23.12.2012 Views

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

4.2.3.4.7 Server Harden<strong>in</strong>g Information<br />

The identification of security weakness or harden<strong>in</strong>g of compromised backend<br />

server could also give support to forensic <strong>in</strong>vestigator for determ<strong>in</strong><strong>in</strong>g the scope<br />

and areas of <strong>in</strong>terest <strong>in</strong> <strong>in</strong>vestigation.<br />

Accord<strong>in</strong>g to Fowler (2009, p. 261), “one of the most well-known SQL<br />

Server misconfigurations is the use of blank passwords and log<strong>in</strong>s with blank<br />

passwords (example: SA log<strong>in</strong>) are an attractive target for an attacker try<strong>in</strong>g to<br />

ga<strong>in</strong> access to a SQL Server <strong>in</strong>stance”.<br />

Thus, all the backend server log<strong>in</strong>s were also collected by us<strong>in</strong>g<br />

automated WFT from Helix_<strong>RFID</strong>_IR toolkit. The result of the collected log<strong>in</strong>s<br />

could be seen <strong>in</strong> the follow<strong>in</strong>g Figure (4.44).<br />

Figure 4.44: Collected SQL Server log<strong>in</strong>s<br />

Furthermore, an <strong>in</strong>vestigation on security configurations of the SQL Server was<br />

also significant <strong>in</strong> order to f<strong>in</strong>d out whether the malicious hacker or<br />

unauthorized user had ga<strong>in</strong>ed access to the backend database by us<strong>in</strong>g the weak<br />

po<strong>in</strong>t of the security configuration. However, the database attack could be<br />

m<strong>in</strong>imized by server adm<strong>in</strong>istrators by us<strong>in</strong>g a SQL Server 2005 Surface Area<br />

Configuration (SAC) tool. The Surface Area Configuration (SAC) tool was<br />

basically <strong>in</strong>troduced <strong>in</strong> 2005 and later versions of SQL Servers <strong>in</strong> order to<br />

simply disable the vulnerable features of SQL Servers for harden<strong>in</strong>g the<br />

security. By us<strong>in</strong>g SAC tool, the adm<strong>in</strong>istrators could disable unnecessary<br />

database features or functionalities such as xp_cmdshell, SQL Server browser,<br />

remote connection and the like. Similar to the configuration sett<strong>in</strong>gs of the SQL<br />

Server, SAC could give the forensic exam<strong>in</strong>er the <strong>in</strong>formation about which<br />

113

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!