Electronic Access Control Security. Matteo Beccaro HackInTheBox Amsterdam, May 27 th, 2016
|
|
|
- Hollie Waters
- 9 years ago
- Views:
Transcription
1 Electronic Access Control Security Matteo Beccaro HackInTheBox Amsterdam, May 27 th, 2016
2 Me Matteo Beccaro Founder & Chief Technology Officer at Opposing Force The first Italian company specialize in offensive physical
3 What do you need? Extract the zip What you will find in the archive: VM with all tools and libraries for the hands-on parts VirtualBox installer VirtualBox guest-addition username: opposingforce password: opfor2016
4 Workshop s index of contents Module 1 Introduction Historical introduction on access control attacks Module 2 Attacking NFC NFC: what are we talking about? Weapons for NFC-based solutions Penetration test methodology Hands-on Case studies
5 Workshop s index of contents Module 3 Attacking RF communications Radio Frequency and EAC Systems Exploring Radio Frequency communications in practice Hands-on: receiving your first transmission SIGINT with GNU Radio Understanding RF communications security Module 4 The challenge Introducing the challenge The awards J
6 Module 1 introduction
7 Access Control system? Introduction A system composed by several elements which aim is to limit the access to certain resources only to authorized people. The system is composed by two type of elements: Human Technological
8 Introduction What was an Access Control system? The technological elements
9 What was an Access Control system? The human elements Introduction
10 What was an Access Control system? often fail Introduction
11 First access control hackers? Magicians.. Introduction
12 First access control hackers? Social Engineers Introduction
13 What is an Access Control system? Introduction
14 What is an Electronic Access Control system? It may employ different technologies NFC RF Biometrics Mag-stripe Mobile phones etc.
15 Module 2 attacking NFC
16 Agenda Module 2 Attacking NFC NFC: what are we talking about? Weapons for NFC-based solutions Penetration test methodology Hands-on Case studies
17 What is NFC? NFC stands for Near Field Communication Frequency at MHz 3-5 cm of range Widely used for Access control systems Electronic ticketing systems Mobile phone applications
18 Notorious NFC families MIFARE MIFARE Classic MIFARE Ultralight MIFARE DesFire HID iclass Calypso FeliCa
19 MIFARE Classic 1-4 KB memory storage device Strong access control mechanisms A key is required to access data sectors Use of Crypto1 Crapto1 algorithm Sadly broken....but still so widely used (!) RFID door tokens, transport tickets, etc.
20 MIFARE Ultralight 64 byte memory storage device Basic security mechanisms OTP (One-Time-Programmable) sector Lock bytes sector Mostly used for disposable tickets It has some more secure children: ULTRALIGHT C ULTRALIGHT EV
21 MIFARE DesFire 2 KB, 4KB or 8 KB memory size Advanced security mechanisms (3DES, AES, etc.) File system structure is supported Several variants are available DESFIRE DESFIRE EV1 DESFIRE EV2
22 HID iclass Same encryption and authentication keys are shared across every HID iclass Standard Security installations (!) Keys have already been extracted (!!) Two variants iclass Standard (very common) iclass High Secure (not that common) Both variants are BROKEN
23 NFC-based Electronic Access Control systems We need to create a common methodology We need tools to effectively assess these systems We need secure architectures as references and best practices
24 NFC-based Electronic Access Control systems
25 The token Usually a NFC card MIFARE Ultralight MIFARE Classic HID The card can store Timestamp of the last stamping Details on the location where we used the token Credentials, access level, etc.
26 What about MIFACE Classic? It is just BROKEN What about MIFARE Ultralight? Well, it s bleeding.. Lock attack Time attack Reply attack.. HID BROKEN, again The token
27 Readers Can operate offline or online Wire or wireless connected to the controller RS232, Ethernet, etc. Usually supports multiple standards Can store secrets and keys used for authentication Usually it can Read token(s) data Send token data to the controller Give a feedback to users on operation s success
28 Controller Connected both to readers and backend Wiegand, Ethernet, rs232 Receives data from the reader(s) Support multiple readers technologies Sends the data to the backend Open the door Deny the access
29 The backend It can be cloud-based or not Usually wired connected RS232, Ethernet, etc. Performs multiple operations Provide token validation logic Statistics Logging
30 Agenda Module 2 attacking NFC NFC: what are we talking about? Weapons for NFC-based solutions Penetration test methodology Hands-on Case studies
31 Tools of the trade HydraNFC ProxMark3 ChameleonMini NFCulT
32 HydraNFC (~90 ) Users Texas Instrument TRF7970A NFC chipset (13.56MHz only) MIFARE 1k and 14443A UID emulation ISO 14443A sniffing (also autonomous mode) 2 different raw modes HydraNFC
33 ProxMark3 ProxMark3 (~200 ) HF and LF capabilities Very large community Supports almost every known RFID tags Support sniffing and emulation
34 ChameleonMini ChameleonMini (~100 ) HF (13.56MHz) only Almost same capabilities as HydraNFC Different chipset The firmware is only available for old revision
35 NFCulT (~0 ) Opposing Force own weapon Originally designed for ticketing systems, it can be also used for generic EAC system security assessment Mobile app for NFC-enabled Android smartphones Implements Lock, Time and Reply attacks A custom edit mode is available for bit by bit data editin The app currently supports the MIFARE Ultralight format only MIFARE Classic support will be released on summer 2016
36 The custom editing feature The features is useful to better understand the structure of data stored onto the token Quick encoding from hex to bin and back The app allows token bit by bit data editing
37 Agenda Module 2 Attacking NFC NFC: what are we talking about? Weapons for NFC-based solutions Penetration test methodology Hands-on Case studies
38 Access Control system attack surface
39 Access Control system attack surface
40 The token Attack Surface Attacks to Perform Impact NFC Interface Hardware board Memory Analyze the authentication mechanisms Side channel attacks Assess logic vulnerabilities in the implementation Secrets extraction, MiTM attacks Secrets dumping or guessing Bypass security mechanisms
41 Access Control system attack surface
42 The reader Attack Surface Attacks to Perform Impact NFC Interface Hardware board Ethernet, wiegand, etc. Analyze the authentication mechanisms Analyze the exposed interface (JTAG, UART, etc.) Is MITM possible? Intercepting the exchanged data Secrets extraction, MiTM attacks Firmware or secrets dumping Intercepting secrets or sensitive data
43 Access Control system attack surface
44 The controller Attack Surface Attacks to Perform Impact Hardware board Eth, serial Interfaces, etc. Computer Application Analyze the exposed interface (JTAG, UART, etc.) Is MITM possible? Intercepting the data Analyzing exposed network services Firmware or secrets dumping Intercepting secrets or sensitive data Complete control of the machine (e.g., add new users)
45 Access Control system attack surface
46 The backend Attack Surface Attacks to Perform Impact Web application(s) Network service(s) Physical location Classic web apprelated attacks Classic network services-related attacks Try to get physical access to the servers Data exfiltration, service interruption, etc. Data exfiltration, service interruption, etc. Basically, heavily PWNED
47 Access Control system attack surface
48 The channels Attack Surface Attacks to Perform Impact Hardware board External wires Wireless connection Identify forgotten or backdoor pins Try to intercept data passing through those wires Intercept and inject data Data exfiltration, firmware dumping Intercepting sensitive information Intercepting sensitive information, send spoofed information
49 Agenda Module 2 Attacking NFC NFC: what are we talking about? Weapons for NFC-based solutions Penetration test methodology Hands-on Case studies
50 Fire up your
51 Agenda Module 2 attacking NFC NFC: what are we talking about? Weapons for NFC-based solutions Penetration test methodology Hands-on Case studies
52 MIFARE Ultralight ticketing system
53 MIFARE Ultralight ticketing system
54 MIFARE Ultralight ticketing system Absence of a UID blackli in the backend Lock bit for the OTP sect is not checked by the stamping machine Timestamps are not encrypted nor signed
55 MIFARE Classic hotel door lock
56 MIFARE Classic hotel door lock
57 MIFARE Classic door lock Card s UID Room number: int(0x17ea, 16) = 6122
58 odule 3 attacking RF communication
59 Agenda Module 3 Attacking RF communications Radio Frequency and EAC Systems Exploring Radio Frequency communications in practice Hands-on: receiving your first transmission SIGINT with GNU Radio Understanding RF communications security
60 Radio Frequency and EAC Systems Radio Frequency identification is widely used to control physical accesses Advantages Automatic identification High reliability High security
61 Radio Frequency and EAC Systems Different technologies based on operating frequency band Low Frequency (LF) 125 KHz High Frequency (HF) MHz Ultra High Frequency (UHF) 433 MHz, MHz and 2.4 GHz
62 Radio Frequency and EAC Systems Low Frequency band Tags Access control token
63 Radio Frequency and EAC Systems High Frequency band Door locks Ticketing systems
64 Radio Frequency and EAC Systems Ultra High Frequency band Automated Gates Keyless Entry Systems Alarms Smart Locks
65 Radio Frequency and EAC Systems Common technologies and protocols Fixed and rolling code NFC Bluetooth ZigBee Z-Wave
66 Agenda Module 3 Attacking RF communications Radio Frequency and EAC Systems Exploring Radio Frequency communications in practice Hands-on: receiving your first transmission SIGINT with GNU Radio Understanding RF communications security
67 Exploring Radio Frequency communication How to explore wireless communications? Software Defined Radio (SDR) devices with GNU Radio Software implementation of most parts of a radio system Cheap hardware High flexible
68 Exploring Radio Frequency communication Three SDR-compatible devices Device Frequency Range Bandwidth Price RTL-SDR Dongle 24 MHz 1.76 GHz 2.4 MHz ~ 20 HackRF 1 MHz 6 GHz 20 MHz ~ 300 USRP B MHz 6 GHz 56 MHz ~ 700
69 Exploring Radio Frequency communication GNU Radio Platform to develop radio applications, called flowgraph Series of connected signal processing blocks GNU Radio libraries include blocks to perform signal processing
70 Exploring Radio Frequency communication GNU Radio Supports the programming of custom C++ blocks GNU Radio Companion (GRC) Graphical UI to program GNU Radio applications Supports the creation of UI for applications
71 GRC Interface Exploring Radio Frequency communication
72 GRC Interface Exploring Radio Frequency communication RIABLE
73 GRC Interface Exploring Radio Frequency communication WGRAP
74 GRC Interface Exploring Radio Frequency communication RMINA
75 BLOCK LIBRAR Y GRC Interface Exploring Radio Frequency communication
76 Exploring Radio Frequency communication Hello World in GNU Radio
77 Exploring Radio Frequency communication Hello World in GNU Radio
78 Exploring Radio Frequency communication RTL-SDR Source Block
79 Exploring Radio Frequency communication WX GUI FFT Sink Block
80 Agenda Module 3 Attacking RF communications Radio Frequency and EAC Systems Exploring Radio Frequency communications in practice Hands-on: receiving your first transmission SIGINT with GNU Radio Understanding RF communications security
81 Build a FM receiver Fire up your
82 Agenda Module 3 Attacking RF communications Radio Frequency and EAC Systems Exploring Radio Frequency communications in practice Hands-on: receiving your first transmission SIGINT with GNU Radio Understanding RF communications security
83 SIGINT with GNU Radio Define a methodology to study real world signals Three main steps Intercept and record signal Study characteristics Reverse transmitted data
84 SIGINT with GNU Radio Define a methodology to study real world signals Three main steps Intercept and record signal Study characteristics Reverse transmitted data
85 SIGINT with GNU Radio GQRX SDR receiver and spectrum analyzer based on GNU Radio and QT Graphical toolkit User-friendly interface Supports RTL-SDR, HackRF, USRP and other SDR devices Records signal to WAV file
86 SIGINT with GNU Radio
87 SIGINT with GNU Radio QUENC ECTOR
88 AL-TIME ECTRUM SIGINT with GNU Radio
89 SIGINT with GNU Radio INPUT CONTROLS
90 SIGINT with GNU Radio RECEIV ER OPTION S
91 SIGINT with GNU Radio DEMODUL D SPECTR
92 SIGINT with GNU Radio RECOR SECTIO N
93 Black-box interception of a RF signal SIGINT with GNU Radio If the frequency is unknown, search power peaks in the spectrum
94 SIGINT with GNU Radio Define a methodology to study real world signals Three main steps Intercept and record signal Study characteristics Reverse transmitted data
95 Modulation SIGINT with GNU Radio Impresses a waveform, called carrier, with another signal that contains data to be transmitted
96 SIGINT with GNU Radio Signal Identification Guide
97 SIGINT with GNU Radio Audacity Useful to study recorded signals Support RAW data files used with USRP and HackRF utilities
98 Case Study: remote control at 433 MHz SIGINT with GNU Radio
99 Case Study: remote control at 433 MHz SIGINT with GNU Radio
100 Case Study: remote control at 433 MHz SIGINT with GNU Radio
101 Let s study the signal Amplitude Modulation (AM) Only two amplitude levels SIGINT with GNU Radio Binary transmission using On-Off Keying (OOK) modulation Repeated trains of pulses Different lengths to encode the 0 and 1 bit
102 SIGINT with GNU Radio Define a methodology to study real world signals Three main steps Intercept and record signal Study characteristics Reverse transmitted data
103 Focus on a single train SIGINT with GNU Radio The first pulse indicates the beginning of the message
104 SIGINT with GNU Radio Short pulses represent binary 0 while long pulses binary 1 Transmitted message is
105 Agenda Module 3 Attacking RF communications Radio Frequency and EAC Systems Exploring Radio Frequency communications in practice Hands-on: receiving your first transmission SIGINT with GNU Radio Understanding RF communications security
106 SIGINT with GNU Radio Case study s solution security The remote control always sends same fixed code (!) Malicious people can record and replay signals thus obtaining an unauthorized access Solution Rolling code
107 Rolling Code SIGINT with GNU Radio Remote control always sends different codes Sender and receiver are synchronized with an internal counter An hardware algorithm calculates the next code on the basis of the internal counter s value A widely used algorithm is KeeLoq Rolling code is NOT a unbreakable mechanism..
108 Module 4 the challenge
109 Agenda Module 4 The challenge Introducing the challenge The awards J
110 Challenge introduction You are now part of a Red Team, which has been engaged to breach the physical security of a high security facility controlled by a super secret, and probably evil, organization known as h4k3rz T34mZ Your task is to open the external facility s electric gate, thus allow your team to enter the facility and proceed with the intrusion..
111 Hint? ou find one employee s remote controller.. seems to be broken and you can t use it to open the gate but you ecide to open it to see inside.
112 Hint?
113 Agenda Module 4 The challenge Introducing the challenge The awards J
114 Awards The first two to complete the challenge will win a: RTL-SDR Dongle from
115 Q&A Feedback and questions please.. Don t be shy.. ;-D
116 Thank you Contacts
117 Start hack Access Control systems have 10 tool box NOW! at the special price of 15 Each toolkit contains Plastic box with Opposing Force sticker J 1 HydraBus with its case 1 HydraNFC 1 Mini USB cable 1 SDR-RTL dongle with its antenna 1 Breaboard with some jumpers 1 NFC MIFARE ULTRALIGHT card
NFCulT. An easy a nice tool that will make you have fun, or... make profit!
NFCulT An easy a nice tool that will make you have fun, or... make profit Matteo Beccaro ( aka bughardy ) Student at Politecnico di Torino Computer Engineering Security Engineer and researcher at Secure
Aperio Online System Description
Aperio Online Aperio Online System Description Document No: ST-002326-B, Issue date: 4 August 2015 1 The global leader in Aperio Online Mechanical Installation Guide, Document No: ST-002326-PB, Date: Online
OTP circumventing in MIFARE ULTRALIGHT: Who says free rides?
OTP circumventing in MIFARE ULTRALIGHT: Who says free rides? bughardy [email protected] Eagle1753 [email protected] Introduction RFID technologies are becoming more and more prevalent in
NACCU 2013. Migrating to Contactless: 2013 1
NACCU 2013 Migrating to Contactless: 2013 1 AGENDA The demise of cards has been predicted for many years. When will this really happen? This presentation by two card industry experts will cover the rise
Secure My-d TM and Mifare TM RFID reader system by using a security access module Erich Englbrecht ([email protected]) V0.1draft
Application Report Secure My-d TM and Mifare TM RFID reader system by using a security access module Erich Englbrecht ([email protected]) V0.1draft Embedded RF ABSTRACT This application report describes
Using RFID Techniques for a Universal Identification Device
Using RFID Techniques for a Universal Identification Device Roman Zharinov, Ulia Trifonova, Alexey Gorin Saint-Petersburg State University of Aerospace Instrumentation Saint-Petersburg, Russia {roman,
RFID Penetration Tests when the truth is stranger than fiction
RFID Penetration Tests when the truth is stranger than fiction Dr. Tomáš Rosa, [email protected] Raiffeisenbank, a.s. Agenda Technology overview Physical layer of LF and HF bands The Unique ID phenomenon
RFID Hacking. Live Free or RFID Hard. 01 Aug 2013 Black Hat USA 2013 Las Vegas, NV. Presented by: Francis Brown Bishop Fox www.bishopfox.
RFID Hacking Live Free or RFID Hard 01 Aug 2013 Black Hat USA 2013 Las Vegas, NV Presented by: Francis Brown Bishop Fox www.bishopfox.com Agenda Quick Overview RFID badge basics Hacking Tools Primary existing
Aperio Online. Aperio. Online Programming Application Manual. Aperio Online Quick Installation Guide, Document No: ST-001322-A, Date: 8 juli 2013
Aperio TM Online Programming Application Manual Document No: ST-001321-A, Issue date: 8 July 2013 1 Aperio Online Quick Installation Guide, Document No: ST-001322-A, Date: 8 juli 2013 Table of Contents
More effective protection for your access control system with end-to-end security
More effective protection for your access control system with end-to-end security By Jeroen Harmsen The first article on end-to-end security appeared as long ago as 1981. The principle originated in ICT
Exercise 1: Set up the Environment
RFID Lab Gildas Avoine, 2014 Contact: [email protected] Objective: Learn how much it is easy to read contactless tags, possibly simulate/clone. Requirement: Hardware: Reader SCL3711 or ACR122, Reader
Breaking the Security of Physical Devices
Breaking the Security of Physical Devices Dr Silvio Cesare Qualys 1 Introduction Electronics, computers, mobile phones, microcontrollers are ubiquitous devices in the world we live in. These devices, previously
Using Contactless Smart Cards for Secure Applications
Using Contactless Smart Cards for Secure Applications Classification: Public (Info Level 1) Document No.: LA-11-005d-en Edition: 2010 www.legic.com LEGIC Identsystems Ltd Binzackerstrasse 41, CH-8620 Wetzikon,
3M Cogent, Inc. White Paper. Beyond. Wiegand: Access Control. in the 21st Century. a 3M Company
3M Cogent, Inc. White Paper Beyond Wiegand: Access Control in the 21st Century a 3M Company Unprecedented security features & capabilities Why Wiegand? The Problem with Wiegand In 1970, John Wiegand invented
IP Card Reader Interface User Manual
IP Card Reader Interface User Manual SB Research 2009-2011 The IP Reader Interface family: Concept: The IP Card Reader Interface allows access control card readers to be connected to a network device,
Ex15x //DATASHEET. Xs4 Mini. Cutting-edge design + Amazing technology:
//DATASHEET XS4 Mini Cutting-edge design + Amazing technology: Stylish design is a SALTO trademark and with the XS4 Mini, we raise the bar on this already high standard thanks to the XS4 Mini s small,
Radio Frequency Identification (RFID)
Radio Frequency Identification (RFID) Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse574-06/
Edge Metrics Data Center User Manual
Edge Metrics Data Center User Manual Introduction EMDC is an Internet based, Facility Access Control Solution for small to medium size businesses, property management firms, schools, religious facilities,
Security in Near Field Communication (NFC)
Security in Near Field Communication (NFC) Strengths and Weaknesses Ernst Haselsteiner and Klemens Breitfuß Philips Semiconductors Mikronweg 1, 8101 Gratkorn, Austria [email protected] [email protected]
Guard All Security Symposium. Identity and Access Management
Guard All Security Symposium Identity and Access Management The Complex Digital World Welcome to the Identiverse Segments / Brands Product Offerings Applications ID Management Solutions Governmental credentialing
Ensto Chago Master EVM300 and EVM500 Operational description
Pages: 1 (8) Ensto Chago Master EVM300 and EVM500 Operational Pages: 2 (8) Contents 1 What is Ensto EVM... 3 2 EVM versions... 3 2.1 EVM300... 4 2.2 EVM500... 5 3 Technical information... 7 Pages: 3 (8)
Hacking the NFC credit cards for fun and debit ;) Renaud Lifchitz BT [email protected] Hackito Ergo Sum 2012 April 12,13,14 Paris, France
Hacking the NFC credit cards for fun and debit ;) Renaud Lifchitz BT [email protected] Hackito Ergo Sum 2012 April 12,13,14 Paris, France Speaker's bio French computer security engineer working at
Mobile and Contactless Payment Security
Mobile and Contactless Payment Security v20111118 1/842 High Street East Kew 3102 Melbourne Australia Ph: +61 3 9846 2751 Fax: +61 3 9857 0350 Rambla de Catalunya 38, 8 planta 08007 Barcelona Spain Ph.
DT3: RF On/Off Remote Control Technology. Rodney Singleton Joe Larsen Luis Garcia Rafael Ocampo Mike Moulton Eric Hatch
DT3: RF On/Off Remote Control Technology Rodney Singleton Joe Larsen Luis Garcia Rafael Ocampo Mike Moulton Eric Hatch Agenda Radio Frequency Overview Frequency Selection Signals Methods Modulation Methods
Gemalto Mifare 1K Datasheet
Gemalto Mifare 1K Datasheet Contents 1. Overview...3 1.1 User convenience and speed...3 1.2 Security...3 1.3 Anticollision...3 2. Gemalto Mifare Features...4 2.1 Compatibility with norms...4 2.2 Electrical...4
advant advanced contactless smart card system
LA-11-001l-en [08.2012] advant advanced contactless smart card system power Fully scalable fully flexible Key applications & standards 2 1 5 The LEGIC advant product line ideally supports the design and
WHITE PAPER Usher Mobile Identity Platform
WHITE PAPER Usher Mobile Identity Platform Security Architecture For more information, visit Usher.com [email protected] Toll Free (US ONLY): 1 888.656.4464 Direct Dial: 703.848.8710 Table of contents Introduction
Design And Implementation Of Bank Locker Security System Based On Fingerprint Sensing Circuit And RFID Reader
Design And Implementation Of Bank Locker Security System Based On Sensing Circuit And RFID Reader Khaing Mar Htwe, Zaw Min Min Htun, Hla Myo Tun Abstract: The main goal of this system is to design a locker
MIFARE CONTACTLESS CARD TECHNOLOLGY AN HID WHITE PAPER
MIFARE CONTACTLESS CARD TECHNOLOLGY AN HID WHITE PAPER GENERAL The MIFARE contactless smart card and MIFARE card reader/writer were developed to handle payment transactions for public transportation systems.
Functional Specification Document
Functional Specification Document Access Control Technology Unit C1 South City Business Centre Tallaght Dublin 24 Ireland Ph: + 353 (0) 1 4662570 Web: www.accesscontrol.ie Index Introduction 1.1 Hardware
Access Professional Edition Selection Guide
Access Professional Edition Selection Guide 2 Contents Contents 3 System overview 3 Wiegand based hardware 4 RS485 Bus reader 5 Selection Guide The Seven Steps to your Access System 6 Step 1: Choose Base
NFC. Technical Overview. Release r05
Release r05 Trademarks The Bluetooth word mark and logos are owned by the Bluetooth SIG, Inc. and any use of such marks by Stollmann E+V GmbH is under license. Other trademarks and trade names are those
Location-Aware and Safer Cards: Enhancing RFID Security and Privacy
Location-Aware and Safer Cards: Enhancing RFID Security and Privacy 1 K.Anudeep, 2 Mrs. T.V.Anantha Lakshmi 1 Student, 2 Assistant Professor ECE Department, SRM University, Kattankulathur-603203 1 [email protected],
HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper
HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper Rev 1.0 HIPAA Security Considerations for Broadband Fixed Wireless Access Systems This white paper will investigate
Special Topics in Security and Privacy of Medical Information. Reminders. Medical device security. Sujata Garera
Special Topics in Security and Privacy of Medical Information Sujata Garera Reminders Assignment due today Project part 1 due on next Tuesday Assignment 2 will be online today evening 2nd Discussion session
Version Date Author Description 1.00 19.07.2010 Jpo First version 1.01 21.12.2010 Jpo FET output descriptions made clearer 1.02 04.02.
+3 # Version Date Author Description 1.00 19.07.2010 Jpo First version 1.01 21.12.2010 Jpo FET output descriptions made clearer 1.02 04.02.2011 Jpo Reset button added 1. Purpose of this user manual...
RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards
RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards January 2007 Developed by: Smart Card Alliance Identity Council RF-Enabled Applications and Technology:
Using ISO 15693 Compliant RFID Tags in an Inventory Control System
Using ISO 15693 Compliant RFID Tags in an Inventory Control System University: Louisiana State University, Baton Rouge, Louisiana Course: Undergraduate Capstone Project Student Team Members: Joseph Gates,
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars Aurélien Francillon, Boris Danev, Srdjan Čapkun 1 Modern Cars Evolution Increasing amount of electronics in cars For convenience
NFC Hacking: The Easy Way
DEFCON 20 NFC Hacking: The Easy Way Eddie Lee eddie{at}blackwinghq.com About Me! Security Researcher for Blackwing Intelligence (formerly Praetorian Global)! We re always looking for cool security projects!
Training. MIFARE4Mobile. Public. MobileKnowledge April 2015
MIFARE4Mobile Public MobileKnowledge April 2015 Agenda Why MIFARE4Mobile? MIFARE in Mobile related technologies MIFARE technology NFC technology MIFARE4Mobile technology High level system architecture
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars Srdjan Čapkun (joint work with Aurélien Francillon, Boris Danev) 1 Agenda 1. Overview of Car Key Systems 2. Previous Attacks: In
How To Attack A Key Card With A Keycard With A Car Key (For A Car)
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars (NDSS ) Aurélien Francillon, Boris Danev, Srdjan Čapkun (ETHZ) Wednesday System Security April Group 6, 1 Agenda 1. Overview of Car
Department of Electrical and Computer Engineering Ben-Gurion University of the Negev. LAB 1 - Introduction to USRP
Department of Electrical and Computer Engineering Ben-Gurion University of the Negev LAB 1 - Introduction to USRP - 1-1 Introduction In this lab you will use software reconfigurable RF hardware from National
Karsten Nohl University of Virginia. Henryk Plötz HU Berlin
Karsten Nohl University of Virginia Henryk Plötz HU Berlin Radio Frequency IDentification Tiny computer chips Passively Powered Karsten Nohl, Henryk Plötz - RFID Security 2 Constant monitoring is already
USB Card Reader Interface User Manual
USB Card Reader Interface User Manual SB Research 2009-2012 The USB Reader Interface family: Concept: The USB Card Reader Interface allows access control card readers to be connected to a PC, in order
NFC Test Challenges for Mobile Device Developers Presented by: Miguel Angel Guijarro [email protected]
NFC Test Challenges for Mobile Device Developers Presented by: Miguel Angel Guijarro [email protected] 1 Outlook About NFC Developing a NFC Device Test Challenges Test Solutions Q&A 2 What
Veracode White Paper The Internet of Things: Security Research Study. The Internet of Things: Security Research Study
The Internet of Things: Security Research Study Introduction As the Internet of Things (IoT) continues to gain traction and more connected devices come to market, security becomes a major concern. Businesses
ACCESS CONTROL MANY FUNCTIONS. ONE SYSTEM. ONE CARD.
MANY FUNCTIONS. ONE SYSTEM. ONE CARD. ACCESS CONTROL One card, centrally monitored and controlled provides access to doors, gates, turnstiles and lockers ACCESS CONTROL The Intelligent System from InterCard
From baseband to bitstream and back again: What security researchers really want to do with SDR. Andy Davis, Research Director NCC Group
From baseband to bitstream and back again: What security researchers really want to do with SDR Andy Davis, Research Director NCC Group Agenda Signals basics Modulation schemes Information sources Receiving
You don t hear me but your phone s voice interface does. José LOPES ESTEVES & Chaouki KASMI
You don t hear me but your phone s voice interface does José LOPES ESTEVES & Chaouki KASMI Hack In Paris - 18/06/2015 WHO WE ARE José Lopes Esteves and Chaouki Kasmi ANSSI-FNISA / Wireless Security Lab
Software Defined Radio
Software Defined Radio GNU Radio and the USRP Overview What is Software Defined Radio? Advantages of Software Defined Radio Traditional versus SDR Receivers SDR and the USRP Using GNU Radio Introduction
SALTO Systems I SALTO Carriers. innovation in ID technology. MIFARE DESFire
MIFAR SALTO Systems I SALTO Carriers innov innovation in ID technology MIFARE DESFire SALTO Carriers SALTO offers wide range of carriers(fobs, bracalets, contact less bracelets, contacless fobs, contact
Development of a wireless home anti theft asset management system. Project Proposal. P.D. Ehlers 21017914. Study leader: Mr. D.V.
EVALUATION PAGE Format/10 Afrikaans group Revision no: 0 Content/10 Computer Engineering Must revise: Yes No Final mark/20 Must proofread: Yes No Development of a wireless home anti theft asset management
Training MIFARE SDK. Public. MobileKnowledge June 2015
MIFARE SDK Public MobileKnowledge June 2015 Agenda Overview of MIFARE SDK related technologies NFC Technology (Read/Write mode) MIFARE, NTAG and ICODE products NFC in Android MIFARE SDK Introduction to
The Access Engine. Building Integration System - The Access Engine. Security Systems
The Access Engine 1 What is BIS Access Engine? It is one of the central software modules of the Building Integration System It s a fully integrated access control solution with corresponding access hardware
A Fully Integrated Online Hotel Locking System
ZLock ALV2 Wireless Online System A Fully Integrated Online Hotel Locking System A state-of-the-art integrated real-time access system especially designed for today s demanding Lodging industry. Unlike
How to hack your way out of home detention
How to hack your way out of home detention About me William @Amm0nRa Turner @Assurance Disclaimer: I own this system (and 0wn it) The following information is for academic purposes only Don t use this
TWO FACTOR AUTHENTICATION FOR HIGH SECURITY BANKING ATM USERS
TWO FACTOR AUTHENTICATION FOR HIGH SECURITY BANKING ATM USERS 1 S.Naveen Kumar, 2 A.Mohammed Arif, 3 S.Naveen Kumar and 4 Mr.S.VijayMurugan,M.E.,(PhD.,), 1,2,3 Student Department of ECE, Adhiyamaan College
SYMMETRY PRODUCT OVERVIEW
ACCESS CONTROL The Symmetry Security Management Systems provides powerful integrated solutions for organizations requiring Access Control and Integrated Security. Solutions are available for organizations
Logitech Advanced 2.4 GHz Technology
Logitech Advanced 2.4 GHz Technology Revision 1.1H March 2, 2009 TABLE OF CONTENTS 1 INTRODUCTION... 3 2 SYSTEM OVERVIEW... 4 2.1 NETWORK TOPOLOGY...4 2.2 MAIN FEATURES...4 3 ASSOCIATION MODEL... 5 4 ENCRYPTION...
SYMMETRY. DATASHEET ACCESS CONTROL Product Overview
DATASHEET ACCESS CONTROL Product Overview SYMMETRY The AMAG Technology range of Security Management Systems provides powerful integrated solutions for organizations requiring Access Control and Integrated
Home Automation and Cybercrime
Trend Micro Incorporated Research Paper 2013 Home Automation and Cybercrime By: Ranieri Romera Contents Introduction...1 Distribution...2 Installation...3 Backdoor...3 Network Traffic Encryption... 5 Infrastructure...7
Home Passport Gateway Series Simplify your Life with Smart Solutions
Home Passport Gateway Series Simplify your Life with Smart Solutions HPGW Series - Home Passport Gateway Series HPGW Series is Home Passport Gateway, representing a breakthrough product in the intrusion
Securing Host Operations with a Dedicated Cryptographic IC - CryptoCompanion
Securing Host Operations with a Dedicated Cryptographic IC - CryptoCompanion By Kerry Maletsky, Business Unit Director Crypto Products Summary There is a growing need for strong hardware security devices
VON BRAUN LABS. Issue #1 WE PROVIDE COMPLETE SOLUTIONS ULTRA LOW POWER STATE MACHINE SOLUTIONS VON BRAUN LABS. State Machine Technology
VON BRAUN LABS WE PROVIDE COMPLETE SOLUTIONS WWW.VONBRAUNLABS.COM Issue #1 VON BRAUN LABS WE PROVIDE COMPLETE SOLUTIONS ULTRA LOW POWER STATE MACHINE SOLUTIONS State Machine Technology IoT Solutions Learn
Mobile Application Hacking for Android and iphone. 4-Day Hands-On Course. Syllabus
Mobile Application Hacking for Android and iphone 4-Day Hands-On Course Syllabus Android and iphone Mobile Application Hacking 4-Day Hands-On Course Course description This course will focus on the techniques
That Point of Sale is a PoS
SESSION ID: HTA-W02 That Point of Sale is a PoS Charles Henderson Vice President Managed Security Testing Trustwave @angus_tx David Byrne Senior Security Associate Bishop Fox Agenda POS Architecture Breach
Secure recharge of disposable RFID tickets
Secure recharge of disposable RFID tickets Riccardo Focardi Flaminia Luccio Università Ca Foscari, Venezia {focardi,luccio}@unive.it FAST 2011 15-16 September 2011, Leuven FAST 2011 ()Secure recharge of
In the pursuit of becoming smart
WHITE PAPER In the pursuit of becoming smart The business insight into Comarch IoT Platform Introduction Businesses around the world are seeking the direction for the future, trying to find the right solution
Strong authentication of GUI sessions over Dedicated Links. ipmg Workshop on Connectivity 25 May 2012
Strong authentication of GUI sessions over Dedicated Links ipmg Workshop on Connectivity 25 May 2012 Agenda Security requirements The T2S U2A 2 Factor Authentication solution Additional investigation Terminal
Single channel data transceiver module WIZ2-434
Single channel data transceiver module WIZ2-434 Available models: WIZ2-434-RS: data input by RS232 (±12V) logic, 9-15V supply WIZ2-434-RSB: same as above, but in a plastic shell. The WIZ2-434-x modules
NFC Hacking: The Easy Way
DEFCON 20 NFC Hacking: The Easy Way Eddie Lee eddie{at}blackwinghq.com About Me! Security Researcher for Blackwing Intelligence (formerly Praetorian Global)! New site live: blackwinghq.com! We re always
CHAPTER 1 Introduction 1
Contents CHAPTER 1 Introduction 1 CHAPTER 2 Short-Range Communications Systems 3 2.1 Radio-Frequency Spectrum and Propagation 3 2.1.1 Theory of Electromagnetism and Maxwell s Equations 3 2.1.2 RF Propagation
John Beckwith Loyola Marymount. Access Control - Where are we and where are we going?
John Beckwith Loyola Marymount Access Control - Where are we and where are we going? Loyola Marymount University Private Jesuit Institution 1911 5500 Undergraduates 1600 Graduates 1300 Law School 3500
Verification Of Primitive Sub Ghz Rf Replay Attack Techniques Based On Visual Signal Analysis
Edith Cowan University Research Online Australian Digital Forensics Conference Security Research Institute Conferences 2013 Verification Of Primitive Sub Ghz Rf Replay Attack Techniques Based On Visual
A User-Friendly Android-Based Tool for 868 MHz RF Traffic- and Spectrum-Analysis
A User-Friendly Android-Based Tool for 868 MHz RF Traffic- and Spectrum-Analysis Jens Saalmüller, Matthias Kuba, Andreas Oeder Networked Systems and Applications Department Fraunhofer Institute for Integrated
Network Security 101 Multiple Tactics for Multi-layered Security
Security and Resilience for Utility Network Communications White Paper Communications networks represent a partial paradox. The very openness and ubiquity that make them powerful can also present a weakness.
Security & Chip Card ICs SLE 44R35S / Mifare
Security & Chip Card ICs SLE 44R35S / Mifare Intelligent 1 Kbyte EEPROM with Interface for Contactless Transmission, Security Logic and Anticollision according to the MIFARE -System Short Product Info
Objectives. Lecture 4. How do computers communicate? How do computers communicate? Local asynchronous communication. How do computers communicate?
Lecture 4 Continuation of transmission basics Chapter 3, pages 75-96 Dave Novak School of Business University of Vermont Objectives Line coding Modulation AM, FM, Phase Shift Multiplexing FDM, TDM, WDM
Achieving Universal Secure Identity Verification with Convenience and Personal Privacy A PRIVARIS BUSINESS WHITE PAPER
with Convenience and Personal Privacy version 0.2 Aug.18, 2007 WHITE PAPER CONTENT Introduction... 3 Identity verification and multi-factor authentication..... 4 Market adoption... 4 Making biometrics
Monitoring mobile communication network, how does it work? How to prevent such thing about that?
Monitoring mobile communication network, how does it work? How to prevent such thing about that? 潘 維 亞 周 明 哲 劉 子 揚 (P78017058) (P48027049) (N96011156) 1 Contents How mobile communications work Why monitoring?
Logitech Advanced 2.4 GHz Technology With Unifying Technology
Logitech Advanced 2.4 GHz Technology Revision 070709 July 7, 2009 TABLE OF CONTENTS 1 INTRODUCTION: THE MOVE TO WIRELESS PERIPHERALS IN BUSINESS...3 2 SYSTEM OVERVIEW...4 2.1 NETWORK TOPOLOGY...4 2.2 MAIN
Security Issues with Integrated Smart Buildings
Security Issues with Integrated Smart Buildings Jim Sinopoli, Managing Principal Smart Buildings, LLC The building automation industry is now at a point where we have legitimate and reasonable concern
868 MHz Traffic Detective: A Software-Based Tool for Radio Traffic Monitoring
868 MHz Traffic Detective: A Software-Based Tool for Radio Traffic Monitoring Jens Saalmüller, Matthias Kuba, Andreas Oeder Networked Systems and Applications Department, Fraunhofer Institute for Integrated
Living Requirements Document: Sniffit
Living Requirements Document: Sniffit RFID locator system Andrew Pang Braulio Fonseca Enrique Gutierrez Nader Khalil Sohan Shah Victor Porter Introduction Sniffit is a handy tracking application that helps
Contents. Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008
Identity Assurance (Scott Rea Dartmouth College) IdM Workshop, Brisbane Australia, August 19, 2008 Contents Authentication and Identity Assurance The Identity Assurance continuum Plain Password Authentication
The increasing popularity of mobile devices is rapidly changing how and where we
Mobile Security BACKGROUND The increasing popularity of mobile devices is rapidly changing how and where we consume business related content. Mobile workforce expectations are forcing organizations to
Automated Security System using ZigBee
IJIRST International Journal for Innovative Research in Science & Technology Volume 2 Issue 01 June 2015 ISSN (online): 2349-6010 Automated Security System using ZigBee Sneha Susan Abraham Saveetha School
R&D Access Touch 3.1 User Manual Version 1.00 Public 1 (13) User Manual. Access Touch 3.1
Public 1 (13) User Manual Access Touch 3.1 Version Date Author Description 1.00 30.09.2011 Pah First version Public 2 (13) 1. Purpose of this user manual... 3 2. Description of Access Touch 3.1... 3 3.
SCADA System Security. ECE 478 Network Security Oregon State University March 7, 2005
SCADA System Security ECE 478 Network Security Oregon State University March 7, 2005 David Goeke Hai Nguyen Abstract Modern public infrastructure systems
Multi-vendor Penetration Testing in the Advanced Metering Infrastructure: Future Challenges
Multi-vendor Penetration Testing in the Advanced ing Infrastructure: Future Challenges DIMACS Workshop on Algorithmic Decision Theory for the Smart Grid Stephen McLaughlin - Penn State University 1 Data
Technical Article. NFiC: a new, economical way to make a device NFC-compliant. Prashant Dekate
Technical NFiC: a new, economical way to make a device NFC-compliant Prashant Dekate NFiC: a new, economical way to make a device NFC-compliant Prashant Dekate The installed base of devices with Near Field
RFID Based Real Time Password Authentication System for ATM
IJSRD - International Journal for Scientific Research & Development Vol. 3, Issue 04, 2015 ISSN (online): 2321-0613 RFID Based Real Time Password Authentication System for ATM Soniya B. Milmile 1 Prof.
