23.12.2012 Views

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

4.2.3 SQL 2005 Server Data<br />

The SQL Server data related to the scope of <strong>in</strong>vestigation were collected <strong>in</strong> a<br />

forensically sound manner. The artefacts collection methods <strong>in</strong>volved us<strong>in</strong>g the<br />

customized W<strong>in</strong>dows Forensic Toolchest (WFT) from Helix_<strong>RFID</strong>_IR, the<br />

executions of ad hoc SQL commands, and the like. Hence, the trusted SQLCMD<br />

from Helix_<strong>RFID</strong>_IR was also used for connection to the victim server to collect the<br />

SQL Server related data. For example, the connection to the SQL Server <strong>in</strong>stance was<br />

completed by us<strong>in</strong>g the follow<strong>in</strong>g syntax (Figure 4.16).<br />

Figure 4.16: Connection to the SQL Server <strong>in</strong>stance<br />

Once the connection was established, the output returned a list of active sessions<br />

which were stored with<strong>in</strong> the file named E:\sessions.txt. Then, the md5deep utility<br />

was used to create MD5 hash value of the file.<br />

The hash<strong>in</strong>g techniques used <strong>in</strong> the acquisitions of all SQL Server artefacts<br />

dur<strong>in</strong>g the forensic <strong>in</strong>vestigation were summarized the tables of Appendix 1. As a<br />

result of the acquired artefacts have their own MD5 hash values, these hash values<br />

can later be used for <strong>in</strong>tegrity check<strong>in</strong>g of the collected artefacts <strong>in</strong> the analysis<br />

section. Hence, the preservation of the artefacts is ma<strong>in</strong>ta<strong>in</strong>ed dur<strong>in</strong>g the forensic<br />

<strong>in</strong>vestigation.<br />

Furthermore, as stated <strong>in</strong> the data process<strong>in</strong>g (Section 3.3.5), the acquired data<br />

presented <strong>in</strong> this section were formatted <strong>in</strong> the customized style <strong>in</strong> which some of the<br />

irrelevant columns and rows from the acquired artefacts are excluded due to the<br />

limitations of the page layout.<br />

91

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!