security/tct - The NetBSD Packages Collection

Programs to aid post-mortem after a break-in

TCT is a collection of programs by Dan Farmer and Wietse Venema for a
post-mortem analysis of a UNIX system after break-in.

Notable TCT components are the grave-robber tool that captures
information, the ils and mactime tools that display access patterns of
files dead or alive, the unrm and lazarus tools that recover deleted
files, and the findkey tool that recovers cryptographic keys from a
running process or from files.

WARNING

This software is not for the faint of heart.  It is relatively
unpolished compared to the software that Dan and Wietse usually
release.  TCT can spend a lot of time collecting data.  And although
TCT collects lots of data, many analysis tools still need to be
written.

Build dependencies

pkgtools/mktools pkgtools/cwrappers

Runtime dependencies

devel/p5-Date-Manip lang/perl5

Binary packages

OSArchitectureVersion
NetBSD 9.0aarch64tct-1.09nb14.tgz
NetBSD 9.0aarch64tct-1.09nb14.tgz
NetBSD 9.0alphatct-1.09nb14.tgz
NetBSD 9.0earmv6hftct-1.09nb14.tgz
NetBSD 9.0earmv6hftct-1.09nb14.tgz
NetBSD 9.0earmv6hftct-1.09nb14.tgz
NetBSD 9.0earmv7hftct-1.09nb14.tgz
NetBSD 9.0earmv7hftct-1.09nb14.tgz
NetBSD 9.0earmv7hftct-1.09nb14.tgz
NetBSD 9.0i386tct-1.09nb14.tgz
NetBSD 9.0i386tct-1.09nb14.tgz
NetBSD 9.0m68ktct-1.09nb14.tgz
NetBSD 9.0powerpctct-1.09nb14.tgz
NetBSD 9.0powerpctct-1.09nb14.tgz
NetBSD 9.0powerpctct-1.09nb14.tgz
NetBSD 9.0sparc64tct-1.09nb14.tgz
NetBSD 9.0sparc64tct-1.09nb14.tgz
NetBSD 9.0x86_64tct-1.09nb14.tgz
NetBSD 9.0x86_64tct-1.09nb14.tgz
NetBSD 9.3x86_64tct-1.09nb14.tgz

Binary packages can be installed with the high-level tool pkgin (which can be installed with pkg_add) or pkg_add(1) (installed by default). The NetBSD packages collection is also designed to permit easy installation from source.

Available build options

(none)

Known vulnerabilities

The pkg_admin audit command locates any installed package which has been mentioned in security advisories as having vulnerabilities.

Please note the vulnerabilities database might not be fully accurate, and not every bug is exploitable with every configuration.


Problem reports, updates or suggestions for this package should be reported with send-pr.