dealing with a file system that is not supported by The -Sleuth Kit or other forensic tools. mac-robber is very basic C and should compile on any UNIX system. Therefore, you can run -mac-robber on an obscure, suspect UNIX file system that has been mounted read-only on a trusted system. I have also used -mac-robber during investigations of common UNIX systems such as AIX. -</longdescription> + "What is mac-robber good for then", you ask? mac-robber is useful when dealing with a file system that is not supported by The + Sleuth Kit or other forensic tools. mac-robber is very basic C and should compile on any UNIX system. Therefore, you can run + mac-robber on an obscure, suspect UNIX file system that has been mounted read-only on a trusted system. I have also used + mac-robber during investigations of common UNIX systems such as AIX. + </longdescription> <upstream> <remote-id type="sourceforge">mac-robber</remote-id> </upstream> |