23.12.2012 Views

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

monitored by Tripwire for Servers extracted from the Tripwire Manager Report<br />

was as shown <strong>in</strong> the figure below.<br />

Figure A7.17: The extracted <strong>in</strong>formation of server error log from Tripwire report<br />

before the attack<br />

The MD5 hash value of the monitor<strong>in</strong>g file was<br />

81F8B1F13AAA2C5FC36142D36638604E as of Tuesday, at 3:30:04pm on the<br />

12 th of October, 2010 before the attack was <strong>in</strong>itiated.<br />

88

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!