File: usnjls.1

package info (click to toggle)
sleuthkit 4.6.5-1
  • links: PTS, VCS
  • area: main
  • in suites: buster
  • size: 39,152 kB
  • sloc: ansic: 171,812; cpp: 44,216; sh: 31,364; java: 17,674; makefile: 1,241; xml: 838; perl: 797; python: 707; sed: 16
file content (47 lines) | stat: -rw-r--r-- 1,575 bytes parent folder | download | duplicates (8)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
.TH USNJLS 1
.SH NAME
usnjls \- List the contents of a NTFS Update Sequence Number journal
.SH SYNOPSIS
.B usnjls [-f
.I fstype
.B ] [-vV]  [-i imgtype] [-o imgoffset] [-b dev_sector_size]
.I image [images] [inode]

.SH DESCRIPTION
.B usnjls
lists the records in a NTFS Update Sequence Number Journal.
If inode is given, then it will look there for a journal.
Otherwise, it will use the default location.
The output lists the USN journal records.

.SH ARGUMENTS
.IP "-f fstype"
Specify the file system type.
Use '\-f list' to list the supported file system types. If not given, autodetection methods are used.
.IP "-i imgtype"
Identify the type of image file, such as raw or split.  Use '\-i list' to list the supported types. If not given, autodetection methods are used.
.IP "-o imgoffset"
The sector offset where the file system starts in the image.
.IP "-b dev_sector_size"
The size, in bytes, of the underlying device sectors.  If not given, the value in the image format is used (if it exists) or 512-bytes is assumed.
.IP -l
Print the output in long format describing the field values and unpacking the data into human readable strings.
.IP -m
Print the output in mactime format.
.IP -V
Display version
.IP -v
verbose output
.IP "image [images]"
One (or more if split) disk or partition images whose format is given with '\-i'.
.IP [inode]
The inode where the Update Sequence Number Journal can be found.

.SH "EXAMPLES"

usnjls \-f ntfs img.dd

.SH AUTHOR
Brian Carrier <carrier at sleuthkit dot org>

Send documentation updates to <doc-updates at sleuthkit dot org>