23.12.2012 Views

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Appendix 16: Documentation of the SQL Poison<strong>in</strong>g Attack<br />

(An Example of a Pilot Experiment)<br />

Step 1: After stabiliz<strong>in</strong>g the <strong>RFID</strong> Bus<strong>in</strong>ess System (as stated <strong>in</strong> Appendix 7), the<br />

fake <strong>RFID</strong> tag was <strong>in</strong>jected with malicious code.<br />

Figure A16.1: Writ<strong>in</strong>g the malicious code <strong>in</strong>to the fake tag, successful!<br />

Step 2: The genu<strong>in</strong>e tag data was scanned a few times before the attack was<br />

<strong>in</strong>itiated. Hence the values of all the products were $1000, as shown <strong>in</strong> the figure<br />

below.<br />

Figure A16.2: Scann<strong>in</strong>g the genu<strong>in</strong>e <strong>RFID</strong> tag<br />

194

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!