Christiaan008
Rank: 29 / 1333
22 selected videos
DEFCON 18: Extreme Range RFID Tracking 1/4
Speaker: Chris Paget
If you think that RFID tags can only be read a few inches away from a reader you haven't met EPC Gen2, the tag that can be found in Enhanced Drivers Licenses - this 900MHz tag is readable from 30 feet with off-the-shelf equipment. Without amplifying the signal from a commercial reader we were able to equal the previous Defcon record of 69 feet, and with less than $1000 of equipment we achieved considerably further than that. This talk covers everything you'll need to...
Related topics : rfid tag read range / rfid reader read range / rfid tag equipment tracking
DEFCON 18: Extreme Range RFID Tracking 2/4
Speaker: Chris Paget
If you think that RFID tags can only be read a few inches away from a reader you haven't met EPC Gen2, the tag that can be found in Enhanced Drivers Licenses - this 900MHz tag is readable from 30 feet with off-the-shelf equipment. Without amplifying the signal from a commercial reader we were able to equal the previous Defcon record of 69 feet, and with less than $1000 of equipment we achieved considerably further than that. This talk covers everything you'll need to...
Related topics : rfid tag read range / rfid reader read range / rfid tag equipment tracking
27c3: Analyzing a modern cryptographic RFID system (en)
Speakers: Henryk Plötz , Milosch Meriac
HID iClass demystified
Popular contactless systems for physical access control still rely on obscurity. As we have shown, time and time again, proprietary encryption systems are weak and easy to break. In a follow-up to last year's presentation we will now demonstrate attacks on systems with 'proper' cryptographic algorithms.
Since we broke the last of the big players on the market at 26C3, most vendors are now migrating to new systems which...
Related topics : security system using rfid / rfid reader access control system
23C3: RFID hacking
Speakers: Karsten Nohl, Henryk Plötz, z0ccor
This talk will elaborate on the security and social aspects of RFID technology. We will talk about our projects of the past year, including the FIFA World Cup tickets.
This talk will be about some of the hacking related things (technological and social) that you can do with RFID technology.
Topics will include: + electronic passports + Mifare cryptography (maybe even some reverse engineering results) + tickets for the FIFA World Cup (ca. 15...
Related topics : rfid technology will
DEFCON 17: RFID MythBusting
Speaker: Chris Paget Founder, H4RDW4RE LLC
This presentation is about challenging many of the popular preconceptions about RFID technology. "Short-range" will be shot down first (I'm aiming to set a half-mile world record in the Nevada desert just before Defcon), "secure" will be busted second (don't bring _any_ RFID tags unless you want them cloned), "immune to electromagnetic pulse weaponry" will fall last (and hopefully most spectacularly). I'll be covering a wide range of different RFID...
Related topics : rfid technology will / 125khz rfid tag range
DEFCON 17: Picking Electronic Locks Using TCP Sequence Prediction
Speaker: Ricky Lawshae Network Technician, Texas State University
As networked building access systems become more and more popular, the security of using RFID, magstripe, and biometrics as authentication mediums is constantly under scrutiny. But what about the security of the access system itself? Is it possible to unlock a door by sending a spoofed command to it over the network, bypassing the need for an authentication medium entirely? (SPOILER ALERT: Yeah, it is.)
For more information...
Related topics : security system using rfid
24C3: EU Policy on RFID & Privacy
Speaker: Andreas Krisch
Developments 2007, Outlook 2008
Following the public consultation on Radio Frequency Identification (RFID) carried out in 2006 the European Commission set up an RFID Expert Group in July 2007, focussing on Privacy and Security. One of the groups tasks is to provide advice to the Commission on the content of a Recommendation to the member states, which shall set out the principles that public authorities and other stakeholders should apply in respect of RFID usage....
Related topics : radio frequency identification (rfid) / rfid security and privacy
HAR 2009: Realizing the RFID Guardian 2/4
Clip 2
Speaker: Serge Keyser
The RFID Guardian Project is an initiative to put practical open-source HW/SW tools for RFID Security and Privacy into the hands of security consultants and the general public alike. This talk will discuss Radio Frequency Identification, its security and privacy implications, and will provide the newest information about Version 4 of the RFID Guardian, which we intend to launch soon to the general public.
For more information go to:...
Related topics : rfid security and privacy
HAR 2009: Realizing the RFID Guardian 3/4
Clip 3
Speaker: Serge Keyser
The RFID Guardian Project is an initiative to put practical open-source HW/SW tools for RFID Security and Privacy into the hands of security consultants and the general public alike. This talk will discuss Radio Frequency Identification, its security and privacy implications, and will provide the newest information about Version 4 of the RFID Guardian, which we intend to launch soon to the general public.
For more information go to:...
Related topics : rfid security and privacy
HAR 2009: Realizing the RFID Guardian 4/4
Clip 4
Speaker: Serge Keyser
The RFID Guardian Project is an initiative to put practical open-source HW/SW tools for RFID Security and Privacy into the hands of security consultants and the general public alike. This talk will discuss Radio Frequency Identification, its security and privacy implications, and will provide the newest information about Version 4 of the RFID Guardian, which we intend to launch soon to the general public.
For more information go to:...
Related topics : rfid security and privacy