23.12.2012 Views

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Hence, after perform<strong>in</strong>g the SQL Server’s <strong>in</strong>tegrity check with Tripwire,<br />

the MD5 hashes (before and after the malicious attack) of the database<br />

under Tripwire’s supervision were not the same accord<strong>in</strong>g to the report.<br />

Step 18: Load the database after the malicious attack. The f<strong>in</strong>d<strong>in</strong>g shows<br />

that all the stock item values have been changed to $600.<br />

Step 19: Load the reader logs from the backend server after the malicious<br />

attack.<br />

74

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!