mac-robber 1.02-13 source package in Ubuntu

Changelog

mac-robber (1.02-13) unstable; urgency=medium

  [ Joao Eriberto Mota Filho ]
  * debian/copyright:
     - Updated packaging copyright years.
     - Using a secure URL in Source field.
  * debian/watch: using a secure URL in search rule.

  [ Debian Janitor ]
  * Update standards version to 4.6.0, no changes needed.

 -- Joao Eriberto Mota Filho <email address hidden>  Tue, 22 Feb 2022 19:09:59 -0300

Upload details

Uploaded by:
Debian Security Tools
Uploaded to:
Sid
Original maintainer:
Debian Security Tools
Architectures:
any
Section:
misc
Urgency:
Medium Urgency

See full publishing history Publishing

Series Pocket Published Component Section
Oracular release universe misc
Noble release universe misc
Mantic release universe misc
Lunar release universe misc
Jammy release universe misc

Downloads

File Size SHA-256 Checksum
mac-robber_1.02-13.dsc 2.0 KiB 65cba15b8fe717b3621a74db2bdb1e6b40eef3ba8f7e4a29b967bb9107b91052
mac-robber_1.02.orig.tar.gz 11.4 KiB 5895d332ec8d87e15f21441c61545b7f68830a2ee2c967d381773bd08504806d
mac-robber_1.02-13.debian.tar.xz 4.8 KiB d504d96ca625c5df4a5af7b66d530d07bebbded424d7b8cb5def795ae6e1c29f

Available diffs

No changes file available.

Binary packages built by this source

mac-robber: collects data about allocated files in mounted filesystems

 mac-robber is a digital investigation tool (digital forensics) that collects
 metadata from allocated files in a mounted filesystem. This is useful during
 incident response when analyzing a live system or when analyzing a dead
 system in a lab. The data can be used by the mactime tool in The Sleuth Kit
 (TSK or SleuthKit only) to make a timeline of file activity. The mac-robber
 tool is based on the grave-robber tool from TCT (The Coroners Toolkit).
 .
 mac-robber requires that the filesystem be mounted by the operating system,
 unlike the tools in The Sleuth Kit that process the filesystem themselves.
 Therefore, mac-robber will not collect data from deleted files or files that
 have been hidden by rootkits. mac-robber will also modify the Access times
 on directories that are mounted with write permissions.
 .
 mac-robber is useful when dealing with a filesystem that is not supported
 by The Sleuth Kit or other filesystem analysis tools. You can run mac-robber
 on an obscure, suspect UNIX filesystem that has been mounted read-only on a
 trusted system.

mac-robber-dbgsym: debug symbols for mac-robber