O
2.9-C/3
RFID hacking
RFID hacking | |
---|---|
Weblink for assembly | |
Description: | We have RFID hardware and software to read nearly all the cards you have in your pocket. So we can at least determine the typ of the card and can say something about its security. Depending on the type we also can readout or change the content. We also will have a zapper for disabling your RFID cards. |
Parts of assembly | Yuvadm |
Organizational information | |
Orga contact | starbugURIs of the form "starbug" are not allowed. |
Area | 1a |
Things we bring | a setup to read and write RFID cards.
a zapper to destroy RFID cards. |
Local workshops/lectures | maybe |
Planned workshop/lectures | we could talk about the security of RFID systems. show people how to read, write and physically disable their cards. |
Member seats | 6 |
Lecture seats | 2 |
Power consumption | just some notebooks |
Planning notes | we need 2 tables with 6 seats for our group and one additional table with 2 seats for people coming to play with our RFID setup. |
Other Assemblies | |
We have RFID hardware and software to read nearly all the cards you have in your pocket. So we can at least determine the typ of the card and can say something about its security. Depending on the type we also can readout or change the content. We also will have a zapper for disabling your RFID cards.