Abstract
The objectives of this chapter are to:
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
NIST National Software Reference Library (NSRL). http://www.nsrl.nist.gov
File signature. https://en.wikipedia.org/wiki/File_
Bruce Schneier. Applied Cryptography. John Wiley & Sons, 1996
Author information
Authors and Affiliations
Appendix A: Shell Script for Generating Files for File Hash Database
Appendix A: Shell Script for Generating Files for File Hash Database
Usage
# ./fssf.sh numberOfFiles typeOfFile
where numberOfFiles means the total number of files to generate and typeOfFile is the type of files to generate, either “0” for good or “1” for bad.
It generates a list of either good or bad files for the experimental practice in this chapter. You must specify how many files you want to generate and what type of files you want, including good files for Ignored database and bad files for Alert database. The shell script can be found in the end.
For example,
-
./fssf.sh 100 0
It means the total 100 good files will be generated and saved into a subfolder named good (bad if specifying 1 as the type of file) of the current working folder.
Rights and permissions
Copyright information
© 2018 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Lin, X. (2018). File Signature Searching Forensics. In: Introductory Computer Forensics. Springer, Cham. https://doi.org/10.1007/978-3-030-00581-8_10
Download citation
DOI: https://doi.org/10.1007/978-3-030-00581-8_10
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-00580-1
Online ISBN: 978-3-030-00581-8
eBook Packages: Computer ScienceComputer Science (R0)