- Learning Python for Forensics
- Preston Miller Chapin Bryce
- 124字
- 2021-08-20 10:17:10
Running the script
We now have a script that takes a setupapi.dev.log file, as found on Windows 7, and outputs USB entries with their associated timestamps. The following screenshot shows how we can execute the script with a sample setupapi.dev.log file, which has been provided in the code bundle. Your output may vary depending on the setupapi.dev.log file you use the script on:

Since setupapi.dev.log has numerous entries, we have pulled out two additional snippets from our command's output that focus on USB and USBSTOR devices:

Our second snippet shows some details from the USBSTOR entries:

Our current iteration seems to generate some false positives by extracting responsive lines that do not pertain solely to USB devices; let's see how we can address that.
推薦閱讀
- 工業互聯網安全
- Wireshark 2 Quick Start Guide
- 計算機使用安全與防護
- 諸神之眼:Nmap網絡安全審計技術揭秘
- Applied Network Security
- 解密彩虹團隊非凡實戰能力:企業安全體系建設(共5冊)
- 先進云安全研究與實踐
- 功能型密碼算法設計與分析
- Web代碼安全漏洞深度剖析
- Securing Network Infrastructure
- 動態賦能網絡空間防御
- 惡意軟件、Rootkit和僵尸網絡
- 計算機網絡安全與應用技術(第2版)
- Hands-On Spring Security 5 for Reactive Applications
- 網絡安全等級保護2.0:定級、測評、實施與運維