Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a comprehensive conference talk on breaking RFID access control systems using open-source hardware. Delve into the vulnerabilities of cards, readers, and backend systems in access control technology. Learn about the Blekey device, which exploits communication protocols in most modern access control systems. Discover how to use Bluetooth LE and a smartphone to bypass access controls, log information, and clone RFID cards. Understand the risks associated with insecure devices and explore potential solutions to mitigate access control attacks. Gain insights into various reader technologies, card types, and system components. Follow along with hardware assembly, demonstrations, and practical applications. Examine safety regulations, potential countermeasures, and future implications for physical security in buildings.
Syllabus
Introduction
Overview
About us
Why this talk
Why Blekey
How Access Control Works
The Reader
The whole system
Different reader technologies
HID Class
HID Class SE
ICLASS RW300
Wiegand Cards
Wiegand Screenshot
Dual Technology Card
HID Card
Moral of the Story
Props
Hardware
Assembly
Mistake
Optive
procs
speedrun
demonstration
recording card data
debug output
Bluetooth
Wiegand
Battery Life
Skimmer
People are surprised
Enable tamper detection
Watch the logs
Closing
Safety Regulations
Other Companies
Door Controller Power
Passback
Brute Force
Soldering
Taught by
Black Hat