Attacking Proximity Card Access Systems presented at Infiltrate 2012

by Brad Antoniewicz,

Tags: Security

Summary : From the card to the backend database, proximity card access systems contain a variety of components all which are vulnerable to attack but have been rarely targeted. This demo-driven presentation explores and attacks each of the various components (RFID tags, controllers, and backend systems) of a popular deployment configuration.