Cracking HiTag2 Crypto - Weaponising Academic Attacks for Breaking and Entering

Cracking HiTag2 Crypto - Weaponising Academic Attacks for Breaking and Entering

44CON Information Security Conference via YouTube Direct link

HiTag2 commands

10 of 21

10 of 21

HiTag2 commands

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Cracking HiTag2 Crypto - Weaponising Academic Attacks for Breaking and Entering

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Why copy 125KHz RFID tags?
  3. 3 Simple 125KHz RFID tag
  4. 4 How simple 125KHz RFID works
  5. 5 Data modulation and encoding
  6. 6 HiTag2 password mode
  7. 7 HiTag2 crypto overview Tag
  8. 8 HiTag2 encryption
  9. 9 Feedback function, LO
  10. 10 HiTag2 commands
  11. 11 Emulate reader START AUTH
  12. 12 Nonce replay attack
  13. 13 Find encrypted 'read po' command
  14. 14 Find one encrypted 'read' command
  15. 15 Find all encrypted 'read' commands
  16. 16 Flip 'page' bit
  17. 17 Read page data
  18. 18 New RFIDler commands
  19. 19 Demo
  20. 20 Tag cloning
  21. 21 Closing remarks

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.