23.12.2012 Views

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Step 2: The backend database files was loaded to check the effect of the malicious.<br />

Figure A8.2: Screenshot of the backend SQL Server log file<br />

Figure A8.3: Screenshot of the backend database file<br />

As shown <strong>in</strong> Figure A8.3, all of the values of SI were changed to the value $600<br />

after the attack.<br />

90

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!