23.12.2012 Views

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

syntax was used to acquire a server role membership list and the result output<br />

could be seen <strong>in</strong> Figure 4.29.<br />

:out E:\ServerRoleMembers.txt<br />

Select * from Sys.Server_Role_Members<br />

GO<br />

Figure 4.29: Acquired evidence of server role membership <strong>in</strong>formation<br />

4.2.3.4.3 Database-Level Authorization Data (DLAD)<br />

Object & Statement Permissions: DLAD could be collected by view<strong>in</strong>g<br />

SYS.DATABASE_PERMISSIONS and SYS.DATABASE_PRINCIPALS to verify<br />

the access level of database user with<strong>in</strong> a given database. By us<strong>in</strong>g the<br />

follow<strong>in</strong>g syntaxes, the list of permissions for each user and the list of database<br />

users, roles, or groups with<strong>in</strong> a given database could be collected (Fowler,<br />

2009).<br />

:out E\SystemDatabasePermissions.txt<br />

SELECT * from sys.database_permissions<br />

GO<br />

:out E:\SystemDatabasePr<strong>in</strong>cipals.txt<br />

SELECT * from sys.database_pr<strong>in</strong>cipals<br />

GO<br />

After execut<strong>in</strong>g the above syntaxes, the acquired results of system database<br />

permissions and database pr<strong>in</strong>cipals were saved <strong>in</strong> the designated evidence<br />

collection drive (E:\).<br />

The result of the backend SQL Server system database user permissions<br />

(Figure 4.19) was similar to that of the result output <strong>in</strong> the Figure 4.30. Hence,<br />

102

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!