Breaking Access Controls With BLEKey
Offered By: Black Hat via YouTube
Course Description
Overview
Explore the vulnerabilities in RFID access control systems through this revealing Black Hat conference talk. Discover how open-source hardware can be used to breach building security as speakers Eric Evenchick and Mark Baseggio demonstrate their improved techniques. Learn about the longstanding deficiencies in cards, readers, and backend systems that continue to plague access controls worldwide. Gain insights into a new open-source hardware device that exploits common communication protocols, allowing for circumvention of access controls, logging of access information, and cloning of RFID cards using Bluetooth LE and a smartphone or PC. Understand the implications of these security weaknesses and explore potential risk mitigation strategies for those relying on potentially insecure access control systems.
Syllabus
Breaking Access Controls With BLEKey
Taught by
Black Hat
Related Courses
The Location AdvantageEsri via Independent Secure Android App Development
University of Southampton via FutureLearn Cloud Computing Security
University System of Maryland via edX Evaluación de peligros y riesgos por fenómenos naturales
Universidad Nacional Autónoma de México via Coursera المدافعون عن حقوق الإنسان
Amnesty International via edX