23.12.2012 Views

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

evidence data dur<strong>in</strong>g analysis. Likewise, the use of write blockers dur<strong>in</strong>g analysis<br />

could prevent changes to the orig<strong>in</strong>al acquired data. Thus, the Tableau forensic<br />

hardware write blocker was used to connect to the forensic workstation via USB<br />

connection dur<strong>in</strong>g analysis <strong>in</strong> order to ma<strong>in</strong>ta<strong>in</strong> the preservation of the collected data.<br />

Figure 4.55: Tableau forensic USB bridge<br />

(http://www.tableau.com/images/products/t8_r2_front_hi_res.jpg)<br />

The data analysis was performed by us<strong>in</strong>g two different forensic test-stations <strong>in</strong> the<br />

laboratory. One of the forensic test-stations was <strong>in</strong>stalled with EnCase for imag<strong>in</strong>g<br />

the collected data, and analysis of <strong>RFID</strong> Reader‟s memory, POS station‟s memory,<br />

and the physical drive image. The second forensic test-station was <strong>in</strong>stalled with a<br />

SQL Server 2005 and used to analyze the collected SQL artefacts.<br />

4.3.1 Analysis of <strong>RFID</strong> Reader’s Memory<br />

After acquir<strong>in</strong>g the bit-to-bit image of the logs from <strong>RFID</strong> reader‟s memory (Section<br />

4.2.2), its image copy on the forensic test-station was analyzed by us<strong>in</strong>g EnCase<br />

Forensic Tra<strong>in</strong><strong>in</strong>g software. As stated <strong>in</strong> Section 3.3.2, the fake tag (ID:<br />

E0040000E90A4302) was used as a keyword to look for the malicious transaction <strong>in</strong><br />

the image copy when analyz<strong>in</strong>g. Hence, the notable evidence of the malicious<br />

transaction was found along with the tag ID, date and timestamp (as shown <strong>in</strong> the<br />

Figure 4.56).<br />

123

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!