![]() Once inside a building, an attacker needs to plant a backdoor in order to harvest network data. “Essentially, I’m bypassing all of that by breaking into the reader,” he said. The attack is clever since it totally routes around some of the newer cryptographic and authentication defenses that have been put in place for high- and ultra-high frequency NFC systems, Brown said. With an accompanying Bluetooth app on his mobile phone, he can command the Tastic PCB to replay the card details of the last person who entered the building, opening the door. He’s added a Bluetooth module to the Tastic PCB. Once in place, it records badge values of everyone who scans their cards. To install the Tastic PCB, the lid is popped off a building’s access card reader and wired in using vampire taps, Brown said. He’s improved upon a previous tool he developed called the Tastic PCB (printed circuit board). Now Brown has been looking into how to harvest a large number of card details by tampering with the RFID readers that grant building access. It is, however, getting harder to clone high-frequency building access cards due to defensive measures people are taking to protect their cards.īecause of that, “the next step is to attack the building,” Brown said. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |