Help Irongeek.com pay for bandwidth and research equipment:
Man page of MISSIDENTIFY
Section: Jesse Kornblum (1)
Updated: v1.0 - 20 Feb 2008
Index of this MAN page
Back To MAN Pages From BackTrack 5 R1 Master List
missidentify - Find executable files without an executable extension
missidentify [-rqablv] [-s|-S len] [-Vh] [FILES]
Miss Identify looks at the header of every file it processes and determines
if it is a PE executable (Windows executable). Such files can include programs,
device drivers, and DLLs. By default the program displays the filename if
the extension of the file does not match one of the known executable
extensions (.exe, .com, .sys, or .dll). Other options can make the program
display the filename of all executable files.
Enables recursive mode. All subdirectories are traversed. Please note
that recursive mode cannot be used to examine all files of a given
file extension. For example, calling missidentify -r *.txt will examine
all files in directories that end in .txt.
Silent mode. All error messages except fatal errors are surpressed.
Display filenames of all executables
Enables bare mode. Strips any leading directory information from
This flag may not be used in conjunction with the -l flag.
Enables relative file paths. Instead of printing the absolute path for
each file, displays the relative file path as indicated on the command
This flag may not be used in conjunction with the -b flag.
Verbose mode. Displays the name of every 10th file as a progress indicator.
- -s-S len
Prints strings of length len with each filename. With lowercase letter,
puts filename before string. With uppercase letter, puts strings before
Show a help screen and exit.
Show the version number and exit.
The program can be fooled by any file with more than 1024 bytes between
the MZ header and the PE header.
Miss Identify was written by Jesse Kornblum
Copyright (C) 2008 Jesse Kornblum. This is free software. You may
redistribute copies of it under the terms of the GNU General Public
License version 2. There is NO WARRANTY. See the file COPYING for
- SEE ALSO
This document was created by
using the manual pages.
Time: 07:34:21 GMT, September 13, 2011
Printable version of this article
15 most recent posts on Irongeek.com:
If you would like to republish one of the articles from this site on your
webpage or print journal please contact IronGeek.
Copyright 2016, IronGeek
Louisville / Kentuckiana Information Security Enthusiast