LinuxCommandLibrary

icat

Recover file content from disk image

SYNOPSIS

icat [-b bsize] [-e EncPkg] [-f fstype] [-h] [-m] [-o offset] [-P] [-R] [-V] [-v] [-z case] [-s] image1 [imageN] inode

PARAMETERS

-b bsize
    Size of device blocks in bytes (default: 512)

-e EncPkg
    Name of decryption package for encrypted images

-f fstype
    Force filesystem type (e.g., dos, ntfs, ext2fs, ufs)

-h
    Print usage help

-m
    Extract only file metadata (no content)

-o offset
    Byte offset to image start (default: 0)

-P
    Preserve full path translation

-R
    Recurse into unallocated directories

-V
    Verbose directory entry listing

-v
    Verbose output to stderr

-z case
    EnCase case name for EWF images

-s
    Sparsify output (omit empty sectors)

DESCRIPTION

icat is a command-line tool from The Sleuth Kit (TSK), essential for digital forensics. It extracts the raw contents of a file directly from a disk image, device, or volume by specifying the file's inode number, ignoring filesystem metadata, permissions, and structure.

This makes it invaluable for recovering deleted, fragmented, or unallocated files. Output goes to stdout, perfect for redirection (> file) or piping. It supports multiple filesystems including FAT, NTFS, Ext2/3, UFS, and HFS+, with auto-detection or manual override.

Common workflow: Use fls to find inodes, istat for metadata, then icat for data extraction. Options handle split images, offsets, encryption, and sparse files. Verbose modes assist debugging. While powerful, it outputs only data blocks—no attributes preserved.

Ideal for investigations, incident response, and data carving, icat ensures bit-accurate copies without filesystem interference, aiding integrity verification via hashes.

CAVEATS

Requires inode from fls(1); outputs raw data only—no timestamps/attributes. Use read-only images. Not for live extraction without care.

BASIC EXAMPLE

icat image.dd 123 > file.txt
Extracts inode 123 to file.txt

FIND INODE FIRST

fls image.dd | grep filename
Lists inodes; pipe or use -r -d for deleted/recursive

HISTORY

Part of The Sleuth Kit by Brian Carrier, evolved from The Coroner's Toolkit (TCT) circa 2001. Actively maintained in TSK releases for forensic analysis.

SEE ALSO

fls(1), istat(1), tsk_recover(1), dd(1)

Copied to clipboard