Главная
Study mode:
on
1
Intro
2
My Fare Lady
3
Classes of RFID Tags
4
A Brief History
5
Targeted Network Environment
6
Threats
7
Implementation Pitfalls
8
Sniff the Reader's network traffic
9
Rule #6 Encrypt all the things
10
Creating a System Master Key
11
Data Keys and Tags
12
Mifare Memory
13
Crypto Demo
14
The other side of Encrypted DBS
15
Encrypted Tag Update
16
One last addition
17
Comparing outputs
18
Frustrating Analysis
19
Revisiting the Past Example
20
Clones
21
How RFID works
22
Standard RFID Operating Frequencies
23
A model in a lab
24
Quadrature Sampling
25
My Super Sciencey Setup
26
Plotting Reflection Coefficients
27
Comparing Tags
28
Challenges to overcome
29
Conclusion
30
References
Description:
Explore the intricacies of RFID technology and its security implications in this comprehensive conference talk from BSides Tampa 2018. Delve into the world of MiFare cards, various classes of RFID tags, and their historical development. Examine potential threats in targeted network environments and learn about implementation pitfalls to avoid. Discover techniques for sniffing reader network traffic and the importance of encryption. Gain insights into creating system master keys, understanding data keys and tags, and exploring MiFare memory structure. Witness a crypto demo and explore the challenges of encrypted databases and tag updates. Analyze cloning techniques, RFID operating frequencies, and quadrature sampling. Investigate reflection coefficients and tag comparisons using a scientific setup. Conclude with a discussion on overcoming challenges in RFID technology and explore valuable references for further study.

MiFare Lady - Teaching an Old RFID New Tricks

Add to list