Attacking Proximity Card Access Systems by Brad Antoniewicz at ShmooCon 2012

From the card to the backend database, proximity card access systems contain a variety of components, all which are vulnerable to attack but have been rarely targeted. This demo-driven presentation explores and attacks each of the various components (RFID tags, controllers, and backend systems) of a popular deployment configuration.

Brad Antoniewicz works in Foundstone’s security research division to uncover flaws in popular technologies. He is a contributing author to both the Hacking Exposed and Hacking Exposed: Wireless series of books and has authored various internal/external Foundstone tools, whitepapers, and methodologies.

1 reply

Leave a Reply

Want to join the discussion?
Feel free to contribute!

Leave a Reply to dfskj Cancel reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.