13.2 USBDeview

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Difficulty
Beginner
Video Transcription
00:03
hello and welcome back to the course in this lab. We're going to learn how to review the history off USB devices that have been connected to the system by using U. S V. Review our utility buying yourself at least all your speed of isis that are currently connected to a computer as well. Us all use the devices.
00:24
The work previously used
00:26
us is explained in this website used. The review also allows youto only stole USB devices that you could use the use. This cannot use the devices that are currently connected to your computer, as well as to disable any naval USB devices.
00:43
For this lab, you will meet a Windows operating system environment, our bro sir, to download the tools and the sea prison program. So she has seven seed will see or with Raj.
00:55
First, you need to look into your windows machine on open or what, bro Sir, having here Google chrome on a Windows 10 environment. But feel free to use any other word. Bro. Sir,
01:07
search for us Vila view or you can simply go directly to the website by using the link in this guide.
01:15
Navigate the website and you will see a lot of information about the tool like company. Really? Limitations on functionality
01:25
Don't know the tool. Save it on. Steep it in your computer.
01:30
Opened Executed. Will file U S V The view that XY
01:36
this tool is really easy to use on doesn't require any installation. Just my opening execute level. You will see the least off devices.
01:46
The devices in gray are not currently connected, but they were in the past. Devices in green are blood and, he says, to physically unplugged the device without disconnecting it.
01:57
The wisest thing red are disabled.
02:00
Double click on our device To see more information about it
02:06
in the gate,
02:07
you can see the U. S V Review Collins description. According to its website
02:13
information socials. Last blood on blood date can be very useful. Well, creating a timeline.
02:21
Dr. Letter specifies the drive player off the USB device.
02:24
This column is only relevant to USB Flash memory devices onto US V CD or DVD drive
02:32
Serial number specifies the serial number off the device on this column again is only relevant. Toe masters devices CD or DVD drive on USB hard disks
02:46
created date specifies the date on time that the device was installed. In most cases, this daytime value represents the time that you first block the device to that USB port.
02:59
However, be aware that in some circumstances this value may be wrong. According to its Web site on a Window seven machine, this value is initialized with the current date and time on every revolt
03:15
to export or safety data displayed. Click on the main you file in the option safe selected items
03:23
before finishing. Here's a question for you.
03:25
Why is this to import a little forensic investigation
03:30
by No, we wish devices were connected to a specific machine. We could lean USB drive or the rice is found in a crime scene to a specific computer. These good helps off in the case.
03:44
Please check the references on supplementary material. On in the next morning, we're going to analyze a really popular and youthful technique used mostly for hiding information in pictures
Up Next
14.1 Steganography Tools
14.2 Steganography Lab
15.1 E-Mail Forensics
16.1 Course Summary