23.12.2012 Views

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

4.2.2 Live Extraction of B<strong>in</strong>aries Reader’s Memory Log by Us<strong>in</strong>g Log<br />

Extraction Tool (LET)<br />

After the POS RAM acquisition, the extraction of logs from the <strong>RFID</strong> Reader was<br />

performed by us<strong>in</strong>g the developed Log Extraction Tool (LET) from Helix_<strong>RFID</strong>_IR<br />

tool. The LET (LogExtraction.exe) Tool was run by us<strong>in</strong>g the trusted cmd.exe from<br />

the Helix_<strong>RFID</strong>_IR tool as shown <strong>in</strong> below.<br />

D:\IR\ReaderLogExtractionTool\b<strong>in</strong>\Debug>Log Extraction.exe<br />

The acquired image file was saved <strong>in</strong> the evidence collection drive (Figure 4.15) after<br />

follow<strong>in</strong>g the <strong>in</strong>structions from the user <strong>in</strong>terface of the LET tool and was hashed<br />

with the md5deep hash<strong>in</strong>g tool soon after the acquisition of the logs from <strong>RFID</strong><br />

Reader (Reader‟s ID: UP02020) by us<strong>in</strong>g the syntax below (Figure 4.14).<br />

Figure 4.14: Hash<strong>in</strong>g reader’s memory log by us<strong>in</strong>g md5deep<br />

Figure 4.15: Memory log from <strong>RFID</strong> reader was saved on the collection drive<br />

90

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!