Google AI Professional Certificate - Learn AI Skills That Get You Hired
Learn Backend Development Part-Time, Online
Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore the vulnerabilities in RFID access control systems through this revealing Black Hat conference talk. Discover how open-source hardware can be used to breach building security as speakers Eric Evenchick and Mark Baseggio demonstrate their improved techniques. Learn about the longstanding deficiencies in cards, readers, and backend systems that continue to plague access controls worldwide. Gain insights into a new open-source hardware device that exploits common communication protocols, allowing for circumvention of access controls, logging of access information, and cloning of RFID cards using Bluetooth LE and a smartphone or PC. Understand the implications of these security weaknesses and explore potential risk mitigation strategies for those relying on potentially insecure access control systems.
Syllabus
Breaking Access Controls With BLEKey
Taught by
Black Hat