sleuthkit 4.12.1+dfsg-1 source package in Ubuntu

Changelog

sleuthkit (4.12.1+dfsg-1) unstable; urgency=medium

  * Team upload.

  [ Francisco Vilmar Cardoso Ruviaro ]
  * New upstream version 4.12.1+dfsg.
  * Run 'wrap-and-sort -a'.
  * Drop debian/libtsk13.* files because they
    haven't been used since version 4.9.0+dfsg-1.

  [ Peter Wienemann ]
  * Fix package clean-up (Closes: #1049223, #1049710)
    - Add ant as build dependency
    - Ensure config directory is removed

 -- Francisco Vilmar Cardoso Ruviaro <email address hidden>  Fri, 22 Dec 2023 14:12:22 +0000

Upload details

Uploaded by:
Debian Security Tools
Uploaded to:
Sid
Original maintainer:
Debian Security Tools
Architectures:
any
Section:
admin
Urgency:
Medium Urgency

See full publishing history Publishing

Series Pocket Published Component Section

Downloads

File Size SHA-256 Checksum
sleuthkit_4.12.1+dfsg-1.dsc 2.1 KiB a4b8d0f22620ec848af0477b2823f4bd4739455bee4ac830dc7362e0bf8602ee
sleuthkit_4.12.1+dfsg.orig.tar.xz 2.3 MiB 88e15a90f09e83405dff9bcb274b30308de07408116c6190b29f4383fe7ec5f0
sleuthkit_4.12.1+dfsg-1.debian.tar.xz 32.8 KiB 270a8a5631b176908ab6ee579c919e4c25b951814ea9c8ef69df3cc69073cb2a

Available diffs

No changes file available.

Binary packages built by this source

libtsk-dev: library for forensics analysis (development files)

 The Sleuth Kit, also known as TSK, is a collection of UNIX-based command
 line file and volume system forensic analysis tools. The filesystem tools
 allow you to examine filesystems of a suspect computer in a non-intrusive
 fashion. Because the tools do not rely on the operating system to process the
 filesystems, deleted and hidden content is shown.
 .
 The volume system (media management) tools allow you to examine the layout of
 disks and other media. You can also recover deleted files, get information
 stored in slack spaces, examine filesystems journal, see partitions layout on
 disks or images etc. But is very important clarify that the TSK acts over the
 current filesystem only.
 .
 The Sleuth Kit supports DOS partitions, BSD partitions (disk labels), Mac
 partitions, Sun slices (Volume Table of Contents), and GPT disks. With these
 tools, you can identify where partitions are located and extract them so that
 they can be analyzed with filesystem analysis tools.
 .
 Currently, TSK supports several filesystems, as NTFS, FAT, exFAT, HFS+, Ext3,
 Ext4, UFS and YAFFS2.
 .
 This package contains header files and static version of the library.

libtsk19: No summary available for libtsk19 in ubuntu noble.

No description available for libtsk19 in ubuntu noble.

libtsk19-dbgsym: No summary available for libtsk19-dbgsym in ubuntu noble.

No description available for libtsk19-dbgsym in ubuntu noble.

sleuthkit: tools for forensics analysis on volume and filesystem data

 The Sleuth Kit, also known as TSK, is a collection of UNIX-based command
 line file and volume system forensic analysis tools. The filesystem tools
 allow you to examine filesystems of a suspect computer in a non-intrusive
 fashion. Because the tools do not rely on the operating system to process the
 filesystems, deleted and hidden content is shown.
 .
 The volume system (media management) tools allow you to examine the layout of
 disks and other media. You can also recover deleted files, get information
 stored in slack spaces, examine filesystems journal, see partitions layout on
 disks or images etc. But is very important clarify that the TSK acts over the
 current filesystem only.
 .
 The Sleuth Kit supports DOS partitions, BSD partitions (disk labels), Mac
 partitions, Sun slices (Volume Table of Contents), and GPT disks. With these
 tools, you can identify where partitions are located and extract them so that
 they can be analyzed with filesystem analysis tools.
 .
 Currently, TSK supports several filesystems, as NTFS, FAT, exFAT, HFS+, Ext3,
 Ext4, UFS and YAFFS2.
 .
 This package contains the set of command line tools in The Sleuth Kit.

sleuthkit-dbgsym: debug symbols for sleuthkit