Breaking Access Controls with Blekey

Breaking Access Controls with Blekey

Black Hat via YouTube Direct link

Introduction

1 of 41

1 of 41

Introduction

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Breaking Access Controls with Blekey

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 Overview
  3. 3 About us
  4. 4 Why this talk
  5. 5 Why Blekey
  6. 6 How Access Control Works
  7. 7 The Reader
  8. 8 The whole system
  9. 9 Different reader technologies
  10. 10 HID Class
  11. 11 HID Class SE
  12. 12 ICLASS RW300
  13. 13 Wiegand Cards
  14. 14 Wiegand Screenshot
  15. 15 Dual Technology Card
  16. 16 HID Card
  17. 17 Moral of the Story
  18. 18 Props
  19. 19 Hardware
  20. 20 Assembly
  21. 21 Mistake
  22. 22 Optive
  23. 23 procs
  24. 24 speedrun
  25. 25 demonstration
  26. 26 recording card data
  27. 27 debug output
  28. 28 Bluetooth
  29. 29 Wiegand
  30. 30 Battery Life
  31. 31 Skimmer
  32. 32 People are surprised
  33. 33 Enable tamper detection
  34. 34 Watch the logs
  35. 35 Closing
  36. 36 Safety Regulations
  37. 37 Other Companies
  38. 38 Door Controller Power
  39. 39 Passback
  40. 40 Brute Force
  41. 41 Soldering

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.