Cyber Forensics up and Running by Vashishth Tarun;
Author:Vashishth, Tarun;
Language: eng
Format: epub
Publisher: BPB Publications
In all of these examples, USB drives were used as a delivery mechanism for malicious software or as a means of accessing sensitive systems. The use of USB drives allowed attackers to bypass traditional security measures and gain access to critical systems or data. In many cases, the use of USB drives was discovered through forensic analysis or by tracing the attack back to its source.
We will look at how Windows registry keys can help digital forensics professionals and incident responders to identify whether an USB or thumb drive or even an external drive was either plugged or mounted to the system. If yes, then when and which USB or thumb drive.
Registry key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\USBSTOR. It stores information about USB storage devices connected to the system, including device name, vendor ID, product ID, and serial number.
There are a few more USB-related registry keys which store a great wealth of information, as discussed in the following table:
Registry Key
Description
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Data Forecasting and Segmentation Using Microsoft Excel by Fernando Roque(2691)
PostgreSQL 14 Administration Cookbook by Simon Riggs(2218)
Cloud Auditing Best Practices: Perform Security and IT Audits across AWS, Azure, and GCP by building effective cloud auditing plans by Shinesa Cambric Michael Ratemo(1615)
Architects of Intelligence_The Truth About AI From the People Building It by Martin Ford(1239)
In-Memory Analytics with Apache Arrow: Perform fast and efficient data analytics on both flat and hierarchical structured data by Matthew Topol(1036)
Mastering Azure Virtual Desktop: The Ultimate Guide to the Implementation and Management of Azure Virtual Desktop by Ryan Mangan(1013)
Automated Machine Learning in Action by Qingquan Song Haifeng Jin Xia Hu(902)
Python GUI Programming with Tkinter, 2nd edition by Alan D. Moore(870)
Ansible for Real-Life Automation - A complete Ansible handbook filled with practical IT automation use cases (2022) by Packt(741)
Learn Wireshark - A definitive guide to expertly analyzing protocols and troubleshooting networks using Wireshark - 2nd Edition (2022) by Packt(734)
Data Engineering with Scala and Spark by Eric Tome Rupam Bhattacharjee David Radford(416)
Introduction to Algorithms, Fourth Edition by unknow(363)
ABAP Development for SAP HANA by Unknown(358)
Automated Machine Learning in Action by Qingquan Song & Haifeng Jin & Xia Hu(302)
Kubernetes Secrets Handbook by Emmanouil Gkatziouras | Rom Adams | Chen Xi(284)
Asynchronous Programming in Rust by Carl Fredrik Samson;(259)
Learn Enough Developer Tools to Be Dangerous: Git Version Control, Command Line, and Text Editors Essentials by Michael Hartl(255)
Machine Learning for Imbalanced Data by Kumar Abhishek Dr. Mounir Abdelaziz(250)
The AWK Programming Language by Aho Alfred V. Kernighan Brian W. Weinberger Peter J. & Brian W. Kernighan & Peter J. Weinberger(238)
