Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Breaking Access Controls with Blekey

Black Hat via YouTube

Overview

Explore a comprehensive conference talk on breaking RFID access control systems using open-source hardware. Delve into the vulnerabilities of cards, readers, and backend systems in access control technology. Learn about the Blekey device, which exploits communication protocols in most modern access control systems. Discover how to use Bluetooth LE and a smartphone to bypass access controls, log information, and clone RFID cards. Understand the risks associated with insecure devices and explore potential solutions to mitigate access control attacks. Gain insights into various reader technologies, card types, and system components. Follow along with hardware assembly, demonstrations, and practical applications. Examine safety regulations, potential countermeasures, and future implications for physical security in buildings.

Syllabus

Introduction
Overview
About us
Why this talk
Why Blekey
How Access Control Works
The Reader
The whole system
Different reader technologies
HID Class
HID Class SE
ICLASS RW300
Wiegand Cards
Wiegand Screenshot
Dual Technology Card
HID Card
Moral of the Story
Props
Hardware
Assembly
Mistake
Optive
procs
speedrun
demonstration
recording card data
debug output
Bluetooth
Wiegand
Battery Life
Skimmer
People are surprised
Enable tamper detection
Watch the logs
Closing
Safety Regulations
Other Companies
Door Controller Power
Passback
Brute Force
Soldering

Taught by

Black Hat

Reviews

Start your review of Breaking Access Controls with Blekey

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.