23.12.2012 Views

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

The live acquisitions of all collected evidence data were performed due to the<br />

volatilities of the potential evidence data. The outputs of the collected evidence data<br />

were also saved <strong>in</strong>to a sterilized USB flash drive, which was forensically wiped.<br />

Hence, the forensic <strong>in</strong>vestigator placed the customized Helix_<strong>RFID</strong>_IR tool <strong>in</strong>to the<br />

victim‟s DVD drive to commence the artefact acquisition.<br />

Figure 4.12: Helix_<strong>RFID</strong>_IR tool <strong>in</strong> action on the compromised mach<strong>in</strong>e<br />

4.2.1 Live Memory (Random Access Memory) Acquisition of POS Host Station<br />

For the purpose of the random access memory (RAM) evidence collection of the<br />

target POS host station, w<strong>in</strong>en.exe memory acquisition tool provided by Guidance<br />

Software was used. The w<strong>in</strong>en.exe was located <strong>in</strong> the customized Helix_<strong>RFID</strong>_IR<br />

tool and run from the trusted command prompt, D:\IR\xp\cmd.exe (as shown <strong>in</strong><br />

Figure 4.13). Hence, the POS RAM was successfully collected and saved on the<br />

evidence collection flash drive (E:\).<br />

Figure 4.13: Live memory acquisition of RAM <strong>in</strong> action<br />

89

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!