foremost文件删除恢复

foremost文件删除恢复简介 Foremostisac footers andinternald Thisprocessi Foremo

简介:

    Foremost is a console program to recover files based on their headers, footers, and internal data structures. This process is commonly referred to as data carving. Foremost can work on image files, such as those generated by dd, Safeback, Encase, etc, or directly on a drive. The headers and footers can be specified by a configuration file or you can use command line switches to specify built-in file types. These built-in types look at the data structures of a given file format allowing for a more reliable and faster recovery.

下载:

http://foremost.sourceforge.net/pkg/foremost-1.5.7.tar.gz

安装:

  1. tar -xzvf foremost-1.5.7.tar.gz 
  2. cd foremost-1.5.7
  3. make&&make install

卸载:

make uninstall

使用方法:

man  foremost

FOREMOST(1)                                                        FOREMOST(1)

NAME

       foremost – Recover files using their headers, footers, and data structures

SYNOPSIS

       foremost[-h][-V][-d][-vqwQT][-b

][-o


] [-t

][-s

][-i

]

BUILTIN FORMATS

       Recover files from a disk image based on file types specified by the user using the -t switch.

       jpg    Support for the JFIF and Exif formats including implementations used in modern digital cameras.

       gif

       png

       bmp    Support for windows bmp format.

       avi

       exe    Support for Windows PE binaries, will extract DLL and EXE files along with their compile times.

       mpg    Support for most MPEG files (must begin with 0x000001BA)

       mp4

       wav

       riff   This will extract AVI and RIFF since they use the same file format (RIFF). note faster than running each separately.

       wmv    Note may also extract -wma files as they have similar format.

       mov

       pdf

       ole    This will grab any file using the OLE file structure.  This includes PowerPoint, Word, Excel, Access, and StarWriter

       doc    Note it is more efficient to run OLE as you get more bang for your buck.  If you wish to ignore all other ole files then use this.

       zip    Note  is  will  extract .jar files as well because they use a similar format.  Open Office docs are just zip’d XML files so they are extracted as

              well.  These include SXW, SXC, SXI, and SX? for undetermined OpenOffice files.  Office 2007 files are also XML based (PPTX,DOCX,XLSX)

       rar

       htm

       cpp    C source code detection, note this is primitive and may generate documents other than C code.

       all    Run all pre-defined extraction methods. [Default if no -t is specified]

DESCRIPTION

       Recover files from a disk image based on headers and footers specified by the user.

       -h     Show a help screen and exit.

       -V     Show copyright information and exit.

-d     Turn on indirect block detection, this works well for Unix file systems.

       -T     Time stamp the output directory so you don’t have to delete the output dir when running multiple times.

       -v     Enables verbose mode. This causes more information regarding the current state of the program to be displayed on the screen, and is highly recom-

              mended.

       -q     Enables quick mode. In quick mode, only the start of each sector is searched for matching headers. That is, the header is searched only up to the

              length of the longest header. The rest of the sector, usually about 500 bytes, is ignored. This mode makes foremost run considerably faster,  but

              it  may cause you to miss files that are embedded in other files. For example, using quick mode you will not be able to find JPEG images embedded

              in Microsoft Word documents.

              Quick mode should not be used when examining NTFS file systems. Because NTFS will store small files inside the Master  File  Table,  these  files

              will be missed during quick mode.

       -Q     Enables Quiet mode. Most error messages will be suppressed.

       -w     Enables write audit only mode.  No files will be extracted.

       -a     Enables write all headers, perform no error detection in terms of corrupted files.

       -b number

              Allows  you  to  specify  the  block  size  used  in  foremost.   This  is  relevant  for  file  naming  and quick searches.  The default is 512.

                   ie.  foremost -b 1024 image.dd

       -k number

              Allows you to specify the chunk size used in foremost.  This can improve speed if you have enough RAM to fit the image in.  It reduces the check-

              ing that occurs between chunks of the buffer.  For example if you had > 500MB of RAM.       ie.  foremost -k 500 image.dd

       -i file

              The file is used as the input file.  If no input file is specified or the input file cannot be read then stdin is used.

       -o directory

              Recovered files are written to the directory directory.

       -c file

              Sets the configuration file to use. If none is specified, the file “foremost.conf” from the current directory is used, if that doesn’t exist then

              “/etc/foremost.conf” is used. The format for the configuration file is described in the default configuration file included  with  this  program.

              See the CONFIGURATION FILE section below for more information.

       -s number

              Skips number blocks in the input file before beginning the search for headers.       ie.  foremost -s 512 -t jpeg -i /dev/hda1

       CONFIGURATION FILE

              The configuration file is used to control what types of files foremost searches for. A sample configuration file, foremost.conf, is included with

              this distribution. For each file type, the configuration file describes the file’s extension, whether the header and footer are  case  sensitive,

              the  maximum  file  size, and the header and footer for the file. The footer field is optional, but header, size, case sensitivity, and extension

              are not!

              Any line that begins with a pound sign is considered a comment and ignored. Thus, to skip a file type just put a pound sign at the  beginning  of

              that line

              Headers  and  footers are decoded before use. To specify a value in hexadecimal use \x[0-f][0-f], and for octal use \[1-9][1-9][1-9].  Spaces can

              be represented by \s. Example: “\x4F\123\I\sCCI” decodes to “OSI CCI”.

              To match any single character (aka a wildcard) use a ?. If you need to search for the ? character, you will need  to  change  the  wildcard  line

              *and*  every occurrence of the old wildcard character in the configuration file. Do not forget those hex and octal values! ? is equal to \x3f and

              \063.

              There is a sample set of headers in the README file.

EXAMPLES

       Search for jpeg format skipping the first 100 blocks

              foremost -s 100 -t jpg -i image.dd

       Only generate an audit file, and print to the screen (verbose mode)

              foremost -av image.dd

       Search all defined types

              foremost -t all -i image.dd

       Search for gif and pdf’s

              foremost -t gif,pdf -i image.dd

       Search for office documents and jpeg files in a Unix file system in verbose mode.

              foremost -vd -t ole,jpeg -i image.dd

       Run the default case

              foremost image.dd

AUTHORS

       Original Code written by Special Agent Kris Kendall and Special Agent Jesse Kornblum of the United States Air Force Office of Special Investigations.

       Modification by Nick Mikus a Research Associate at the Naval Postgraduate School Center for Information Systems Security Studies and Research.  The mod-

       ification of Foremost was part of a masters thesis at NPS.

BUGS

       When compiling foremost on systems with versions of glibc 2.1.x or older, you will get some (harmless) compiler warnings regarding the implicit declara-

       tion of fseeko and ftello. You can safely ignore these warnings.

REPORTING BUGS

       Because Foremost could be used to obtain evidence for criminal prosecutions, we take all bug reports very seriously. Any bug that jeopardizes the foren-

       sic  integrity of this program could have serious consequenses. When submitting a bug report, please include a description of the problem, how you found

       it, and your contact information.

       Send bug reports to:

       namikus AT users d0t sf d0t net

COPYRIGHT

       This program is a work of the US Government. In accordance with 17 USC 105, copyright protection is not available for any work of the US Government.

       This is free software; see the source for copying conditions.  There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.

SEE ALSO

       There is more information in the README file.

       Foremost was originally designed to imitate the functionality of CarvThis, a DOS program written by the Defense Computer Forensics Lab in in 1999.

测试:

1.rm test.jpg

2.foremost -t jpg -i /dev/sda2

3.在当前目录下生成output文件夹,其中0.jpg MD5子与test.jpg相同,恢复成功

        介绍比较全的文章:https://www.ibm.com/developerworks/cn/linux/1312_caoyq_linuxrestore/


本文转自 穿越防火墙 51CTO博客,原文链接:http://blog.51cto.com/sjitwant/





版权声明:本文内容由互联网用户自发贡献,该文观点仅代表作者本人。本站仅提供信息存储空间服务,不拥有所有权,不承担相关法律责任。如发现本站有涉嫌侵权/违法违规的内容, 请联系我们举报,一经查实,本站将立刻删除。

发布者:全栈程序员-站长,转载请注明出处:https://javaforall.net/229676.html原文链接:https://javaforall.net

(0)
上一篇 2026年3月16日 下午4:08
下一篇 2026年3月16日 下午4:09


相关推荐

  • 非禁用validateRequest=false使用Page_Error()错误处理

    非禁用validateRequest=false使用Page_Error()错误处理ASP.Net1.1后引入了对提交表单自动检查是否存在XSS(跨站脚本攻击)的能力。当用户试图用之类的输入影响页面返回结果的时候,ASP.Net的引擎会引发一个HttpRequestValidationExceptioin。默认情况下会返回如下文字的页面:以下是引用片段:ServerErrorin”/YourApplicationPath”Applicat

    2022年6月7日
    35
  • claude code随笔

    claude code随笔

    2026年3月14日
    2
  • 平均数,中位数,众数的特点及应用场合图片_中位数众数应用例子

    平均数,中位数,众数的特点及应用场合图片_中位数众数应用例子平均数、中位数、众数都是度量一组数据集中趋势的统计量。所谓集中趋势是指一组数据向某一中心值靠拢的倾向,测度集中趋势就是寻找数据一般水平的代表值或中心值。而这三个特征数又各有特点,能够从不同的角度提供信息。平均数特点:计算用到所有的数据,它能够充分利用数据提供的信息,它具有优的数学性质,因此在实际应用中较为广泛。但它受极端值的影响较大。应用场合:没有极端值的情况下数据集中趋势的刻画。

    2025年12月4日
    5
  • 大数据技术的发展趋势

    大数据技术的发展趋势英国牛津大学教授维克托·迈尔-舍恩伯格在其所撰写的《大数据时代》中表述,大数据时代是“已经发生的未来”,而在这个已经发生的未来里,没有旁观者。作为时代发生的必然产物,大数据正加速渗透至我们的日常生活,正完成对各传统领域的颠覆。本文从大数据时代的特点出发,为读者介绍目前的大数据技术的发展趋势以及大数据的生态体系。大数据时代的特点和市场规模大数据时代两个特点。第一,大数据技术以开源为主,迄今为止,尚未形成绝对技术垄断,即便是IBM、甲骨文等行业巨擘,也同样是集成了开源技术和该公司已有产品而已。开源技

    2022年5月12日
    50
  • Java开发人员必须掌握的Linux命令(一)

    子曰:“工欲善其事,必先利其器。“1、登录服务器SSH命令简单说,SSH是一种网络协议,用于计算机之间的加密登录。如果一个用户从本地计算机,使用SSH协议登录另一台远程计算机,我们就可以认为,这种登录是安全的,即使被中途截获,密码也不会泄露。最基本的用法:常用格式:ssh [-l login_name] [-p port] [user@]hostname例子:ssh 192.168….

    2022年2月28日
    48
  • 架构要素-高可用性[通俗易懂]

    架构要素-高可用性

    2022年1月31日
    48

发表回复

您的邮箱地址不会被公开。 必填项已用 * 标注

关注全栈程序员社区公众号