23.12.2012 Views

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

4.2.3.6.6 System Event Logs<br />

In addition to the SQL Server error and trace file logs, W<strong>in</strong>dows XP (test<br />

station) system ma<strong>in</strong>ta<strong>in</strong> system, application and security logs that can be<br />

related to the <strong>in</strong>vestigation. By default, these system event logs were located <strong>in</strong><br />

C:\WINDOWS\system32\config directory <strong>in</strong> W<strong>in</strong>dows XP and could be<br />

acquired by us<strong>in</strong>g either psloglist.exe utility from customized HELIX_<strong>RFID</strong>_IR<br />

DVD or dcfldd to acquire the physical event log files. Hence, the system event<br />

logs were extracted by us<strong>in</strong>g the follow<strong>in</strong>g syntax to forward the outputs to the<br />

evidence collection drive (E:\).<br />

psloglist.exe –s Application >> E:\ApplicationLog.txt<br />

psloglist.exe –s System >> E:\SystemLog.txt<br />

psloglist.exe –s Security >> E:\SecurityLog.txt<br />

Hence, the argument –s was used <strong>in</strong> the syntax for delimit<strong>in</strong>g output, which<br />

could help to analyze the logs simply later <strong>in</strong> the analysis phase of the<br />

<strong>in</strong>vestigation.<br />

Figure 4.53: Acquisitions of application, system and security error logs by us<strong>in</strong>g<br />

psloglist.exe<br />

121

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!