Hacking RFID / NFC

Chris Paget speaking at DEF CON 17

This presentation below about challenging many of the popular preconceptions about RFID technology. “Short-range” will be shot down first (I’m aiming to set a half-mile world record in the Nevada desert just before Defcon), “secure” will be busted second (don’t bring _any_ RFID tags unless you want them cloned), “immune to electromagnetic pulse weaponry” will fall last (and hopefully most spectacularly). I’ll be covering a wide range of different RFID technologies from 125KHz to 900MHz, and releasing a whole pile of source code, schematics, and (with luck) a little magic smoke.

RFID MythBusting appeared at DEF CON 17 and you read more on hacking RFID

DEF CON 14: A Hacker’s Guide to RFID Spoofing and Jamming

Speaker: Melanie Rieback, RFID Security/Privacy Researcher, Vrije Universiteit Amsterdam

Abstract:
Radio Frequency Identification (RFID) tags are remotely-powered data carriers that augment physical objects with wireless computing abilities. This allows us to create smart homes and offices, optimize our supply chains, and keep a watchful eye on our pets, livestock, and kids. But unfortunately, RFID security and privacy issues have been addressed as an afterthought; it is regretfully easy to interfere with RFID systems, as many rely upon the integrity of RFID tag data for their correct functioning. To illustrate these problems, we have built a handheld device that performs RFID tag spoofing and selective RFID tag jamming (a bit like an “RFID firewall”). Compatible with the ISO 15693/14443 13.56 MHz RFID standards, our device is battery-powered and fits into a shirt pocket. This presentation will explain the “nuts and bolts” of RFID tag spoofing and jamming attacks, and will conclude with a live practical demonstration of these attacks.

You can download the full PDF presentation here.

You can download this fully from DEF CON 14 and read more on hacking RFID

Cloning the Verichip

Two presenters demonstrated the electronic equivalent of making a copy of an implanted RFID or radio frequency ID chip.The point was to show just how easy it is to fool a detection device that purports to uniquely identify any individual. You can read the article here.

For a demonstration on how to clone a Verichip, click here.

Rate this post