YoVDO

Breaking Access Controls With BLEKey

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Risk Mitigation Courses Security Vulnerabilities Courses Open Source Hardware Courses

Course Description

Overview

Explore the vulnerabilities in RFID access control systems through this revealing Black Hat conference talk. Discover how open-source hardware can be used to breach building security as speakers Eric Evenchick and Mark Baseggio demonstrate their improved techniques. Learn about the longstanding deficiencies in cards, readers, and backend systems that continue to plague access controls worldwide. Gain insights into a new open-source hardware device that exploits common communication protocols, allowing for circumvention of access controls, logging of access information, and cloning of RFID cards using Bluetooth LE and a smartphone or PC. Understand the implications of these security weaknesses and explore potential risk mitigation strategies for those relying on potentially insecure access control systems.

Syllabus

Breaking Access Controls With BLEKey


Taught by

Black Hat

Related Courses

How to Build a 3D Printer - The Ultimate Guide
Dr. D-Flo via YouTube
tinyML Trailblazers: Success Stories with Massimo Banzi - Arduino's Journey and Vision
tinyML via YouTube
Loading the SMARS Arduino Code
Kevin McAleer via YouTube
Wiring Up the SMARS Electronics
Kevin McAleer via YouTube
3D Print the SMARS Parts
Kevin McAleer via YouTube