23.12.2012 Views

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

14. Gather the latest versions of WFT executables by us<strong>in</strong>g the follow<strong>in</strong>g<br />

command (WFT’s fetchtools arguments) to download them from<br />

http://www.foolmoon.net/security/<strong>in</strong>dex.html.<br />

� wft.exe -fetchtools<br />

15. Verify the downloaded files by us<strong>in</strong>g the follow<strong>in</strong>g command to generate<br />

MD5 hashes for all SQL scripts and executables that will be used by WFT<br />

framework. Hence, those newly generated hashes are also saved <strong>in</strong>to<br />

wft.new configuration file and the execution results can be seen <strong>in</strong> the<br />

figure A2.2.<br />

� wft.exe -fixcfg wtf.cfg wft.new<br />

Figure A2.2: Screenshot of the result of wft.exe – fixcfg wft.cfg wft.new<br />

16. Copy SQL <strong>in</strong>cident response files from the companion DVD of SQL<br />

Server Forensic Analysis (Fowler, 2009).<br />

17. Verify the copied files by us<strong>in</strong>g the follow<strong>in</strong>g command:<br />

� wft.exe -fixcfg wftsql.cfg wftsql.new<br />

7

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!