YoVDO

Breaking Access Controls With BLEKey

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Risk Mitigation Courses Security Vulnerabilities Courses Open Source Hardware Courses

Course Description

Overview

Explore the vulnerabilities in RFID access control systems through this revealing Black Hat conference talk. Discover how open-source hardware can be used to breach building security as speakers Eric Evenchick and Mark Baseggio demonstrate their improved techniques. Learn about the longstanding deficiencies in cards, readers, and backend systems that continue to plague access controls worldwide. Gain insights into a new open-source hardware device that exploits common communication protocols, allowing for circumvention of access controls, logging of access information, and cloning of RFID cards using Bluetooth LE and a smartphone or PC. Understand the implications of these security weaknesses and explore potential risk mitigation strategies for those relying on potentially insecure access control systems.

Syllabus

Breaking Access Controls With BLEKey


Taught by

Black Hat

Related Courses

The Location Advantage
Esri via Independent
Secure Android App Development
University of Southampton via FutureLearn
Cloud Computing Security
University System of Maryland via edX
Evaluación de peligros y riesgos por fenómenos naturales
Universidad Nacional Autónoma de México via Coursera
المدافعون عن حقوق الإنسان
Amnesty International via edX