YoVDO

Don't Stand So Close To Me - An Analysis of the NFC Attack Surface

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Cybersecurity Courses Mobile Device Security Courses NFC Technology Courses

Course Description

Overview

Explore the security implications of Near Field Communication (NFC) technology in mobile devices through this Black Hat USA 2012 conference talk. Delve into the NFC protocol stack, learn fuzzing techniques for two devices, and discover the potential vulnerabilities in software built on top of NFC. Examine how technologies like Android Beam and NDEF content sharing can be exploited to parse various file types without user interaction. Uncover the possibility of complete phone takeover via NFC, including theft of personal data and unauthorized actions. Gain insights into the NFC attack surface, from low-level waveforms to high-level code vulnerabilities, and understand the risks associated with this emerging payment technology. Follow along as the speaker demonstrates real-world exploits, including a Word document heap overflow and Bluetooth pairing manipulation, highlighting the importance of security awareness in NFC-enabled devices.

Syllabus

Introduction
Slides
Who am I
Agenda
Why NFC
Motivation
Scanning Badges
Similar Work
NFC Overview
Todd Manning
Card Keys
NFC Tag
Active vs Passive
Specifications
Low Level
Waveforms
initialization anticollision activation
Typical flow
P2P communication
Data flow
Transport endpoint
Data exchange format
Data capture
Data analysis
Data breakdown
nmc parsing
test case generation
smart flushing
generating test cases
MC card reader
From scratch
Speed
Methods
FOC
LCP
Troubleshooting
Checking for crashes
Sending a buzzed tag to the phone
A pleasure working
The other was like
what did I find
Native code crashes
Native code freeze
Ice Cream Sandwich
Other Crashes
High Level Code
Android Beam
Multiple Apps
AndroidBeam
AndroidManifest
Browser
Backup Video
Nokia Content Sharing
Nokia Bluetooth Off
How to write an exploit
Finding my zero days
Word document heap overflow
Bluetooth pairing
Speaker demo
Summary
Code
Outro


Taught by

Black Hat

Related Courses

Security Principles
(ISC)² via Coursera
A Strategic Approach to Cybersecurity
University of Maryland, College Park via Coursera
FinTech for Finance and Business Leaders
ACCA via edX
Access Control Concepts
(ISC)² via Coursera
Access Controls
(ISC)² via Coursera