23.12.2012 Views

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

The problem issue was clearly stated that the evidence image should be split when<br />

acquir<strong>in</strong>g the physical evidence of the victim’s system (victim’s hard drive) by<br />

us<strong>in</strong>g dd tool and the dest<strong>in</strong>ation drive with FAT32 file system.<br />

Step 4: Hence, the process of acquisition was resumed with AccessData’s<br />

Forensic Tool Kit (FTK Imager Lite - version 2.9.0.1358). As the FTK Imager<br />

was not <strong>in</strong>tegrated <strong>in</strong> the <strong>RFID</strong>_IR DVD Toolkit, another customized forensic<br />

toolkit (USB Flash Drive F:\, that was loaded with FTK Imager, dcfldd, W<strong>in</strong>MD5<br />

tools) was deployed from the trusted command prompt as shown <strong>in</strong> the follow<strong>in</strong>g<br />

figures (Figure A17.5).<br />

Figure A17.5: FTK Imager <strong>in</strong> action for the acquisition of physical drive<br />

Step 5: Then, the source evidence type was chosen as physical drive after runn<strong>in</strong>g<br />

FTK Imager (Figures A17.6 and A17.7).<br />

Figure A17.6: Selection of the source drive to acquire (part A)<br />

199

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!