Главная
Study mode:
on
1
Intro
2
Why copy 125KHz RFID tags?
3
Simple 125KHz RFID tag
4
How simple 125KHz RFID works
5
Data modulation and encoding
6
HiTag2 password mode
7
HiTag2 crypto overview Tag
8
HiTag2 encryption
9
Feedback function, LO
10
HiTag2 commands
11
Emulate reader START AUTH
12
Nonce replay attack
13
Find encrypted 'read po' command
14
Find one encrypted 'read' command
15
Find all encrypted 'read' commands
16
Flip 'page' bit
17
Read page data
18
New RFIDler commands
19
Demo
20
Tag cloning
21
Closing remarks
Description:
Explore the intricacies of cracking HiTag2 crypto in this 45-minute conference talk from 44CON 2017. Delve into the world of RFID technology as Kevin Sheldrake weaponizes academic attacks for breaking and entering. Learn about HiTag2's unique features, including 2-way authentication and encryption, and its widespread use in secure building access and car immobilizers. Discover the implementation of three attacks on RFIDler, based on the 2012 research by Verdult, Garcia, and Balasch. Understand the nonce replay attack that exploits integrity protection, allowing access to readable RFID tag pages without knowing the key. Gain insights into HiTag2 RFID functionality, encryption methods, and the challenges faced during implementation. Witness live demonstrations of weaponized attacks enabling tag cloning. Explore topics such as data modulation, encoding, HiTag2 password mode, crypto overview, encryption techniques, and various commands. Enhance your knowledge of RFID security and learn practical applications for ethical hacking and penetration testing. Read more

Cracking HiTag2 Crypto - Weaponising Academic Attacks for Breaking and Entering

44CON Information Security Conference
Add to list