- Learning Python for Forensics
- Preston Miller Chapin Bryce
- 111字
- 2021-08-20 10:17:08
Running our first forensic script
The usb_lookup.py script requires two arguments—vendor and product IDs for the USB of interest. We can find this information by looking at a suspect HKLM\SYSTEM\%CurrentControlSet%\Enum\USB registry key. For example, supplying the vendor, 0951, and product, 1643, from the sub-key VID_0951&PID_1643, results in our script identifying the device as a Kingston DataTraveler G3:

Our data source is not an all-inclusive list, and if you supply a vendor or a product ID that does not exist in the data source, our script will print that the ID was not found. The full code for this and all of our scripts can be downloaded from https://packtpub.com/books/content/support.
推薦閱讀
- CTF實戰:技術、解題與進階
- 白帽子講Web安全(紀念版)
- INSTANT Burp Suite Starter
- 深入淺出隱私計算:技術解析與應用實踐
- 等級保護測評理論及應用
- Web安全與攻防入門很輕松(實戰超值版)
- .NET安全攻防指南(上冊)
- Spring Security(Third Edition)
- Digital Forensics with Kali Linux
- End to End GUI Development with Qt5
- 黑客攻防從入門到精通
- Web安全攻防從入門到精通
- Practical Mobile Forensics
- ATT&CK與威脅獵殺實戰
- BeagleBone for Secret Agents