Skip to main content

File Signature Searching Forensics

  • Chapter
  • First Online:
Book cover Introductory Computer Forensics

Abstract

The objectives of this chapter are to:

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 119.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. NIST National Software Reference Library (NSRL). http://www.nsrl.nist.gov

  2. File signature. https://en.wikipedia.org/wiki/File_

  3. Bruce Schneier. Applied Cryptography. John Wiley & Sons, 1996

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Appendix A: Shell Script for Generating Files for File Hash Database

Appendix A: Shell Script for Generating Files for File Hash Database

Usage

# ./fssf.sh numberOfFiles typeOfFile

where numberOfFiles means the total number of files to generate and typeOfFile is the type of files to generate, either “0” for good or “1” for bad.

It generates a list of either good or bad files for the experimental practice in this chapter. You must specify how many files you want to generate and what type of files you want, including good files for Ignored database and bad files for Alert database. The shell script can be found in the end.

For example,

  • ./fssf.sh 100 0

It means the total 100 good files will be generated and saved into a subfolder named good (bad if specifying 1 as the type of file) of the current working folder.

figure a

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Lin, X. (2018). File Signature Searching Forensics. In: Introductory Computer Forensics. Springer, Cham. https://doi.org/10.1007/978-3-030-00581-8_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-00581-8_10

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-00580-1

  • Online ISBN: 978-3-030-00581-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics