Case Study on RFID (proximity cards) hacking

By Sarwar Jahan , Ashwath Kumar on 03 Mar 2017 @ Nullcon
πŸ“Š Presentation πŸ”— Link
rfid redteam
Focus Areas: Hardware Security , Penetration Testing

Abstract

Introduction

Proximity ID cards or contactless ID cards are widely used as:

Security card for door access Transport pass or ticket Hotel Room key Objectives

Clone a given Proximity card and get un-authorized access to restricted area. Modify the card data to bypass business logic or gain extra benefit. Case Studies

Testing has been done on various vendors and results are analyzed. The demonstration will follow responsible disclosure policy.