官术网_书友最值得收藏!

Running our first forensic script

The usb_lookup.py script requires two arguments—vendor and product IDs for the USB of interest. We can find this information by looking at a suspect HKLM\SYSTEM\%CurrentControlSet%\Enum\USB registry key. For example, supplying the vendor, 0951, and product, 1643, from the sub-key VID_0951&PID_1643, results in our script identifying the device as a Kingston DataTraveler G3:

Our data source is not an all-inclusive list, and if you supply a vendor or a product ID that does not exist in the data source, our script will print that the ID was not found. The full code for this and all of our scripts can be downloaded from https://packtpub.com/books/content/support.

主站蜘蛛池模板: 嫩江县| 博客| 白玉县| 满洲里市| 延川县| 花莲县| 沁水县| 海南省| 义马市| 井冈山市| 黄冈市| 连城县| 手机| 清涧县| 泰顺县| 莫力| 博罗县| 柳林县| 靖远县| 桃园县| 江门市| 运城市| 海口市| 贵定县| 静海县| 古丈县| 抚顺县| 广安市| 察哈| 苏尼特右旗| 依兰县| 龙门县| 陆丰市| 古丈县| 四会市| 遂平县| 永川市| 剑川县| 增城市| 永兴县| 个旧市|