Cyber Forensics up and Running by Vashishth Tarun;

Cyber Forensics up and Running by Vashishth Tarun;

Author:Vashishth, Tarun;
Language: eng
Format: epub
Publisher: BPB Publications


In all of these examples, USB drives were used as a delivery mechanism for malicious software or as a means of accessing sensitive systems. The use of USB drives allowed attackers to bypass traditional security measures and gain access to critical systems or data. In many cases, the use of USB drives was discovered through forensic analysis or by tracing the attack back to its source.

We will look at how Windows registry keys can help digital forensics professionals and incident responders to identify whether an USB or thumb drive or even an external drive was either plugged or mounted to the system. If yes, then when and which USB or thumb drive.

Registry key: HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\USBSTOR. It stores information about USB storage devices connected to the system, including device name, vendor ID, product ID, and serial number.

There are a few more USB-related registry keys which store a great wealth of information, as discussed in the following table:

Registry Key

Description



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Popular ebooks
Cloud Auditing Best Practices: Perform Security and IT Audits across AWS, Azure, and GCP by building effective cloud auditing plans by Shinesa Cambric Michael Ratemo(942)
Ansible for Real-Life Automation - A complete Ansible handbook filled with practical IT automation use cases (2022) by Packt(612)
Learn Wireshark - A definitive guide to expertly analyzing protocols and troubleshooting networks using Wireshark - 2nd Edition (2022) by Packt(566)
Data Engineering with Scala and Spark by Eric Tome Rupam Bhattacharjee David Radford(336)
Kubernetes Secrets Handbook by Emmanouil Gkatziouras | 
Rom Adams
 | Chen Xi(193)
Power BI for Jobseekers by Alan Murray(148)
Machine Learning for Imbalanced Data by Kumar Abhishek Dr. Mounir Abdelaziz(146)
Data Labeling in Machine Learning with Python by Vijaya Kumar Suda(136)
Learn PyCharm (Python Technologies) by HASANRAZA ANSARI(133)
The AWK Programming Language by Aho Alfred V. Kernighan Brian W. Weinberger Peter J. & Brian W. Kernighan & Peter J. Weinberger(132)
Hands-On Scikit-Learn for Machine Learning Applications Data Science Fundamentals with Python by David Paper (Apress;2019;9781484253724;eng)(132)
SWIFT AND C++ PROGRAMMING MADE SIMPLE: A BEGINNER’S GUIDE TO PROGRAMMING - 2 BOOKS IN 1 by STOKES MARK(125)
Programming for Problem-Solving with C by Kamaldeep;(124)
Asynchronous Programming in Rust by Carl Fredrik Samson;(123)
The Influence of a Self-Avatar on Space and Body Perception in Immersive Virtual Reality by Ivelina Piryankova(118)
Quantum Machine Learning by Claudio Conti(111)
Practical Machine Learning on Databricks by Debu Sinha(110)
Addison-Wesley Learn Python the Hard Way, A Very Simple Introduction to the Terrifyingly Beautiful World of Computers and Code 3rd (2014) by Unknown(107)
Cyber Forensics up and Running by Vashishth Tarun;(102)
Graph Data Science with Python and Neo4j: Hands-on Projects on Python and Neo4j Integration for Data Visualization and Analysis Using Graph Data Science for Building Enterprise Strategies by Timothy Eastridge(101)