lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CBD71C9D-2700-463F-A01B-D53E9C682E63@recon.cx>
Date: Tue Jun 27 22:37:15 2006
From: hfortier at recon.cx (Hugo Fortier)
Subject: Sniffing RFID ID's ( Physical Security )

> There are a few different RFID companies that each have a unique  
> form of authentication based on top of existing standards.  For  
> example, at the place I'm working we use these cards from HID.  The  
> standards they run off of pretty interesting but it seems to me  
> that if you could gain enough data on a specific person's card then  
> you could replicate them.  Unfortunately there are a few problems.  
> 1) you said are worried that someone sitting downstairs in the  
> coffee shop could skim the transmissions?  the range is only about  
> 4-5 cm or so, I think someone's going to notice you running around  
> shoving a radio antenna near their waist.  The amount of power that  
> a skimmer would have to generate to get the data from a distance  
> would be enough to seriously damage the person holding it.  I could  
> be wrong on this though, Ilan Kirschenbaum and Avishai Wool from / 
> Tel Aviv University /are presenting a paper at this year's USENIX  
> Security Symposium in which they talk about building a low-cost,  
> high-range skimmer.
What limit the range of HID cards is the fact the card is powered by  
the reader, while the card is powered the signal sent can be read  
from a bigger range. So when you actually use the card with the  
legitimate reader, someone sniffing the signal would't need to be at  
4-5 cm...

Also you don't need to show your Antenna, you could easily hide this   
into a bag. I beleive elevator would be the best spot to go fish for  
Proximity card...	

In my opinion a good trick to protect yourself from people trying to  
power your HID card is to put 2 RFID Cards next to eatch other. If  
they get powered, both card signal will combine and cause a conflict.  
For this I base myself on the fact if you present 2 HID cards at the  
same time to a HID reader, access will not be granted, there might be  
some way to isolate the two signals so don't take this for granted.

> 2)  Encryption on top of the authentication.  The chips themselves  
> could be using a public key infrastructure just as Mike commented.   
> You would then have to be able to mimic a card reader and know it's  
> private keys.

While what you say is true, from my experience the most commonly  
installed system is the HID Prox card II and it's vulnerable to  
sniffing and reinjection. Note that HID also have a Smart Card base  
system but I have no experience with it and I have never saw it in  
production.

Jonathan Westhues did a very good presentation on RFID last year at  
Recon, you can get the slides and video there: http://2005.recon.cx/ 
recon2005/papers/Jonathan_Westhues/

Hugo
recon.cx

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ