Cracking HiTag2 Crypto - Weaponising Academic Attacks for Breaking and Entering
44CON Information Security Conference via YouTube
Overview
Syllabus
Intro
Why copy 125KHz RFID tags?
Simple 125KHz RFID tag
How simple 125KHz RFID works
Data modulation and encoding
HiTag2 password mode
HiTag2 crypto overview Tag
HiTag2 encryption
Feedback function, LO
HiTag2 commands
Emulate reader START AUTH
Nonce replay attack
Find encrypted 'read po' command
Find one encrypted 'read' command
Find all encrypted 'read' commands
Flip 'page' bit
Read page data
New RFIDler commands
Demo
Tag cloning
Closing remarks
Taught by
44CON Information Security Conference