- Learning Python for Forensics
- Preston Miller Chapin Bryce
- 208字
- 2021-08-20 10:17:12
Forming the prep_usb_lookup() function
In this function, we call out to the usb_lookup.py script's .get_usb_file() function. Using the local_usb_ids parameter that's provided, we can confirm whether there is a known usb.ids file path that we should use for this lookup, or whether we should reach out to the online resource at http://linux-usb.org/usb.ids to read the known USB information into the usb_file variable on line 147. This database is an open source project that hosts the VID/PID lookup database, allowing users to reference and expand on the database:
137 def prep_usb_lookup(local_usb_ids=None):
138 """
139 Prepare the lookup of USB devices through accessing the most
140 recent copy of the database at http://linux-usb.org/usb.ids
141 or using the provided file and parsing it into a queriable
142 dictionary format.
143 """
144 if local_usb_ids:
145 usb_file = open(local_usb_ids, encoding='latin1')
146 else:
147 usb_file = usb_lookup.get_usb_file()
After downloading or using a local copy, we pass the file object to the .parse_file() function to process and then return the USB VID/PID data as a Python dictionary. Instead of creating a new variable for this functionality, we can just place the return keyword in front of the function call to immediately pass the value back, as shown on line 148:
148 return usb_lookup.parse_file(usb_file)
- unidbg逆向工程:原理與實踐
- 為你護航:網(wǎng)絡空間安全科普讀本(第2版)
- 網(wǎng)絡空間攻防技術原理
- 可信計算3.0工程初步
- Applied Network Security
- 從0到1:CTFer成長之路
- API安全技術與實戰(zhàn)
- End to End GUI Development with Qt5
- 網(wǎng)絡安全大數(shù)據(jù)分析與實戰(zhàn)
- Kali Linux高級滲透測試(原書第4版)
- Hands-On Artificial Intelligence for Cybersecurity
- 網(wǎng)絡空間安全實戰(zhàn)基礎
- 計算機系統(tǒng)與網(wǎng)絡安全研究
- 網(wǎng)絡空間安全體系
- 零信任安全從入門到精通