Case Study on RFID (proximity cards) hacking

By Sarwar Jahan , Ashwath Kumar on 03 Mar 2017 @ Nullcon
πŸ“Š Presentation πŸ”— Link
#rfid #red-teaming #hardware-embedded #embedded-systems #incident-management #security-testing #access-management
Focus Areas: πŸ”§ Hardware Security , πŸ” Application Security , βš™οΈ DevSecOps , πŸͺͺ Identity & Access Management , 🚨 Incident Response , 🏭 Industrial Control Systems Security , πŸ“‘ IoT Security , 🎯 Penetration Testing

Abstract

Introduction

Proximity ID cards or contactless ID cards are widely used as:

Security card for door access Transport pass or ticket Hotel Room key Objectives

Clone a given Proximity card and get un-authorized access to restricted area. Modify the card data to bypass business logic or gain extra benefit. Case Studies

Testing has been done on various vendors and results are analyzed. The demonstration will follow responsible disclosure policy.