You name it and it is there: exe, rpm, uha etc, the list of which is given in Table1. “Universal Extractor” as the name indicates, extracts the contents of almost all kind of file types/extensions. One such software is “Universal Extractor”. Hence there is a need of software or a tool, which though might not fulfill all the above said requirements, but fulfill at least a majority of them. The investigators or research persons could also come across various MS-Windows “.exe”, “.dll”, “.msi” files or RedHat Linux “.rpm” file, or very common “.zip”, “.rar”, “.bin”, “.cue” or “.uha” files during their course of action.įorensics world, though have many softwares and tools to handle such kind of situations, but what they lack is, compatibility with all file extensions, ease of interpretation of results, & above all ‘the cost’. If the executable file is in human readable format (ex : a UNIX file having permissions –rwx-r-x-r-x) then the life of investigator is quite simple, since such kind of files could easily be opened in Unix built-in editors like “vi” or “emacs”, or even in MS Windows default editor “Notepad”. Many a time during Forensics investigation or during Reverse Engineering, we come across the need where we have to check or extract the contents of an executable file.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
January 2023
Categories |