Attacking NFC Mobile Phones
|
|
|
- Miles Phillips
- 9 years ago
- Views:
Transcription
1 Attacking NFC Mobile Phones Collin Mulliner Fraunhofer SIT EUSecWest May 2008 London, UK CollinMullinerAttackingNFCMobilePhonesEUSecWest2008
2 Attacking NFC Mobile Phones A first look at NFC Phone Security Some Tools, PoCs, and a Small Survey CollinMullinerAttackingNFCMobilePhonesEUSecWest2008
3 About me Collin Mulliner I'm a mobile devices (security) guy Just became a full time researcher at FraunhoferInstitute for Secure Information Technology SIT (Division for Secure Mobile Systems) Member of the trifinite group (loose group of people interested in mobile and wireless security) Contact: My NFC site: collin.mulliner[at]sit.fraunhofer.de CollinMullinerAttackingNFCMobilePhonesEUSecWest2008
4 Why Attack NFC Phones? Because NFC is... a new hot technology heavily pushed by service providers a phone thing... mobiles are my favorite target RFID, which itself is currently hyped is will be in every mobile phone in the future (so the manufactures and service providers wish) being deployed right now CollinMullinerAttackingNFCMobilePhonesEUSecWest2008
5 Agenda Introduction to NFC NFC phones and data formats An NFC Security Toolkit Analyzing an NFC Mobile Phone Attacking NFC services in the field - a survey Notes from the lab Conclusions CollinMullinerAttackingNFCMobilePhonesEUSecWest2008
6 Near Field Communication (NFC) A bidirectional proximity coupling technology Based on the ISO14443 standard NFC device modes Reader/Writer (Proximity Coupling Device, PCD) Card Emulation (Proximity Inductive Coupling Card, PICC) Peer-to-Peer mode (ISO18092) Bidirectional communication between two NFC devices RFID in your mobile phone CollinMullinerAttackingNFCMobilePhonesEUSecWest2008
7 Near Field Communication (NFC) A bidirectional proximity coupling technology Based on the ISO14443 standard NFC device modes Reader/Writer (Proximity Coupling Device, PCD) Card Emulation (Proximity Inductive Coupling Card, PICC) Peer-to-Peer mode (ISO18092) Bidirectional communication between two NFC devices RFID in your mobile phone CollinMullinerAttackingNFCMobilePhonesEUSecWest2008
8 NFC Tech Operating frequency: Mhz Communication range: ~4 cm Data transfer rates: 106, 216 or 424 kbit/s Supported tags and cards: ISO14443 A/B based tags, NXP Mifare Ultralight, Mifare Classic/Standard 1k/4k, Mifare DESFire, Sony FeliCa, Innovision Topaz and Jewel tag,... CollinMullinerAttackingNFCMobilePhonesEUSecWest2008
9 General NFC Security No link level security (wireless not encrypted) Eavesdropping (sniffing) Man-in-the-middle Data Modification, Corruption, Insertion [9] Tamper with NFC service tags Modify original tag Replace with malicious tag Sounds easier than it is, more on this later... CollinMullinerAttackingNFCMobilePhonesEUSecWest2008
10 NFC Usage Concept Touch tag with your mobile phone Phone reads tag performs action CollinMullinerAttackingNFCMobilePhonesEUSecWest2008
11 Touch a Tag Launch a web browser and load website Initiate voice call Send predefined short message (SMS) Store contact in address book (vcard) Store calendar entry (vcal) Launch custom application CollinMullinerAttackingNFCMobilePhonesEUSecWest2008
12 NFC Data Exchange Format (NDEF) Container format to store data in NFC tags Supports storing arbitrary data Independent from RFID tag type Defines a number of NFC specific data types Standardized by the NFC Forum [2] URI, TextRecord, and SmartPoster Specs available for free CollinMullinerAttackingNFCMobilePhonesEUSecWest2008
13 NFC Data Exchange Format (NDEF) Container format to store data in NFC tags Supports storing arbitrary data Independent from RFID tag type Defines a number of NFC specific data types Standardized by the NFC Forum [2] URI, TextRecord, and SmartPoster Specs available for free The thing you need to know when playing with passive NFC tags! CollinMullinerAttackingNFCMobilePhonesEUSecWest2008
14 NDEF Record, Message, Types The record is the smallest entity in NDEF Each record carries a type Multiple records form an NDEF Message Most Important NDEF Types URI Record (Uniform Resource Identifier) Text Record HTTP, FTP, SMS, TEL,... String of characters, encoding and a language identifier CollinMullinerAttackingNFCMobilePhonesEUSecWest2008
15 NDEF Record, Message, Types The record is the smallest entity in NDEF Each record carries a type Multiple records form a NDEF Message Most Important NDEF Types URI Record (Uniform Resource Identifier) HTTP, FTP, SMS, TEL,... The URI is the control channel, everything else is just decoration! Text Record String of characters, encoding and a language identifier CollinMullinerAttackingNFCMobilePhonesEUSecWest2008
16 The SmartPoster URI with a title (descriptive text) Optional icon Defines additional sub types Recommended action (what to do with the URI) Execute now, save for later, open for editing Size and type of object URI points to One of the proclaimed key use cases for NFC CollinMullinerAttackingNFCMobilePhonesEUSecWest2008
17 NFC Mobile Phones The Nokia 6131 NFC [3], the only NFC phone you can currently buy CollinMullinerAttackingNFCMobilePhonesEUSecWest2008
18 Nokia 6131 NFC Quick Spec. GSM mobile phone with Bluetooth, GPRS, microsd, camera, J2ME/MIDP2.0 and of course NFC Interesting JSRs: 87 (Bluetooth), 257 (NFC) NFC support for: SmartPoster, URI, Tel, SMS, vcal, vcard Some Nokia extensions ISO14443 A, NXP Mifare, Sony FeliCa (non secure parts only), Topaz and Jewel tag (read only) CollinMullinerAttackingNFCMobilePhonesEUSecWest2008
19 Inside an NFC Phone Reader always active unless phone in standby If no app. is running phone tries to handle content Else app. gets to talk to the tag App. can register to handle tag data by type Phone reads tag, determines if/what app. to launch This push registry is a basic feature of NFC phones Certain types can't be registered (e.g. SmartPoster) CollinMullinerAttackingNFCMobilePhonesEUSecWest2008
20 Attacking NFC Mobile Phones Mobile Phones NOT Smart Phones Attacks are mainly based on social engineering No native software, WiFi, limited UI and storage Bugs can be abused for supporting these attacks CollinMullinerAttackingNFCMobilePhonesEUSecWest2008
21 Attack Targets The Mobile Phone System bugs Application bugs and design issues The Services/Applications Tags and back-end infrastructure Mostly designed to protect service provider not customer CollinMullinerAttackingNFCMobilePhonesEUSecWest2008
22 The Mifare Classic Tag Very common Mhz RFID tag type Two tag types Mifare 1k 720 bytes payload Mifare 4k 3408 bytes payload Per sector configurable R/W mode Used by all NFC services I've seen so far Two 48bit keys control read and write access CollinMullinerAttackingNFCMobilePhonesEUSecWest2008
23 An NFC Security Toolkit Tag reader/writer NDEF parsing and construction library Analyze tag data collected in the field Test NFC mobile phones (fuzzing) Tag security tester Stationary and mobile (for field analysis) Check read/write mode of tags in the field CollinMullinerAttackingNFCMobilePhonesEUSecWest2008
24 Tag Reading/Writing/Dumping Librfid-based tool for USB RFID reader/writer Read, write, dump, format (NDEF), and wipe tags mifare_ndef.c MIDP2.0/JSR-257 and Nokia extensions-based Bluetooth interface for control by PDA/laptop Raw dump of Mifare Classic tags BtNfcAdapter and BtNfcAdapterRAW(.jar) All tools available in source under GPLv2 [1] CollinMullinerAttackingNFCMobilePhonesEUSecWest2008
25 Python NDEF Library Construct and parse NDEF Records and Messages High-level NDEF Records: Text, URI High-level Messages: SmartPoster Nokia Bluetooth Imaging Tag (non standard) RMV ConTag (application specific) Fuzzing ready ;-) Set field length independent from field content CollinMullinerAttackingNFCMobilePhonesEUSecWest2008
26 Python NDEF Library cont. All functions accept an NDEF Message or NDEF Record in binary or hex as input Both binary and hex are supported as output Output easily writable with any RFID writer No library dependencies Works really great on my Linux tablet Available in source under GPLv2 [1] CollinMullinerAttackingNFCMobilePhonesEUSecWest2008
27 Mifare Sector Trailer Tool Field tool to analyze R/W state of Mifare tags Inspect individual sector trailer Write individual or all sector trailer(s) Brute force and word list crack sector key Check for weak keys; speed ~10keys/s (Proof-of-concept, very unlikely to break anything real!) Available in source under GPLv2 [1] Set R/W mode and keys MfStt(.jar) CollinMullinerAttackingNFCMobilePhonesEUSecWest2008
28 NFC Phone Analysis What parts of the standard are un-/supported SmartPoster action 'act' is ignored :-( Implementation issues? (next slides) What about the components that are controllable by NFC? Web browser just fetches anything pointed to by URL CollinMullinerAttackingNFCMobilePhonesEUSecWest2008
29 Nokia 6131 NFC URI Spoofing Abuse SmartPoster to hide real URI GUI mixes informational text and control data Trick user into performing harmful operation Vulnerable components Web browser (http, https, ftp,...) Phone dialer (initiate phone call) Short Messaging (send SMS) CollinMullinerAttackingNFCMobilePhonesEUSecWest2008
30 SmartPoster URL Spoofing Fake innocent locking URL stored in SmartPoster title Actual URL is stored in URI record User can't easily determine the real URL he is going to load after reading an NDEF tag Title needs padding in order to hide real URI Pad with either space or \r End with a. (dot) in order to show the padding CollinMullinerAttackingNFCMobilePhonesEUSecWest2008
31 Web Browser Example URI is Title is: Survives brief inspection by user. CollinMullinerAttackingNFCMobilePhonesEUSecWest2008
32 Man-in-the-middle Proxy Based on CGIProxy2.1 by James Marshall Added WML handling and traffic logging Steal credentials (phishing...) Inject malicious content Works because: Current URL is not displayed by web browser Example: Title: URI: CollinMullinerAttackingNFCMobilePhonesEUSecWest2008
33 Phone Call Request Example URI is tel: Title is: Tourist Information\r \r\r\r\r\r\r\r\r. Survives brief inspection by user. CollinMullinerAttackingNFCMobilePhonesEUSecWest2008
34 SMS Example URI sms:33333?body=tone1 Title is:"get todays weather forecast\r " CollinMullinerAttackingNFCMobilePhonesEUSecWest2008
35 Attack from the Spec? Page 6: Smart Poster Record Type Definition (SPR 1.1) SmartPoster_RTD_1.0_ CollinMullinerAttackingNFCMobilePhonesEUSecWest2008
36 More on URL Spoofing Use method Produces broken HTTP request but will work with a small redirector (HTTP new location) Certain characters are not allowed in part See badproxy.py example [1] Web browser display issue with long hostname Partial hostname user more easily fooled into loading malicious website CollinMullinerAttackingNFCMobilePhonesEUSecWest2008
37 More on URL Spoofing cont. CollinMullinerAttackingNFCMobilePhonesEUSecWest2008
38 Partial Hostnames CollinMullinerAttackingNFCMobilePhonesEUSecWest2008
39 Vendor Contacted Issues reported to Nokia in late March 2008 Constant contact to Nokia since then Added some more issues over time Nokia seems to take issues seriously! Very fast response Apparently they started fixing the bugs right away CollinMullinerAttackingNFCMobilePhonesEUSecWest2008
40 Proof-of-Concept NDEF Worm Idea I had while playing with the push registry Push registry allows registration for URI Record 'U' Basic idea: writable tags as transport for Worm Use URI spoofing to hide the worm-install-url Silent MIDlet installation No security warning when downloading a JAR file! Auto install user will only be asked before execution! Spreads by writing URL pointing to itself to tag Worm is activated by phone reading plain URI tag CollinMullinerAttackingNFCMobilePhonesEUSecWest2008
41 NDEF Worm: Infect Phone Step 1) Touch infected tag Step 2) Run app. after download and auto install Download sets cookie. If cookie is: set only redirect to original address. CollinMullinerAttackingNFCMobilePhonesEUSecWest2008
42 NDEF Worm: Infect Tag Step 1) Touch URI tag (no SmartPoster)... worm launches Step 2) Tag infected, open original URL stored on tag CollinMullinerAttackingNFCMobilePhonesEUSecWest2008
43 NDEF Worm: Server Side Original tag, URI Record only URL: Infected tag, SmartPoster Title: URL: Server answer either: Worm-JAR + cookie OR Redirect to original URL from parameter CollinMullinerAttackingNFCMobilePhonesEUSecWest2008
44 NDEF Fuzzing Quick sweep, just wanted to try it Setup My NDEF library and NDEF writer tool RFID reader/writer (I used a USB CardMan 5321) Mifare 1k/4k tags Target: Nokia 6131 NFC V05.12, , RM-216 CollinMullinerAttackingNFCMobilePhonesEUSecWest2008
45 Fuzzing Results NDEF Record Payload length field (0xFFFFFFFF) crashes phone NDEF URI 'U' (well known type = 0x01) Tel: <exactly 124 numbers> crashes phone Shorter no. is accepted, longer no. produces an error Best guess: off-by-one Same result with SMS: Same phone application handles both URIs? CollinMullinerAttackingNFCMobilePhonesEUSecWest2008
46 Fuzzing Results cont. Fuzzing using tags is hard work Phone switches off after 4 crashes in a row No known code injection technique This will be interesting for other phone OSes Some kind of self-protection? Symbian Series 40 not very interesting Tag: on writer, to phone and back (no automation) Code injection via RFID/NFC anyone? CollinMullinerAttackingNFCMobilePhonesEUSecWest2008
47 NFC Services Small survey to find vulnerable services Most services use default phone features User doesn't need to install an extra application All services use Mifare Classic 1k for their tags Conducted survey with just the NFC phone Places: Vienna Austria and Frankfurt/M. Germany Data analysis on desktop of course CollinMullinerAttackingNFCMobilePhonesEUSecWest2008
48 Wiener Linien NFC Ticketing for inner city Vienna Austria SMS-based (request and receive ticket via SMS) CollinMullinerAttackingNFCMobilePhonesEUSecWest2008
49 Wiener Linien cont. Tags are read-only Tag attack (sticky tag, discussed later) Use Nokia 6131 spoofing attack to replace actual phone number with bad (premium rate) number User will trust tag because it worked before Including unused sectors Maybe spoofing is not even required CollinMullinerAttackingNFCMobilePhonesEUSecWest2008
50 Wiener Linien cont. Tags are read-only Tag attack (sticky tag, discussed later) Use Nokia 6131 spoofing attack to replace actual phone number with bad (premium rate) number Got a 3 Euro ring tone instead of your metro ticket? User will trust tag because it worked before Including unused sectors Maybe spoofing is not even required CollinMullinerAttackingNFCMobilePhonesEUSecWest2008
51 Selecta Vending Machine Mobile phone payment via SMS (Vienna) Payment via phone bill (SMS ties customer to machine and transaction) CollinMullinerAttackingNFCMobilePhonesEUSecWest2008
52 Selecta Vending Machine cont. Tags are read-only (including unused sectors) Malicious tag attack, but... Can be abused to cash out anonymously Make tags pointing to vending machine A and stick them on machine B, C, D,... Wait at machine A and pull out your free snack (I haven't actually tried this, I swear!) CollinMullinerAttackingNFCMobilePhonesEUSecWest2008
53 Vienna ÖBB Handy-Ticket Train e-ticketing system CollinMullinerAttackingNFCMobilePhonesEUSecWest2008
54 Vienna ÖBB Handy-Ticket cont. Tags are read-only (including unused sectors) Tag points to website: Malicious tag attack (man-in-the-middle via proxy) Steal user credentials User tracking (station is encoded into URL) Inject trojan JAR (auto install bug in Nokia 6131 NFC) System seems to be inactive at the moment Never activated or maybe tied to specific carrier (A1)? CollinMullinerAttackingNFCMobilePhonesEUSecWest2008
55 RMV Handy Ticket (ConTags) Is the e-ticketing system of the Frankfurt area public transport system Requires application install NFC is a non essential part of the system It just selects the train station for you Looks boring but has some interesting parts... CollinMullinerAttackingNFCMobilePhonesEUSecWest2008
56 RMV ConTags Contain two NDEF Records RMV custom record, contains: TNF: 0x04 (urn:nfc:ext:) Type: rmv.de:hst Numeric Station ID Station Name Public key signature of custom and URI Record URI Record pointing to time table for that station Only URI is seen by the phone if Handy-Ticket app. is not installed CollinMullinerAttackingNFCMobilePhonesEUSecWest2008
57 RMV Custom Record Record size is variable Bytes 0,1,7 are fixed to 0x01,0x05,0x02 Bytes[2,3,4] numeric Station ID ID = B[2] * 0x B[3] * 8 + B[4] Bytes[5,6] some number (unknown) Byte[8] is station name length, name follows Byte [8 + station name length] is fixed to 0x03 Next byte is length of pub-key signature, sig. follows CollinMullinerAttackingNFCMobilePhonesEUSecWest2008
58 RMV ConTag Example Tag is from: Frankfurt/Main Konstablerwache Custom Record (154 bytes payload) Station ID: Name: Konstablerwache URI Record (43 bytes payload) Total Size: 214 bytes CollinMullinerAttackingNFCMobilePhonesEUSecWest2008
59 Closer look at the ConTag Tags are not truly read-only Read: KeyA (default NDEF key) Write: KeyB (secret) Attack break secret B key and overwrite tag Tag data area is not locked Unused sectors are left in manufacturer mode Attack change key (no updates possible: denialof-service) CollinMullinerAttackingNFCMobilePhonesEUSecWest2008
60 Tag Attacks Stick a bad tag on top of good tag Use tinfoil for shielding off original tag Use RFID-Zapper [8] to fry original tag Sticky paper tag is ~1,20 (in low quantities) [7] Replace original good tag with bad tag Hijack tag of service provider Break write key and overwrite with malicious data Ultimate user trust! CollinMullinerAttackingNFCMobilePhonesEUSecWest2008
61 Attack Tags Use tinfoil to shield off original tag. CollinMullinerAttackingNFCMobilePhonesEUSecWest2008
62 Signed Tags [11] suggests signing URLs stored on tag in order to prevent attacks Special PKI for NFC? RMV ConTag makes use of signed data but neglects possibility of replay Tag data can be copied and written to other tag, signature still valid In this specific case not a real problem CollinMullinerAttackingNFCMobilePhonesEUSecWest2008
63 Prevent Easy Cloning of Tags Signing only the data still allows cloning a tag Possible better solution Include the tag type and tag UID in the signature calculation tags cannot be cloned easily Possibly only until there is a cheap Mhz tag that can emulate tag types and allows changing the UID JSR-257 NDEF push doesn't contain UID for now CollinMullinerAttackingNFCMobilePhonesEUSecWest2008
64 Notes from the Lab No UID spoofing with the Nokia 6131 NFC Can't set UID in Card Emulation mode I know you all wished this was possible! Tags are not formatted by the phone when storing a new NDEF message Only uses space needed by new message Parts of old data are easily readable Wipe tags before passing them to strangers CollinMullinerAttackingNFCMobilePhonesEUSecWest2008
65 Nokia Bluetooth Imaging Tag Send selected picture to Bluetooth device Activates Bluetooth if disabled Cheap Man-in-the-middle attack Destination MAC address stored in tag Change MAC address on USB Bluetooth adapter Modify or replace tag to point to attacker Receive image and forward to actual destination Just don't use in public place! CollinMullinerAttackingNFCMobilePhonesEUSecWest2008
66 NFC Phones for the RFID Guys JSR-257 and Nokia extensions allow relative low level access to various tag types See my tools: BtNfcAdpaterRAW or MfStt Phone or Phone + PDA is much more portable than your USB/serial RFID reader and laptop Easy field research without looking too suspicious CollinMullinerAttackingNFCMobilePhonesEUSecWest2008
67 Conclusions Found some bugs in common NFC phone NFC phones can be attacked in multiple ways Bugs are trivial but can be exploited since current services are trivial too Phishing, malware, worms, denial-of-service,... Passive tags are primary vector for attacks Maybe make tags tamper proof? Use NFC point-to-point mode (active components on both sides; but these are more expensive) CollinMullinerAttackingNFCMobilePhonesEUSecWest2008
68 Conclusions cont. Provided basis for further research Published tag data samples from survey Tools released with source code Users of early NFC services need to watch out! Basically need to check content of tag every time CollinMullinerAttackingNFCMobilePhonesEUSecWest2008
69 Future Work Analyze other NFC mobile phones Card emulation and secure element Haven't touched this yet Explore new services... Feel free to contact me about this! Any tips are welcome! CollinMullinerAttackingNFCMobilePhonesEUSecWest2008
70 Q&A Thank you for your time. Any Questions? CollinMullinerAttackingNFCMobilePhonesEUSecWest2008
71 References [1] (NFC Security Tools) [2] (NFC-Forum) [3] (Nokia 6131 NFC) [4] [5] (Nokia NFC SDK) [6] (Sniffing RFID) [7] (RFID Tag Shop) [8] (RFID-Zapper) [9] [10] [11] [12] (Copying RFID Credit Cards ChAP.py) [13] (Mifare CRYPTO1 broken) [14] (NFC in Austria) CollinMullinerAttackingNFCMobilePhonesEUSecWest2008
Vulnerability Analysis and Attacks on NFC enabled Mobile Phones
Vulnerability Analysis and Attacks on NFC enabled Mobile Phones Collin Mulliner Fraunhofer SIT (Darmstadt, Germany) 1st International Workshop on Sensor Security March 2009 Fukuoka, Japan 1 Near Field
AN1305. MIFARE Classic as NFC Type MIFARE Classic Tag. Application note COMPANY PUBLIC. Rev. 1.3 2 October 2012 130513. Document information
MIFARE Classic as NFC Type MIFARE Classic Tag Document information Info Content Keywords NFC Forum, NFC data mapping, MIFARE Classic 1K/4K, MIFARE Classic 1K, MIFARE Classic 4K, MIFARE Plus X/S, NFC Type
Security and Privacy Issues of Wireless Technologies
Security and Privacy Issues of Wireless Technologies Collin Mulliner http://www.cs.ucsb.edu/~mulliner/ Agenda Introduction Issues Technology specific issues Wi Fi Bluetooth RFID
Using RFID Techniques for a Universal Identification Device
Using RFID Techniques for a Universal Identification Device Roman Zharinov, Ulia Trifonova, Alexey Gorin Saint-Petersburg State University of Aerospace Instrumentation Saint-Petersburg, Russia {roman,
AN1304. NFC Type MIFARE Classic Tag Operation. Application note PUBLIC. Rev. 1.3 2 October 2012 130413. Document information
NFC Type MIFARE Classic Tag Operation Document information Info Content Keywords NDEF, NDEF data mapping, NDEF Data Exchange Format MIFARE Classic 1K, MIFARE Classic 4K, MIFARE Classic 1K/4K, MIFARE Plus
NFC TagWriter by NXP
Rev. 1.6 27 April 2016 User manual Document information Info Content Keywords User manual Abstract This document describes the features of the TagWriter and steps to setup TagWriter application in smart
ArcGIS Server Security Threats & Best Practices 2014. David Cordes Michael Young
ArcGIS Server Security Threats & Best Practices 2014 David Cordes Michael Young Agenda Introduction Threats Best practice - ArcGIS Server settings - Infrastructure settings - Processes Summary Introduction
Desktop and Laptop Security Policy
Desktop and Laptop Security Policy Appendix A Examples of Desktop and Laptop standards and guidelines 1. Implement anti-virus software An anti-virus program is necessary to protect your computer from malicious
APPFORUM2014. Helping the developer community build next-generation, multi-platform apps. SCHAUMBURG, ILLINOIS SEPTEMBER 8-10
APPFORUM2014 Helping the developer community build next-generation, multi-platform apps. SCHAUMBURG, ILLINOIS SEPTEMBER 8-10 NFC OVERVIEW Chuck Bolen Chief Architect Enterprise Mobile Computing APPFORUM2014
NFC. Technical Overview. Release r05
Release r05 Trademarks The Bluetooth word mark and logos are owned by the Bluetooth SIG, Inc. and any use of such marks by Stollmann E+V GmbH is under license. Other trademarks and trade names are those
Security Evaluation CLX.Sentinel
Security Evaluation CLX.Sentinel October 15th, 2009 Walter Sprenger [email protected] Compass Security AG Glärnischstrasse 7 Postfach 1628 CH-8640 Rapperswil Tel.+41 55-214 41 60 Fax+41 55-214 41
Topics in Network Security
Topics in Network Security Jem Berkes MASc. ECE, University of Waterloo B.Sc. ECE, University of Manitoba www.berkes.ca February, 2009 Ver. 2 In this presentation Wi-Fi security (802.11) Protecting insecure
Hacking Mifare Classic Cards. Márcio Almeida ([email protected])
Hacking Mifare Classic Cards Márcio Almeida ([email protected]) !! DISCLAIMERS!! Disclaimer 1: The content of this presentation results from independent research conducted by me on my own time and of
SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.
system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. From a high-level standpoint, attacks on computer systems and networks can be grouped
Attacking the Traveling Salesman Point-of-sale attacks on airline travelers DEFCON 2014
Attacking the Traveling Salesman Point-of-sale attacks on airline travelers DEFCON 2014 Alex Zacharis Nikos Tsagkarakis [email protected] Census S.A. http://census-labs.com/ Contents Why target travelers?
Security in Near Field Communication (NFC)
Security in Near Field Communication (NFC) Strengths and Weaknesses Ernst Haselsteiner and Klemens Breitfuß Philips Semiconductors Mikronweg 1, 8101 Gratkorn, Austria [email protected] [email protected]
OTP circumventing in MIFARE ULTRALIGHT: Who says free rides?
OTP circumventing in MIFARE ULTRALIGHT: Who says free rides? bughardy [email protected] Eagle1753 [email protected] Introduction RFID technologies are becoming more and more prevalent in
NFC Near Field Communication
NFC Near Field Communication Gregor Hohpe 2010 Google, Inc. All rights reserved, Core Technology Passive card powered by radio field 212kbps, 100ms read/write cycle Authentication, data integrity protection
Emerging Security Technological Threats
Emerging Security Technological Threats Jamie Gillespie Training and Education Team Leader, AusCERT About AusCERT Australia s national CERT Collect, monitor, advise on threats and vulnerabilities Incident
Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines
Secure and Safe Computing Primer Examples of Desktop and Laptop standards and guidelines 1. Implement anti-virus software An anti-virus program is necessary to protect your computer from malicious programs,
End User Devices Security Guidance: Apple ios 8
GOV.UK Guidance End User Devices Security Guidance: Apple ios 8 Published Contents 1. Changes since previous guidance 2. Usage scenario 3. Summary of platform security 4. How the platform can best satisfy
ESET Endpoint Security 6 ESET Endpoint Antivirus 6 for Windows
ESET Endpoint Security 6 ESET Endpoint Antivirus 6 for Windows Products Details ESET Endpoint Security 6 protects company devices against most current threats. It proactively looks for suspicious activity
Frequently Asked Questions
Frequently Asked Questions NFC for Consumers What is NFC? Near Field Communication (NFC) is a short-range wireless connectivity technology standard designed for intuitive, simple, and safe communication
Connecting your Aiki phone to a network
Connecting your Aiki phone to a network Connect to mobile networks Depending on your carrier and service plan, your phone may connect automatically to your carrier s fastest available data network. Or
Your Digital Dollars Online & Mobile Banking
Your Digital Dollars Online & Mobile Banking There are a lot of benefits to being able to bank or make payments from just about anywhere, but it s important to know how to do these things safely. Understanding
The following information was provided by SANS and discusses IT Security Awareness. It was last updated in 2015.
The following information was provided by SANS and discusses IT Security Awareness. It was last updated in 2015. By completing this module and the quiz, you will receive credit for CW 170, which is required
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda 1. Introductions for new members (5 minutes) 2. Name of group 3. Current
Using a Malicious Proxy to Pilfer Data & Wreak Havoc. Edward J. Zaborowski [email protected]
Using a Malicious Proxy to Pilfer Data & Wreak Havoc Edward J. Zaborowski [email protected] Abstract...3 Malicious Web Proxy...3 Becoming the Proxy...3 ARP Spoofing...3 Static Configuration...3 Web Proxy
SCRIPT: Security Training
SCRIPT: Security Training Slide Name Introduction Overview 1 Overview 2 Overview 3 Text Welcome to the MN WIC Program Security Training Module for all MN WIC Program staff provided by the MN Department
NFC: Enabler for Innovative Mobility and Payment NFC: MOBILIDADE E MEIOS DE PAGAMENTO
NFC: Enabler for Innovative Mobility and Payment Cards Brazil Sao Paulo, April 3rd to 5th 2007 Rodolfo Gomes - 1st Level Customer Application Support NFC&RFID Europe A new Company has reborn Few months
Karsten Nohl University of Virginia. Henryk Plötz HU Berlin
Karsten Nohl University of Virginia Henryk Plötz HU Berlin Radio Frequency IDentification Tiny computer chips Passively Powered Karsten Nohl, Henryk Plötz - RFID Security 2 Constant monitoring is already
NFC Tags & Solutions. Understanding Near Field Communication (NFC) Technology. Executive Summary
NFC Tags & Solutions Understanding Near Field Communication (NFC) Technology Executive Summary Payment systems and marketing loyalty programs are just the beginning for NFC technology. In addition to the
This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.
The hidden risks of mobile applications This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit. To learn more about TraceSecurity visit www.tracesecurity.com
Know the Risks. Protect Yourself. Protect Your Business.
Protect while you connect. Know the Risks. Protect Yourself. Protect Your Business. GETCYBERSAFE TIPS FOR S MALL AND MEDIUM BUSINESSES If you re like most small or medium businesses in Canada, the Internet
NFC Test Challenges for Mobile Device Developers Presented by: Miguel Angel Guijarro [email protected]
NFC Test Challenges for Mobile Device Developers Presented by: Miguel Angel Guijarro [email protected] 1 Outlook About NFC Developing a NFC Device Test Challenges Test Solutions Q&A 2 What
Frequently Asked Questions: Cisco Jabber 9.x for Android
Frequently Asked Questions Frequently Asked Questions: Cisco Jabber 9.x for Android Frequently Asked Questions (FAQs) 2 Setup 2 Basics 4 Connectivity 8 Calls 9 Contacts and Directory Search 14 Voicemail
VIDEO Intypedia013en LESSON 13: DNS SECURITY. AUTHOR: Javier Osuna García-Malo de Molina. GMV Head of Security and Process Consulting Division
VIDEO Intypedia013en LESSON 13: DNS SECURITY AUTHOR: Javier Osuna García-Malo de Molina GMV Head of Security and Process Consulting Division Welcome to Intypedia. In this lesson we will study the DNS domain
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
Salesforce Classic Guide for iphone
Salesforce Classic Guide for iphone Version 37.0, Summer 16 @salesforcedocs Last updated: July 12, 2016 Copyright 2000 2016 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark
Basic Security Considerations for Email and Web Browsing
Basic Security Considerations for Email and Web Browsing There has been a significant increase in spear phishing and other such social engineering attacks via email in the last quarter of 2015, with notable
PaperCut Payment Gateway Module - RBS WorldPay Quick Start Guide
PaperCut Payment Gateway Module - RBS WorldPay Quick Start Guide This guide is designed to supplement the Payment Gateway Module documentation and provides a guide to installing, setting up and testing
Mobile NFC 101. Presenter: Nick von Dadelszen Date: 31st August 2012 Company: Lateral Security (IT) Services Limited
Mobile NFC 101 Presenter: Nick von Dadelszen Date: 31st August 2012 Company: Lateral Security (IT) Services Limited Company Lateral Security (IT) Services Limited Company Overview Founded in April 2008
Learn to protect yourself from Identity Theft. First National Bank can help.
Learn to protect yourself from Identity Theft. First National Bank can help. Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone
What is our purpose?
Who we are? Since 1995 we have become one of the largest suppliers of electronic automotive accessories and telemetry devices in the Baltic States. Baltic Car Equipment is investing extensively into R&D
Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
E21 Mobile Users Guide
E21 Mobile Users Guide E21 Mobile is the Mobile CRM companion to TGI s Enterprise 21 ERP software. Designed with the mobile sales force in mind, E21 Mobile provides real-time access to numerous functions
Penetration Test JSPLC. Contact: James, APS (CCNA, CEH) contactep105t@secure- mail.biz
Contact: James, APS (CCNA, CEH) contactep105t@secure- mail.biz Ok, so this isn t the typical way that a pen test report would start, but we might as well get straight in to it. I am a customer of Sainsbury
Abracon PTM Introduction to ANFCA Series Flexible Peel & Stick NFC Antennas
Abracon PTM Introduction to ANFCA Series Flexible Peel & Stick NFC Antennas WWW.ABRACON.COM ANFCA Series Flexible Peel & Stick NFC Antennas Purpose To introduce ANFCA Series, Flexible Peel & Stick NFC
CrashPlan Security SECURITY CONTEXT TECHNOLOGY
TECHNICAL SPECIFICATIONS CrashPlan Security CrashPlan is a continuous, multi-destination solution engineered to back up mission-critical data whenever and wherever it is created. Because mobile laptops
GETTING TO KNOW YOUR TELSTRA PRE-PAID 3G WI-FI
GETTING TO KNOW YOUR TELSTRA PRE-PAID 3G WI-FI LET S GET THIS SHOW ON THE ROAD You must be excited about your brand new Telstra Pre-Paid 3G Wi-Fi. This guide will help you get connected as quickly and
Web Application Security Considerations
Web Application Security Considerations Eric Peele, Kevin Gainey International Field Directors & Technology Conference 2006 May 21 24, 2006 RTI International is a trade name of Research Triangle Institute
DEVELOPING NFC APPS for BLACKBERRY
1 DEVELOPING NFC APPS for BLACKBERRY NFC Forum, Developers Showcase March 21 st, 2014 Larry McDonough, Principal Evangelist @LMCDUNNA 2 CONTENTS Development on BlackBerry BlackBerry NFC Support 5 most
Intrusion detection for web applications
Intrusion detection for web applications Intrusion detection for web applications Łukasz Pilorz Application Security Team, Allegro.pl Reasons for using IDS solutions known weaknesses and vulnerabilities
Monitoring mobile communication network, how does it work? How to prevent such thing about that?
Monitoring mobile communication network, how does it work? How to prevent such thing about that? 潘 維 亞 周 明 哲 劉 子 揚 (P78017058) (P48027049) (N96011156) 1 Contents How mobile communications work Why monitoring?
Training MIFARE SDK. Public. MobileKnowledge June 2015
MIFARE SDK Public MobileKnowledge June 2015 Agenda Overview of MIFARE SDK related technologies NFC Technology (Read/Write mode) MIFARE, NTAG and ICODE products NFC in Android MIFARE SDK Introduction to
Boston University Security Awareness. What you need to know to keep information safe and secure
What you need to know to keep information safe and secure Introduction Welcome to Boston University s Security Awareness training. Depending on your reading speed, this presentation will take approximately
TOTAL DEFENSE MOBILE SECURITY USER S GUIDE
TOTAL DEFENSE MOBILE SECURITY USER S GUIDE Publication date 2015.04.09 Copyright 2015 Total Defense Mobile Security LEGAL NOTICE All rights reserved. No part of this book may be reproduced or transmitted
Linux Network Security
Linux Network Security Course ID SEC220 Course Description This extremely popular class focuses on network security, and makes an excellent companion class to the GL550: Host Security course. Protocols
Top tips for improved network security
Top tips for improved network security Network security is beleaguered by malware, spam and security breaches. Some criminal, some malicious, some just annoying but all impeding the smooth running of a
FOR MAC. Quick Start Guide. Click here to download the most recent version of this document
FOR MAC Quick Start Guide Click here to download the most recent version of this document ESET Cyber Security Pro provides state-of-the-art protection for your computer against malicious code. Based on
FOR MORE INFORMATION. 125 8880 or from a non-telstra phone 13 2200 and say pre-paid telstra.com/ppmbb visit a telstra store or partner
FOR MORE INFORMATION 125 8880 or from a non-telstra phone 13 2200 and say pre-paid telstra.com/ppmbb visit a telstra store or partner getting to know your telstra pre-paid 4G WI-FI (760S) LET S GET THIS
Detailed Description about course module wise:
Detailed Description about course module wise: Module 1: Basics of Networking and Major Protocols 1.1 Networks and its Types. 1.2 Network Topologies 1.3 Major Protocols and their Functions 1.4 OSI Reference
E-commerce. business. technology. society. Kenneth C. Laudon Carol Guercio Traver. Second Edition. Copyright 2007 Pearson Education, Inc.
Copyright 2007 Pearson Education, Inc. Slide 5-1 E-commerce business. technology. society. Second Edition Kenneth C. Laudon Carol Guercio Traver Copyright 2007 Pearson Education, Inc. Slide 5-2 Chapter
Security by Politics - Why it will never work. Lukas Grunwald DN-Systems GmbH Germany DefCon 15 Las Vegas USA
Security by Politics - Why it will never work Lukas Grunwald DN-Systems GmbH Germany DefCon 15 Las Vegas USA Agenda Motivation Some basics Brief overview epassport (MRTD) Why cloning? How to attack the
New Attacks against RFID-Systems. Lukas Grunwald DN-Systems GmbH Germany
New Attacks against RFID-Systems Lukas Grunwald DN-Systems GmbH Germany Agenda What is RFID? How to exploit and attack RFID systems Attacks against the middleware Reader-emulation, soft-tags Unexpected
Securing Secure Browsers
Securing Secure Browsers SESSION ID: TRM-T11 Prashant Kumar Verma Sr. Consultant & Head (Security Testing) Paladion Networks @prashantverma21 Agenda Browser Threats Secure Browsers to address threats Secure
Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008
Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008 Contents Authentication and Identity Assurance The Identity Assurance continuum Plain Password Authentication
Training. MIFARE4Mobile. Public. MobileKnowledge April 2015
MIFARE4Mobile Public MobileKnowledge April 2015 Agenda Why MIFARE4Mobile? MIFARE in Mobile related technologies MIFARE technology NFC technology MIFARE4Mobile technology High level system architecture
WEB, HYBRID, NATIVE EXPLAINED CRAIG ISAKSON. June 2013 MOBILE ENGINEERING LEAD / SOFTWARE ENGINEER
WEB, HYBRID, NATIVE EXPLAINED June 2013 CRAIG ISAKSON MOBILE ENGINEERING LEAD / SOFTWARE ENGINEER 701.235.5525 888.sundog fax: 701.235.8941 2000 44th St. S Floor 6 Fargo, ND 58103 www.sundoginteractive.com
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
Sitefinity Security and Best Practices
Sitefinity Security and Best Practices Table of Contents Overview The Ten Most Critical Web Application Security Risks Injection Cross-Site-Scripting (XSS) Broken Authentication and Session Management
Gemalto Mifare 1K Datasheet
Gemalto Mifare 1K Datasheet Contents 1. Overview...3 1.1 User convenience and speed...3 1.2 Security...3 1.3 Anticollision...3 2. Gemalto Mifare Features...4 2.1 Compatibility with norms...4 2.2 Electrical...4
1. Any email requesting personal information, or asking you to verify an account, is usually a scam... even if it looks authentic.
Your identity is one of the most valuable things you own. It s important to keep your identity from being stolen by someone who can potentially harm your good name and financial well-being. Identity theft
KASPERSKY FRAUD PREVENTION FOR ENDPOINTS
KASPERSKY FRAUD PREVENTION FOR ENDPOINTS www.kaspersky.com 2 Fraud Prevention for Endpoints KASPERSKY FRAUD PREVENTION 1. Ways of Attacking The prime motive behind cybercrime is making money, and today
Summary of the SEED Labs For Authors and Publishers
SEED Document 1 Summary of the SEED Labs For Authors and Publishers Wenliang Du, Syracuse University To help authors reference our SEED labs in their textbooks, we have created this document, which provides
Sticky Password 7. Sticky Password 7 is the latest, most advanced, portable, cross platform version of the powerful yet
Sticky Password 7 Reviewer Guide Introduction Sticky Password 7 is the latest, most advanced, portable, cross platform version of the powerful yet simple password manager and form-filler. Its main goal
Now SMS/MMS Android Modem Quick Start Guide
Now SMS/MMS Android Modem Quick Start Guide Using a GSM modem, or an Android phone as a modem, is a quick and efficient way to get started with SMS and/or MMS applications. No special service provider
Salesforce1 Mobile Security Guide
Salesforce1 Mobile Security Guide Version 1, 1 @salesforcedocs Last updated: December 8, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of salesforce.com,
Gateway Apps - Security Summary SECURITY SUMMARY
Gateway Apps - Security Summary SECURITY SUMMARY 27/02/2015 Document Status Title Harmony Security summary Author(s) Yabing Li Version V1.0 Status draft Change Record Date Author Version Change reference
Android Security. Device Management and Security. by Stephan Linzner & Benjamin Reimold
Android Security Device Management and Security by Stephan Linzner & Benjamin Reimold Introducing Stephan Linzner Benjamin Reimold Consultant, Software Engineer Mobile Developer Founder of Stuttgart GTUG
BT LE RFID Reader v1.0
BT LE RFID Reader v1.0 The board The BT LE RFID Reader board v1.0 is shown below. On the board there are the following components: Power connector J7 with positive voltage going to pin 1 (red wire) and
Exchange Administrators will be able to use a more secure authentication mechanism compared with username and password
Summary Product: Version: Mail for Exchange for Nokia Mail Symbian Anna Date: May 2011 What s New? Support for Certificate Based Authentication Exchange Administrators will be able to use a more secure
Attacks from the Inside
Attacks from the Inside Eddy Willems, G Data Righard J. Zwienenberg, Norman Attacks from the Inside. Agenda - Social Networking / Engineering - Where are the threats coming from - Infection vectors - The
ESET NOD32 Antivirus 4 for Linux Desktop. Quick Start Guide
ESET NOD32 Antivirus 4 for Linux Desktop Quick Start Guide ESET NOD32 Antivirus 4 provides state-of-the-art protection for your computer against malicious code. Based on the ThreatSense scanning engine
What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.
What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things. AGENDA Current State of Information Security Data Breach Statics Data Breach Case Studies Why current
Training. NFC in Android. Public. MobileKnowledge October 2015
NFC in Android Public MobileKnowledge October 2015 Index Android mobile Operating System Market share Brief history Programing in Android NFC in Android Communicating my Android phone with NFC Readers
Secure Your Mobile Workplace
Secure Your Mobile Workplace Sunny Leung Senior System Engineer Symantec 3th Dec, 2013 1 Agenda 1. The Threats 2. The Protection 3. Q&A 2 The Mobile Workplaces The Threats 4 Targeted Attacks up 42% in
Common Criteria Web Application Security Scoring CCWAPSS
Criteria Web Application Security Scoring CCWAPSS Author Frédéric Charpentier, security pentester. France. [email protected] Releases Version 1.0 : First public release September 2007 Version
VESZPROG ANTI-MALWARE TEST BATTERY
VESZPROG ANTI-MALWARE TEST BATTERY 2012 The number of threats increased in large measure in the last few years. A set of unique anti-malware testing procedures have been developed under the aegis of CheckVir
You don t hear me but your phone s voice interface does. José LOPES ESTEVES & Chaouki KASMI
You don t hear me but your phone s voice interface does José LOPES ESTEVES & Chaouki KASMI Hack In Paris - 18/06/2015 WHO WE ARE José Lopes Esteves and Chaouki Kasmi ANSSI-FNISA / Wireless Security Lab
MIFARE CONTACTLESS CARD TECHNOLOLGY AN HID WHITE PAPER
MIFARE CONTACTLESS CARD TECHNOLOLGY AN HID WHITE PAPER GENERAL The MIFARE contactless smart card and MIFARE card reader/writer were developed to handle payment transactions for public transportation systems.
No more nuisance phone calls! Internet Control Panel & Weblink Guide
No more nuisance phone calls! Internet Control Panel & Weblink Guide truecall Ltd 2009 2 Contents Welcome! 3 Weblink 4 Your Internet Control Panel 5 Frequently asked questions 15 Support/Data Protection
Security Challenges for User-Oriented RFID Applications within the Internet of Things
Security Challenges for User-Oriented RFID Applications within the Internet of Things G.P. HANCKE, K. MARKANTONAKIS and K.E. MAYES ISG Smart Card Centre Royal Holloway, University of London UNITED KINGDOM
