- Learning Python for Forensics
- Preston Miller Chapin Bryce
- 198字
- 2021-08-20 10:17:11
Running the script
In this iteration, we address several issues from the proof of concept. These changes include the following:
- The improvement of resource management by iterating through a file rather than reading the entire file into a variable
- The addition of an argument to allow the user to provide the setupapi.dev.log file to parse
- The validation of the input file from the user
- The filtering of responsive hits to reduce noise in the output
- Improved formatting of our output for ease of review
The following screenshot shows a snippet of the output of our script upon execution:

Last but not least, we achieved considerable performance improvements over our previous design. The following screenshots display the impact on the machine's memory utilization. The first iteration is displayed on the left and the second is displayed on the right. The red lines highlight the start and finish time of our script. As we can see, we have reduced our resource utilization by iterating across the lines of the file with the for loop over the readlines() method. This is a small-scale example of resource management, but a larger input file would have a more dramatic impact on the system:

- Extending Symfony2 Web Application Framework
- Metasploit Penetration Testing Cookbook(Second Edition)
- INSTANT Metasploit Starter
- Mastering Kali Linux for Advanced Penetration Testing
- 網絡安全技術及應用(第3版)
- 網絡運維親歷記 (網絡運維紀實文學)
- CTF競賽權威指南(Pwn篇)
- 從0到1:CTFer成長之路
- Kerberos域網絡安全從入門到精通
- 信息安全導論(第2版)
- 網絡安全設計、配置與管理大全
- 互聯網企業安全高級指南
- 數據保護:工作負載的可恢復性
- 網絡用戶行為的安全可信分析與控制
- 實用黑客攻防技術