The National Institutes of Science and Technology maintains the National Software Reference Library. As part of this, they keep track of SHA-1 hashes of millions of known pieces of software (the "Reference Data Set"). Unfortunately, there are very few tools to help users query the NSRL RDS. That's where nsrlquery comes in.
Zero instruction with the thing so here they are. Otherwise you have to figure it out on your own. it defaults to a test compare file called /usr/local/share/nsrlsvr/hashes.txt . Rep[lace it with a symbolic link to your NSRL hash file like so ln -s /mnt/drive1/tools/NSRL1/NSRLFile.txt /usr/local/share/nsrlsvr/hashes.txt I have a copy of my target image mounted as /mnt/drive2 then /usr/bin/nsrlsvr to fire her up netstat should look like tcp 0 0 192.168.0.54:9120 192.168.0.54:41018 TIME_WAIT then you install nsrllookup (yup, 2 pieces to the puzzle). Command line usage looks like this md5deep -r /mnt/drive2 | nsrllookup -s 192.168.0.54 -K /mnt/drive1/known.txt