Overview
Explore the vulnerabilities of RFID-based access control systems in this 43-minute conference talk from BSidesLV. Gain insight into how adversaries can exploit common security flaws through eavesdropping, cloning, and manipulation. Learn from real-life physical penetration test examples that demonstrate the severe practical risks posed by these theoretical vulnerabilities. Understand why outdated and insecure access control systems continue to be installed despite known issues. Discover key considerations for purchasing new access control solutions. By the end of the talk, acquire a comprehensive understanding of the most prevalent vulnerabilities in RFID-based access control systems and their potential consequences.
Syllabus
PasswordsCon, Wed, Aug 7, 20:00 - Wed, Aug 7, CDT
Taught by
BSidesLV