官术网_书友最值得收藏!

Running our first forensic script

The usb_lookup.py script requires two arguments—vendor and product IDs for the USB of interest. We can find this information by looking at a suspect HKLM\SYSTEM\%CurrentControlSet%\Enum\USB registry key. For example, supplying the vendor, 0951, and product, 1643, from the sub-key VID_0951&PID_1643, results in our script identifying the device as a Kingston DataTraveler G3:

Our data source is not an all-inclusive list, and if you supply a vendor or a product ID that does not exist in the data source, our script will print that the ID was not found. The full code for this and all of our scripts can be downloaded from https://packtpub.com/books/content/support.

主站蜘蛛池模板: 甘洛县| 华阴市| 林西县| 鄂托克前旗| 凉山| 曲阳县| 克山县| 马龙县| 都昌县| 福泉市| 晋州市| 瓦房店市| 栾川县| 怀化市| 若羌县| 柳河县| 报价| 凉山| 张家口市| 汉沽区| 汉寿县| 洞头县| 右玉县| 班玛县| 普安县| 尉氏县| 杂多县| 石门县| 斗六市| 鄄城县| 武威市| 肥城市| 亚东县| 墨脱县| 大同县| 定陶县| 桂东县| 灌阳县| 乃东县| 洛川县| 英超|