How to Install and Uninstall libtsk-dev Package on Kali Linux
Last updated: December 23,2024
1. Install "libtsk-dev" package
Please follow the step by step instructions below to install libtsk-dev on Kali Linux
$
sudo apt update
Copied
$
sudo apt install
libtsk-dev
Copied
2. Uninstall "libtsk-dev" package
Here is a brief guide to show you how to uninstall libtsk-dev on Kali Linux:
$
sudo apt remove
libtsk-dev
Copied
$
sudo apt autoclean && sudo apt autoremove
Copied
3. Information about the libtsk-dev package on Kali Linux
Package: libtsk-dev
Source: sleuthkit
Version: 4.12.1+dfsg-0kali5
Architecture: amd64
Maintainer: Kali Developers
Installed-Size: 2702
Depends: libtsk19 (= 4.12.1+dfsg-0kali5), zlib1g-dev
Multi-Arch: same
Homepage: https://www.sleuthkit.org/sleuthkit
Priority: optional
Section: libdevel
Filename: pool/main/s/sleuthkit/libtsk-dev_4.12.1+dfsg-0kali5_amd64.deb
Size: 522740
SHA256: 95323ebad9c72cc4b586f7b8933b02240eb12c41d997aec5a0518a2c3fc4824e
SHA1: 28bbed93415646c2a744815fdf1884eb3b7072ad
MD5sum: 5ac0d5f44271549ee3840dabb9b2d5ea
Description: library for forensics analysis (development files)
The Sleuth Kit, also known as TSK, is a collection of UNIX-based command
line file and volume system forensic analysis tools. The filesystem tools
allow you to examine filesystems of a suspect computer in a non-intrusive
fashion. Because the tools do not rely on the operating system to process the
filesystems, deleted and hidden content is shown.
.
The volume system (media management) tools allow you to examine the layout of
disks and other media. You can also recover deleted files, get information
stored in slack spaces, examine filesystems journal, see partitions layout on
disks or images etc. But is very important clarify that the TSK acts over the
current filesystem only.
.
The Sleuth Kit supports DOS partitions, BSD partitions (disk labels), Mac
partitions, Sun slices (Volume Table of Contents), and GPT disks. With these
tools, you can identify where partitions are located and extract them so that
they can be analyzed with filesystem analysis tools.
.
Currently, TSK supports several filesystems, as NTFS, FAT, exFAT, HFS+, Ext3,
Ext4, UFS and YAFFS2.
.
This package contains header files and static version of the library.
Description-md5:
Original-Maintainer: Debian Security Tools
Source: sleuthkit
Version: 4.12.1+dfsg-0kali5
Architecture: amd64
Maintainer: Kali Developers
Installed-Size: 2702
Depends: libtsk19 (= 4.12.1+dfsg-0kali5), zlib1g-dev
Multi-Arch: same
Homepage: https://www.sleuthkit.org/sleuthkit
Priority: optional
Section: libdevel
Filename: pool/main/s/sleuthkit/libtsk-dev_4.12.1+dfsg-0kali5_amd64.deb
Size: 522740
SHA256: 95323ebad9c72cc4b586f7b8933b02240eb12c41d997aec5a0518a2c3fc4824e
SHA1: 28bbed93415646c2a744815fdf1884eb3b7072ad
MD5sum: 5ac0d5f44271549ee3840dabb9b2d5ea
Description: library for forensics analysis (development files)
The Sleuth Kit, also known as TSK, is a collection of UNIX-based command
line file and volume system forensic analysis tools. The filesystem tools
allow you to examine filesystems of a suspect computer in a non-intrusive
fashion. Because the tools do not rely on the operating system to process the
filesystems, deleted and hidden content is shown.
.
The volume system (media management) tools allow you to examine the layout of
disks and other media. You can also recover deleted files, get information
stored in slack spaces, examine filesystems journal, see partitions layout on
disks or images etc. But is very important clarify that the TSK acts over the
current filesystem only.
.
The Sleuth Kit supports DOS partitions, BSD partitions (disk labels), Mac
partitions, Sun slices (Volume Table of Contents), and GPT disks. With these
tools, you can identify where partitions are located and extract them so that
they can be analyzed with filesystem analysis tools.
.
Currently, TSK supports several filesystems, as NTFS, FAT, exFAT, HFS+, Ext3,
Ext4, UFS and YAFFS2.
.
This package contains header files and static version of the library.
Description-md5:
Original-Maintainer: Debian Security Tools