🚨 #DFIR Tool Update Alert 🚨

I’ve updated my script that parses USB Connection artifacts from a mounted Windows volume, to include EID 1006 events from the Windows-Partition-Diagnostic log

Includes connect/disconnect times, VSNs & filesystem type

Check it out: https://github.com/khyrenz/parseusbs

I also updated my blog on this tool: https://www.khyrenz.com/post/automated-usb-artefact-parsing-from-the-registry

Side note: while I was researching volume serial numbers & how to parse them, I noticed that some existing tools aren’t parsing the whole VSN for NTFS drives (only show 4 of the 8 bytes). I contacted the authors of those tools & some updates are incoming #DFIRTeamwork. In the meantime, if you see a 4-byte VSN for an NTFS drive just be aware you’re missing 4 bytes πŸ‘

GitHub - khyrenz/parseusbs: Parses USB connection artifacts from offline Registry hives

Parses USB connection artifacts from offline Registry hives - khyrenz/parseusbs

GitHub