Result for 1980BFB0AA094B2E27CC336BB3251CBBE32956A5

Query result

Key Value
FileName./usr/share/doc/sleuthkit/NEWS.txt.gz
FileSize28352
MD54AD5F40A786354416983835D681050C3
SHA-11980BFB0AA094B2E27CC336BB3251CBBE32956A5
SHA-256D440266B7D916A9740DF8A10DFB6040BD1DE40D924CEEB39786C4AB39A9AD1F6
SSDEEP768:JG2zZiTdnrPLLkVqX3hl7CoGF+84f35DzYqm:U2zZihnHz7FDRf3Vs
TLSHT112D20179C287BDAD88083A173581AA55F1D9D07E260BF01C9A85D3ED4931E00FE2693F
hashlookup:parent-total2
hashlookup:trust60

Network graph view

Parents (Total: 2)

The searched file hash is included in 2 parent files which include package known and seen by metalookup. A sample is included below:

Key Value
FileSize249288
MD56007E66D5E3040405F7BD005204E6EA4
PackageDescriptiontools for forensics analysis on volume and filesystem data The Sleuth Kit, also known as TSK, is a collection of UNIX-based command line file and volume system forensic analysis tools. The filesystem tools allow you to examine filesystems of a suspect computer in a non-intrusive fashion. Because the tools do not rely on the operating system to process the filesystems, deleted and hidden content is shown. . The volume system (media management) tools allow you to examine the layout of disks and other media. You can also recover deleted files, get information stored in slack spaces, examine filesystems journal, see partitions layout on disks or images etc. But is very important clarify that the TSK acts over the current filesystem only. . The Sleuth Kit supports DOS partitions, BSD partitions (disk labels), Mac partitions, Sun slices (Volume Table of Contents), and GPT disks. With these tools, you can identify where partitions are located and extract them so that they can be analyzed with filesystem analysis tools. . Currently, TSK supports several filesystems, as NTFS, FAT, exFAT, HFS+, Ext3, Ext4, UFS and YAFFS2. . This package contains the set of command line tools in The Sleuth Kit.
PackageMaintainerUbuntu Developers <ubuntu-devel-discuss@lists.ubuntu.com>
PackageNamesleuthkit
PackageSectionadmin
PackageVersion4.4.2-3
SHA-1FC2E1B655BC3ACF08923337C43DEAA493DA78415
SHA-256F4E4DE25F9B451E093DF1B409D4284795A07ECB98AABEA4CF9AA72CD14603B00
Key Value
FileSize258044
MD52A3F81ABD3103B907BCEB12F5D727E7F
PackageDescriptiontools for forensics analysis on volume and filesystem data The Sleuth Kit, also known as TSK, is a collection of UNIX-based command line file and volume system forensic analysis tools. The filesystem tools allow you to examine filesystems of a suspect computer in a non-intrusive fashion. Because the tools do not rely on the operating system to process the filesystems, deleted and hidden content is shown. . The volume system (media management) tools allow you to examine the layout of disks and other media. You can also recover deleted files, get information stored in slack spaces, examine filesystems journal, see partitions layout on disks or images etc. But is very important clarify that the TSK acts over the current filesystem only. . The Sleuth Kit supports DOS partitions, BSD partitions (disk labels), Mac partitions, Sun slices (Volume Table of Contents), and GPT disks. With these tools, you can identify where partitions are located and extract them so that they can be analyzed with filesystem analysis tools. . Currently, TSK supports several filesystems, as NTFS, FAT, exFAT, HFS+, Ext3, Ext4, UFS and YAFFS2. . This package contains the set of command line tools in The Sleuth Kit.
PackageMaintainerUbuntu Developers <ubuntu-devel-discuss@lists.ubuntu.com>
PackageNamesleuthkit
PackageSectionadmin
PackageVersion4.4.2-3
SHA-127945C0B128C405E3E09D1E1081C6ECDE0D628FE
SHA-2569E7AFCA25F6D10D1046AC85273F9D37D5B676A4E9CD5D9406A6FB476052A6017