ffind
Compare original and translation side by side
🇺🇸
Original
English🇨🇳
Translation
ChineseFfind - Advanced File Finder with Extraction
Ffind - 具备提取功能的高级文件查找工具
You are helping the user find and analyze files with advanced type detection and optional filesystem extraction capabilities using the ffind tool.
您正在使用ffind工具帮助用户查找和分析文件,该工具具备高级类型检测和可选的文件系统提取功能。
Tool Overview
工具概述
Ffind analyzes files and directories, identifies file types, and can extract filesystems (ext2/3/4, F2FS) for deeper analysis. It's designed for firmware and IoT device analysis.
Ffind可分析文件和目录、识别文件类型,还能提取文件系统(ext2/3/4、F2FS)以进行深度分析。它专为固件和IoT设备分析设计。
Instructions
使用说明
When the user asks to analyze files, find specific file types, or extract filesystems:
-
Understand the target:
- Ask what path(s) they want to analyze
- Determine if they want to extract filesystems or just analyze
- Ask if they want all file types or just artifact types
-
Execute the analysis:
- Use the ffind command from the iothackbot bin directory
- Basic usage:
ffind <path> [<path2> ...] - To extract filesystems:
ffind <path> -e - Custom extraction directory:
ffind <path> -e -d /path/to/output - Show all file types:
ffind <path> -a - Verbose output:
ffind <path> -v
-
Output formats:
- (default): Human-readable colored output with type summaries
--format text - : Machine-readable JSON
--format json - : Minimal output
--format quiet
-
Extraction capabilities:
- Supports ext2/ext3/ext4 filesystems (requires e2fsprogs)
- Supports F2FS filesystems (requires f2fs-tools)
- Requires sudo privileges for extraction
- Default extraction location:
/tmp/ffind_<timestamp>
当用户要求分析文件、查找特定文件类型或提取文件系统时:
-
明确目标:
- 询问用户要分析的路径
- 确定用户是要提取文件系统还是仅进行分析
- 询问用户是要查看所有文件类型还是仅查看工件类型
-
执行分析:
- 使用iothackbot bin目录中的ffind命令
- 基础用法:
ffind <path> [<path2> ...] - 提取文件系统:
ffind <path> -e - 自定义提取目录:
ffind <path> -e -d /path/to/output - 显示所有文件类型:
ffind <path> -a - 详细输出:
ffind <path> -v
-
输出格式:
- (默认):带颜色的人类可读输出,包含类型摘要
--format text - :机器可读的JSON格式
--format json - :极简输出
--format quiet
-
提取功能:
- 支持ext2/ext3/ext4文件系统(需要e2fsprogs)
- 支持F2FS文件系统(需要f2fs-tools)
- 提取需要sudo权限
- 默认提取位置:
/tmp/ffind_<timestamp>
Examples
示例
Analyze a firmware file to see file types:
bash
ffind /path/to/firmware.binExtract all filesystems from a firmware image:
bash
sudo ffind /path/to/firmware.bin -eAnalyze multiple files and show all types:
bash
ffind /path/to/file1.bin /path/to/file2.bin -aExtract to a custom directory:
bash
sudo ffind /path/to/firmware.bin -e -d /tmp/my-extraction分析固件文件以查看文件类型:
bash
ffind /path/to/firmware.bin从固件镜像中提取所有文件系统:
bash
sudo ffind /path/to/firmware.bin -e分析多个文件并显示所有类型:
bash
ffind /path/to/file1.bin /path/to/file2.bin -a提取到自定义目录:
bash
sudo ffind /path/to/firmware.bin -e -d /tmp/my-extractionImportant Notes
重要注意事项
- Extraction requires root/sudo privileges
- Requires external tools: e2fsprogs, f2fs-tools, util-linux
- Identifies "artifact" file types relevant to security analysis by default
- Use flag to see all file types including common formats
-a
- 提取需要root/sudo权限
- 需要外部工具:e2fsprogs、f2fs-tools、util-linux
- 默认识别与安全分析相关的“工件”文件类型
- 使用标志可查看所有文件类型,包括常见格式
-a