- Learning Python for Forensics
- Preston Miller Chapin Bryce
- 111字
- 2021-08-20 10:17:08
Running our first forensic script
The usb_lookup.py script requires two arguments—vendor and product IDs for the USB of interest. We can find this information by looking at a suspect HKLM\SYSTEM\%CurrentControlSet%\Enum\USB registry key. For example, supplying the vendor, 0951, and product, 1643, from the sub-key VID_0951&PID_1643, results in our script identifying the device as a Kingston DataTraveler G3:

Our data source is not an all-inclusive list, and if you supply a vendor or a product ID that does not exist in the data source, our script will print that the ID was not found. The full code for this and all of our scripts can be downloaded from https://packtpub.com/books/content/support.
推薦閱讀
- Extending Symfony2 Web Application Framework
- 攻守道:企業(yè)數(shù)字業(yè)務(wù)安全風險與防范
- Web漏洞分析與防范實戰(zhàn):卷1
- INSTANT Netcat Starter
- Kali Linux CTF Blueprints
- 黑客攻防技巧
- 等級保護測評理論及應(yīng)用
- Penetration Testing with Perl
- Kali Linux Wireless Penetration Testing Cookbook
- 模糊測試:強制發(fā)掘安全漏洞的利器
- 網(wǎng)絡(luò)關(guān)鍵設(shè)備安全檢測實施指南
- INSTANT Kali Linux
- 功能型密碼算法設(shè)計與分析
- Android Application Security Essentials
- 網(wǎng)絡(luò)安全監(jiān)控實戰(zhàn):深入理解事件檢測與響應(yīng)