Главная
Study mode:
on
1
Introduction
2
Slides
3
Who am I
4
Agenda
5
Why NFC
6
Motivation
7
Scanning Badges
8
Similar Work
9
NFC Overview
10
Todd Manning
11
Card Keys
12
NFC Tag
13
Active vs Passive
14
Specifications
15
Low Level
16
Waveforms
17
initialization anticollision activation
18
Typical flow
19
P2P communication
20
Data flow
21
Transport endpoint
22
Data exchange format
23
Data capture
24
Data analysis
25
Data breakdown
26
nmc parsing
27
test case generation
28
smart flushing
29
generating test cases
30
MC card reader
31
From scratch
32
Speed
33
Methods
34
FOC
35
LCP
36
Troubleshooting
37
Checking for crashes
38
Sending a buzzed tag to the phone
39
A pleasure working
40
The other was like
41
what did I find
42
Native code crashes
43
Native code freeze
44
Ice Cream Sandwich
45
Other Crashes
46
High Level Code
47
Android Beam
48
Multiple Apps
49
AndroidBeam
50
AndroidManifest
51
Browser
52
Backup Video
53
Nokia Content Sharing
54
Nokia Bluetooth Off
55
How to write an exploit
56
Finding my zero days
57
Word document heap overflow
58
Bluetooth pairing
59
Speaker demo
60
Summary
61
Code
62
Outro
Description:
Explore the security implications of Near Field Communication (NFC) technology in mobile devices through this Black Hat USA 2012 conference talk. Delve into the NFC protocol stack, learn fuzzing techniques for two devices, and discover the potential vulnerabilities in software built on top of NFC. Examine how technologies like Android Beam and NDEF content sharing can be exploited to parse various file types without user interaction. Uncover the possibility of complete phone takeover via NFC, including theft of personal data and unauthorized actions. Gain insights into the NFC attack surface, from low-level waveforms to high-level code vulnerabilities, and understand the risks associated with this emerging payment technology. Follow along as the speaker demonstrates real-world exploits, including a Word document heap overflow and Bluetooth pairing manipulation, highlighting the importance of security awareness in NFC-enabled devices.

Don't Stand So Close To Me - An Analysis of the NFC Attack Surface

Black Hat
Add to list