官术网_书友最值得收藏!

Running our first forensic script

The usb_lookup.py script requires two arguments—vendor and product IDs for the USB of interest. We can find this information by looking at a suspect HKLM\SYSTEM\%CurrentControlSet%\Enum\USB registry key. For example, supplying the vendor, 0951, and product, 1643, from the sub-key VID_0951&PID_1643, results in our script identifying the device as a Kingston DataTraveler G3:

Our data source is not an all-inclusive list, and if you supply a vendor or a product ID that does not exist in the data source, our script will print that the ID was not found. The full code for this and all of our scripts can be downloaded from https://packtpub.com/books/content/support.

主站蜘蛛池模板: 会昌县| 九台市| 通城县| 运城市| 濉溪县| 宾川县| 竹溪县| 大连市| 蓬安县| 乌拉特后旗| 阿拉尔市| 锦屏县| 武城县| 龙井市| 志丹县| 淮阳县| 台州市| 政和县| 雅安市| 虹口区| 麻阳| 安庆市| 信宜市| 玛纳斯县| 广河县| 昌吉市| 霍城县| 察隅县| 兴安县| 桑日县| 兴和县| 普洱| 滁州市| 英吉沙县| 安徽省| 水富县| 利津县| 灵丘县| 漯河市| 庄河市| 扶绥县|