Explore the intricacies of cracking HiTag2 crypto in this 45-minute conference talk from 44CON 2017. Delve into the world of RFID technology as Kevin Sheldrake weaponizes academic attacks for breaking and entering. Learn about HiTag2's unique features, including 2-way authentication and encryption, and its widespread use in secure building access and car immobilizers. Discover the implementation of three attacks on RFIDler, based on the 2012 research by Verdult, Garcia, and Balasch. Understand the nonce replay attack that exploits integrity protection, allowing access to readable RFID tag pages without knowing the key. Gain insights into HiTag2 RFID functionality, encryption methods, and the challenges faced during implementation. Witness live demonstrations of weaponized attacks enabling tag cloning. Explore topics such as data modulation, encoding, HiTag2 password mode, crypto overview, encryption techniques, and various commands. Enhance your knowledge of RFID security and learn practical applications for ethical hacking and penetration testing.
Read more
Cracking HiTag2 Crypto - Weaponising Academic Attacks for Breaking and Entering