23.12.2012 Views

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

4.1.2 Data Generation or Attack Case Scenario<br />

There were a few errors that were fixed dur<strong>in</strong>g the data generation <strong>in</strong> the pilot tests of<br />

the research experiment. For <strong>in</strong>stance; read<strong>in</strong>g the <strong>RFID</strong> tag <strong>in</strong>jected with the<br />

malicious code by us<strong>in</strong>g <strong>RFID</strong> scanner was unsuccessful <strong>in</strong> a pilot test as only 62<br />

Bytes of the tag data (see Figure 4.4) could be collected by the customized <strong>RFID</strong><br />

middleware. Hence, the size of <strong>in</strong>serted malicious code was adjusted to 56 bytes as<br />

stated <strong>in</strong> Section 3.3.2.<br />

Figure 4.4: Only 62 Bytes of on-tag data can be read by the scanner<br />

4.1.3 <strong>Investigation</strong> Case Scenario<br />

The <strong>in</strong>vestigation scenario was the same, as stated <strong>in</strong> Section 3.3.3.<br />

4.1.4 Data Collection<br />

A few changes were made dur<strong>in</strong>g the data collection stage. For <strong>in</strong>stance, the <strong>in</strong>correct<br />

syntax error was returned when the <strong>in</strong>vestigator recorded the details <strong>in</strong>formation<br />

regard<strong>in</strong>g connection session to the backend database SQL Server <strong>in</strong>stance before<br />

shutt<strong>in</strong>g down the Server <strong>in</strong>stance. The correct syntax for record<strong>in</strong>g the connection<br />

session details on the compromised system can be seen <strong>in</strong> the Section 4.2.3.5.<br />

Furthermore, a few problems were encountered dur<strong>in</strong>g the preparation stages<br />

before collect<strong>in</strong>g evidence data such as forensically wip<strong>in</strong>g the USB flash drive for<br />

the storage of collected data by EnCase (Figure 4.5), <strong>in</strong>itial connection to the backend<br />

85

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!