RFID: Soup to Nuts
- Adam Laurie
This course will cover everything from basic theory of how RFID works 'under the hood', to actual use cases and current exploits and tools.
Pre-requisite of Training Class:
Student
- Anyone interested in RFID, whether they have a basic knowledge or none at all, will come away with a better understanding of how this stuff really works, and useful 'hands-on' experience of RFID hacking.
Hardware
- Students should bring a laptop with USB and DVD drive. Most tools work best under Linux, but many are multi-platform so can be run under Windows or Mac. RFID readers, example cards and other devices will be provided.
Software
- Students should be prepared to install drivers and/or software, or to run a pre-packaged distribution such as Kali.
Class Outline
Schedule: 2 Days (09:00-18:00)
Topics Covered:
LF (125/134 kHz) theory & practice:
- Modulation schemes
- Tag types
- Reading
- Writing
- Emulating
- Cracking
HF (13.56 MHz) theory & practice:
- Modulation schemes
- Tag types
- Reading
- Writing
- Emulating
- Cracking
RFID crypto: Some worked examples of implementations and where they went wrong. e.g. Passports, DESFire Access Control, Mifare payments, Hitag2 vehicle keys.


























