23.12.2012 Views

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Figure A6.10: Screenshot of writ<strong>in</strong>g the SQL <strong>in</strong>jection code to the fake tag<br />

5. An Attack <strong>in</strong> Action<br />

The test<strong>in</strong>g BIS is a simple system as it has a reader connected to a POS term<strong>in</strong>al<br />

and the backend database is runn<strong>in</strong>g on the host computer. When the customer is<br />

check<strong>in</strong>g out the item he/she bought, the tag attachment is detached from the<br />

product and scanned at the POS term<strong>in</strong>al.<br />

Figure A6.11: Genu<strong>in</strong>e tag is read at the POS term<strong>in</strong>al<br />

However, the fake tag is replaced by the attacker with the help of a malicious<br />

employee <strong>in</strong> store and scanned at the POS term<strong>in</strong>al (as shown <strong>in</strong> Figure A6.12);<br />

the value attached to the item will be changed <strong>in</strong> the backend database as the<br />

65

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!