Breaking Access Controls With BLEKey
Offered By: Black Hat via YouTube
Course Description
Overview
Explore the vulnerabilities in RFID access control systems through this revealing Black Hat conference talk. Discover how open-source hardware can be used to breach building security as speakers Eric Evenchick and Mark Baseggio demonstrate their improved techniques. Learn about the longstanding deficiencies in cards, readers, and backend systems that continue to plague access controls worldwide. Gain insights into a new open-source hardware device that exploits common communication protocols, allowing for circumvention of access controls, logging of access information, and cloning of RFID cards using Bluetooth LE and a smartphone or PC. Understand the implications of these security weaknesses and explore potential risk mitigation strategies for those relying on potentially insecure access control systems.
Syllabus
Breaking Access Controls With BLEKey
Taught by
Black Hat
Related Courses
Attack on Titan M, Reloaded - Vulnerability Research on a Modern Security ChipBlack Hat via YouTube Attacks From a New Front Door in 4G & 5G Mobile Networks
Black Hat via YouTube AAD Joined Machines - The New Lateral Movement
Black Hat via YouTube Better Privacy Through Offense - How to Build a Privacy Red Team
Black Hat via YouTube Whip the Whisperer - Simulating Side Channel Leakage
Black Hat via YouTube