23.12.2012 Views

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Figure A17.13: Successful creation of physical image<br />

The image was segmented <strong>in</strong>to six image segments and was successfully acquired<br />

<strong>in</strong>to the forensic acquisition drive. The follow<strong>in</strong>g is the <strong>in</strong>formation about physical<br />

image acquisition result, that is extracted from the f<strong>in</strong>al report of physical<br />

acquisition (IDE_Image.E01.txt) produced by FTK.<br />

Image Information:<br />

Acquisition started: Tue Oct 26 04:04:58 2010<br />

Acquisition f<strong>in</strong>ished: Tue Oct 26 04:26:58 2010<br />

Segment list:<br />

E:\PhysicalDriveImage\IDE_Image.E01<br />

E:\PhysicalDriveImage\IDE_Image.E02<br />

E:\PhysicalDriveImage\IDE_Image.E03<br />

E:\PhysicalDriveImage\IDE_Image.E04<br />

E:\PhysicalDriveImage\IDE_Image.E05<br />

E:\PhysicalDriveImage\IDE_Image.E06<br />

Figure A17.14: Snippet of successful creation of physical image report<br />

Step 12: Subsequently, the verification process <strong>in</strong> cryptographic hash functions<br />

such as MD5 Algorithm (128 bits) and Secure Hash Algorithm 1 (SHA1 - 160 bits)<br />

were done by compar<strong>in</strong>g the stored verification hash and computed hash values<br />

dur<strong>in</strong>g acquisition.<br />

203<br />

\

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!