Recon - PREVIEW
Recon 2011
Speakers | |
---|---|
Milosch Meriac |
Schedule | |
---|---|
Day | Training - 2011-07-07 |
Room | TRAINING ROOM 6 |
Start time | 13:00 |
Duration | 04:00 |
Info | |
ID | 172 |
Event type | Workshop |
Holistic RFID Hacking
Holistic RFID Hacking
Learn how to perform security assessments on RFID systems and how to exploit the discovered weaknesses. Attendees will explore in hands-on sessions the weaknesses of existing LF and HF RFID systems while learning to use RFID hardware tools for reading, copying and emulating RFID cards.
This two day course will teach you a holistic approach to break RFID systems by teaching you to spot the weakest point in the whole system. This includes reader hardware security and reverse-engineering of readers and undocumented air protocols. Attendees will receive a hardware kit for reading and emulating LF and HF RFID cards.
Instructors: Milosch Meriac Dates: 6-7 July 2011 Availability: 15 Seats Topics Covered
RFID Basics:
- The Physics of RFID (LF, HF, UHF) and it's limitations
- Commonly used RFID Protocols and their Weaknesses
- Choosing the right hardware tools for RFID security evaluations
- RFID HF/LF Antenna Design
- Sniffing RFID On Air Protocols
- RFID Tag Emulation
RFID Cryptography gone haywire:
- How good cryptography fails in actual implementations
- How bad cryptography can't be protected by lack of documentation
- Breaking MIFARE Classic
Finding the weakest point in RFID systems:
- Breaking HID Prox & HID iCLASS Standard Security
- RFID Reader Hardware Security
Reverse Engineering RFID Readers and evaluating undocumented RFID systems Class Requirements
It is beneficial if students have a basic understanding of a typical Linux System command line Hardware/software Requirements:
Laptop running Microsoft Windows, Linux, or OS X with at least 1GB of RAM
- VMware Workstation 7.1.4 (or later) installed