Confidence 2018: NFC research toolkit

NFC hackme challenges, and 'A 2018 practical guide to hacking RFID/NFC' talk

Sławomir Jasek

9 minute read

During upcoming Confidence conference in Krakow, we will celebrate 15 years of SecuRing. On this occasion the we will share with you several NFC “research toolkits” hardware sets - that among other things allow to clone card UID and crack Mifare Classic. Come meet us at our booth and solve the NFC challenges to win one!

Also be sure to attend my introductory talk on NFC security “A 2018 practical guide to hacking RFID/NFC” track 1 Jun 4th 11:50am.

Update: slides are available to download here.

HackInParis 2018 training

Smart lockpicking - hands-on exploiting flaws in IoT devices based on electronic locks and access control systems

Paris

HackInParis

You can, quite reasonably, expect smart locks and access control systems to be free from alarming security vulnerabilities - such a common issue for an average IoT device. Well, this training will prove you wrong. After performing multiple hands-on exercises with a dozen of real devices and various technologies, you will never look at the devices the same way. During this course students will perform: wireless sniffing, spoofing, cloning, replay, DoS, authentication and command-injection attacks.

Sławomir Jasek

20 minute read

Behold The Smart Lock! In case anyone would doubt its smartness, it is literally imprinted. Fitted with an enormously loud speaker - advertised as a feature to raise a solid anti-thief alarm. Using the same speaker for a normal unlock notification, thus enforcing you to cover your ears while opening, was not the smartest idea though. Security? Smart my shiny metal (…)!

Enough smart for the introduction. Give me the meat! TLDR exploit.