23.12.2012 Views

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Figure 4.57: Analyz<strong>in</strong>g the image copy of POS RAM with EnCase<br />

The notable evidence of the malicious transaction was also uncovered <strong>in</strong> the POS<br />

RAM image along with the tag ID, date and timestamp (as shown <strong>in</strong> the Figure 4.56).<br />

However, unlike the evidence found <strong>in</strong> analyz<strong>in</strong>g reader‟s memory; the analysis result<br />

of POS RAM provided the malicious (SQL poison<strong>in</strong>g) code <strong>in</strong> addition to fake tag<br />

ID, date and timestamp of when the attack was <strong>in</strong>itiated to compromise the backend<br />

server of <strong>RFID</strong> based retail system.<br />

4.3.3 Analysis of SQL Server Artefacts<br />

As previous stated <strong>in</strong> the report of collected data (Section 4.2.3), some of the<br />

collected SQL Server artefacts could be analyzed by us<strong>in</strong>g a text viewer, but others<br />

125

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!