Recon - PREVIEW

Recon 2011

Speakers
Milosch Meriac
Schedule
Day Training - 2011-07-07
Room TRAINING ROOM 6
Start time 09:00
Duration 03:00
Info
ID 171
Event type Workshop

Holistic RFID Hacking

Holistic RFID Hacking

Learn how to perform security assessments on RFID systems and how to exploit the discovered weaknesses. Attendees will explore in hands-on sessions the weaknesses of existing LF and HF RFID systems while learning to use RFID hardware tools for reading, copying and emulating RFID cards.

This two day course will teach you a holistic approach to break RFID systems by teaching you to spot the weakest point in the whole system. This includes reader hardware security and reverse-engineering of readers and undocumented air protocols. Attendees will receive a hardware kit for reading and emulating LF and HF RFID cards.

Instructors: Milosch Meriac Dates: 6-7 July 2011 Availability: 15 Seats Topics Covered

RFID Basics:

  • The Physics of RFID (LF, HF, UHF) and it's limitations
  • Commonly used RFID Protocols and their Weaknesses
  • Choosing the right hardware tools for RFID security evaluations
  • RFID HF/LF Antenna Design
  • Sniffing RFID On Air Protocols
  • RFID Tag Emulation

RFID Cryptography gone haywire:

  • How good cryptography fails in actual implementations
  • How bad cryptography can't be protected by lack of documentation
  • Breaking MIFARE Classic

Finding the weakest point in RFID systems:

  • Breaking HID Prox & HID iCLASS Standard Security
  • RFID Reader Hardware Security
  • Reverse Engineering RFID Readers and evaluating undocumented RFID systems Class Requirements

  • It is beneficial if students have a basic understanding of a typical Linux System command line Hardware/software Requirements:

  • Laptop running Microsoft Windows, Linux, or OS X with at least 1GB of RAM

  • VMware Workstation 7.1.4 (or later) installed