http://www.buskillvampfih2iucxhit3qp36i2zzql3u6pmkeafvlxs3tlmot5yad.onion/luks-self-destruct
-name \*.txt | grep -Evi '_histogram|_services' | xargs tail --silent -n+6 | wc -l
2400
root@kali:~/bulk_out# I’ve simplified the details of the report above for brevity, but it’s sufficient to note that it detected 2,400 matches from the following features: url, telephone, find, email, domain, zip, elf, and zip. Interestingly, ` bulk_extractor ` found 8 LUKS magic number sequences across the entire disk, but only one of them actually looks like the start of a LUKS...