As an experienced forensic analyst, you ' ve been called upon to examine a Linux server suspected of being compromised. You are performing file system analysis using The Sleuth Kit (TSK) to discover any anomalies. While conducting the analysis, you notice that there ' s a huge amount of data and manually checking each file would be impractical. What feature of TSK should you use to automate the process and identify potential evidence more effectively?
Submit