TCT is a collection of programs by Dan Farmer and Wietse Venema for a post-mortem analysis of a UNIX system after break-in. Notable TCT components are the grave-robber tool that captures information, the ils and mactime tools that display access patterns of files dead or alive, the unrm and lazarus tools that recover deleted files, and the findkey tool that recovers cryptographic keys from a running process or from files. WARNING This software is not for the faint of heart. It is relatively unpolished compared to the software that Dan and Wietse usually release. TCT can spend a lot of time collecting data. And although TCT collects lots of data, many analysis tools still need to be written.
OS | Architecture | Version |
---|---|---|
NetBSD 9.0 | aarch64 | tct-1.09nb14.tgz |
NetBSD 9.0 | aarch64 | tct-1.09nb14.tgz |
NetBSD 9.0 | alpha | tct-1.09nb14.tgz |
NetBSD 9.0 | alpha | tct-1.09nb14.tgz |
NetBSD 9.0 | earmv6hf | tct-1.09nb14.tgz |
NetBSD 9.0 | earmv6hf | tct-1.09nb14.tgz |
NetBSD 9.0 | earmv6hf | tct-1.09nb14.tgz |
NetBSD 9.0 | earmv6hf | tct-1.09nb14.tgz |
NetBSD 9.0 | earmv7hf | tct-1.09nb14.tgz |
NetBSD 9.0 | earmv7hf | tct-1.09nb14.tgz |
NetBSD 9.0 | earmv7hf | tct-1.09nb14.tgz |
NetBSD 9.0 | earmv7hf | tct-1.09nb14.tgz |
NetBSD 9.0 | i386 | tct-1.09nb14.tgz |
NetBSD 9.0 | i386 | tct-1.09nb14.tgz |
NetBSD 9.0 | i386 | tct-1.09nb14.tgz |
NetBSD 9.0 | m68k | tct-1.09nb14.tgz |
NetBSD 9.0 | powerpc | tct-1.09nb14.tgz |
NetBSD 9.0 | powerpc | tct-1.09nb14.tgz |
NetBSD 9.0 | powerpc | tct-1.09nb14.tgz |
NetBSD 9.0 | sparc64 | tct-1.09nb14.tgz |
NetBSD 9.0 | sparc64 | tct-1.09nb14.tgz |
NetBSD 9.0 | x86_64 | tct-1.09nb14.tgz |
NetBSD 9.0 | x86_64 | tct-1.09nb14.tgz |
NetBSD 9.0 | x86_64 | tct-1.09nb14.tgz |
NetBSD 9.3 | x86_64 | tct-1.09nb14.tgz |
NetBSD 9.3 | x86_64 | tct-1.09nb14.tgz |
Binary packages can be installed with the high-level tool pkgin (which can be installed with pkg_add) or pkg_add(1) (installed by default). The NetBSD packages collection is also designed to permit easy installation from source.
The pkg_admin audit command locates any installed package which has been mentioned in security advisories as having vulnerabilities.
Please note the vulnerabilities database might not be fully accurate, and not every bug is exploitable with every configuration.
Problem reports, updates or suggestions for this package should be reported with send-pr.