Once the domain of high end apartment buildings, keyless entry door locks are now becoming a big deal. Power-glitch attacks have been used to circumvent limits on the number of incorrect password entries in password-protected devices, but RFID tags are particularly vulnerable to them, since they're charged by tag readers and have no onboard power supplies. When the chip's power source the external scanner is removed, the chip taps the 3.3-volt capacitors and completes as many operations as it can, then stores the data it's working on in the 1.5-volt cells. If that computation was an update of the secret key, it will complete the update before responding to a query from the scanner.
Because the chip has to charge capacitors and complete computations every time it powers on, it's somewhat slower than conventional RFID chips. But in tests, the researchers found that they could get readouts from their chips at a rate of 30 per second, which should be more than fast enough for most RFID applications. Result: With Barcoding's RFID solution, the food processor is able to accurately track its bins and optimally allocate them to meet the needs of each location. The hope is that they can get up and running quickly, even if they don't have an RFID or electrical engineering background.
Our goal is to make it easy for security professionals to re-create this tool so that they can perform RFID physical penetration tests and better demonstrate the risks posed by these technologies to their management. We used an Arduino microcontroller to weaponize a commercial RFID badge reader (the HID MaxiProx 5375 - bought on eBay) - effectively turning it into a custom, long-range RFID hacking tool. This involved the creation of a small, portable PCB (designed in Fritzing ) that can be inserted into almost any commercial RFID reader to steal badge info.
The tool steals badge information silently, and conveniently saves it to a text file () on a microSD card for later use such as badge cloning. The table below provides links to the 3 long range RFID readers sold by HID Global, that can be weaponized by the Tastic RFID Thief PCB. Note: The design was compiled and loaded onto the Arduino Nano v3.0 using the Arduino v1.0.1 software with the added sdfatlib (05Dec2011) library to handle the microSD card writing. The microchip stores information and is responsible for managing the radio frequency (RF) communication with the reader.
Several industry groups, including the International Standards Organization (ISO) and International Electrotechnical Commission (IEC), regulate and define RFID interoperability standards. Because some tags can be read from afar, it is possible for a rogue individual to carry a customized reader to scan a RFID-enabled passport and obtain holder information from a distance. Our RFID guest and staff key cards are made of the highest quality PVC plastic with superior printing. |