lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Tue Jun 27 13:41:00 2006
From: meder at o0o.nu (Meder Kydyraliev)
Subject: Sniffing RFID ID's ( Physical Security )


Hi Josh,

I have very little knowledge of RFID and how it works. But, I believe,
the answer to your question would depend on the type of card we are
talking about. If that's simple proximity card (the one that simply
sends serial number to the reader), then you can easily duplicate it,
see this for details: http://cq.cx/prox.pl By "easily" i mean you have
necessary gear or knowledge on how to build the device presented at the
URL. But a contactless smartcard , e.g. Sony Felica (used in southeast
asia for public transportation), which supposedly performs mutual
authentication and encryption (AES IIRC), could also be used for the
same purpose.

My 0.02 KGS

I assume you've seen: http://www.rfidanalysis.org/

Meder


On Tue, Jun 27, 2006 at 05:09:43PM +1000, Josh L. Perrymon wrote:
> To summarize the thread...
> 
> My question is:
> Is it possible to sniff the data from RFID access control cards and write
> the contents to a generic RFID card? Then use the copied RFID card to gain
> access inside the target building?
> 
> This is more just theory at this point.
> 
> I have read about encryption used for credit cards and the more recent uses
> for RFID.. but is any of this security built into your standard RFID access
> cards implementations?
> 
> Out of a couple hundred companies I have visited I only remember a handful
> that required an additional PIN to be entered. So if this is possible then
> companies may want to look at their current installation.
> 
> JP
> Packetfocus.com
> 
> On 6/27/06, Brate Sanders <brate_sanders@...oo.co.uk> wrote:
> >
> >
> >
> >----- Original Message ----
> >From: Josh L. Perrymon <joshuaperrymon@...il.com>
> >To: full-disclosure@...ts.grok.org.uk; dailydave@...ts.immunitysec.com
> >Sent: Tuesday, 27 June, 2006 9:41:23 AM
> >Subject: [Full-disclosure] Sniffing RFID ID's ( Physical Security )
> >
> >My ideas on RFID risk in its current implementation:
> >I'm thinking a lot of the risk with RFID would be within ID cards and
> >physical security. I have been in 100's of companies that use RFID ID cards
> >for physical security to access a building. Just rock up and swipe your
> >badge in front of the reader right???
> >
> >What if an attacker was sitting at the cafe downstairs sniffing RFID (
> >Well, sending out RFID signals to power the chips and get a response ).
> >Wouldn't it be trivial to obtain the STATIC ID codes stored on the RFID
> >chips and write them to a generic chip? THis new card could easily be used
> >to walk right in  to the target company? As we all know.. once your inside
> >it's trivial to root the entire network.  Just insert your usb/ CD with an
> >autorun backdoor sploit connecting outside OR plug in a small wireless AP.
> >
> >Go back down to the coffee shop and hack away.
> >
> >
> >
> >
> >I am sure RFID has a lot of issues and problems associated with it. But if
> >you can walk into a building do something and walk out to hack later, the
> >company has a lot of security issues it needs to handle before starting to
> >worry about securing their RFID access mechanism.
> >
> >There may be some scenarios where a bad design or implementation is
> >causing a problem or data loss/theft. But what specific problem have you
> >seen or are concerned about? Or at least care to share the reasons for your
> >concern?
> >
> >
> >

> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/

-- 
http://o0o.nu/~meder

Powered by blists - more mailing lists