Abstract
Introduction
Proximity ID cards or contactless ID cards are widely used as:
Security card for door access Transport pass or ticket Hotel Room key Objectives
Clone a given Proximity card and get un-authorized access to restricted area. Modify the card data to bypass business logic or gain extra benefit. Case Studies
Testing has been done on various vendors and results are analyzed. The demonstration will follow responsible disclosure policy.