Fiwalk allows you to take a disk image and get header-like information about the files.
It appears the basis of it’s function is similar to the fls function, but you get lots more information.
fiwalk practical.floppy.dd.dd
image_filename: practical.floppy.dd.dd
fiwalk_version: 4.0.1
start_time: Mon Dec 31 13:37:31 2012
tsk_version: 4.0.1
# fs start: 0
partition_offset: 0
sector_size: 512
block_size: 512
ftype: 2
ftype_str: fat12
block_count: 2880
first_block: 0
last_block: 2879
parent_inode: 2
filename: Docs
partition: 1
id: 1
name_type: d
filesize: 512
alloc: 1
used: 1
inode: 4
meta_type: 2
.
.
.
What’s great here, is you can pipe this output, filter and get output like this
fiwalk practical.floppy.dd.dd | grep filename
image_filename: practical.floppy.dd.dd
filename: Docs
filename: Docs/.
filename: Docs/..
filename: Docs/Benchmarks.xls
filename: Docs/Computer_Build.xml
filename: Docs/Law.doc
filename: Docs/whyhack
filename: Docs/Private
filename: Docs/Private/.
filename: Docs/Private/..
filename: Docs/Private/ReyHalif.doc
filename: Pics
filename: Pics/.
filename: Pics/..
filename: Pics/C800x600.jpg
filename: Pics/bike2.jpg
filename: Pics/bike3.jpg
filename: Pics/matrixs3.jpg
filename: Pics/mulewheelie.gif
filename: Pics/Stoppie.gif
filename: ARP.EXE
filename: FTP.EXE
filename: loveletter.virus
filename: ouchy.dat
filename: snoof.gz
filename: $MBR
filename: $FAT1
filename: $FAT2
filename: $OrphanFiles
Even better, put this information into xml and now you can begin automating sleuthing scripts.
fiwalk -x practical.floppy.dd.dd > floppy.xml
I’ll leave out the lengthy output here Try it yourself.