Cracking HiTag2 Crypto - Detailed Look at the Academic Attacks
Offered By: 44CON Information Security Conference via YouTube
Course Description
Overview
Dive deep into the world of RFID hacking with this comprehensive workshop on cracking HiTag2 crypto, presented by Kevin Sheldrake at 44CON 2017. Explore the intricacies of HiTag2 RFID technology, including its 2-way authentication and encryption protocols. Learn about three powerful attacks on the HiTag2 encryption system, originally developed by academic researchers. Discover how to implement these attacks using RFIDler and desktop computers, including nonce replay for accessing readable tag pages, and time/memory trade-off brute force and cryptanalytic attacks for recovering keys and accessing read-protected pages. Witness practical demonstrations of weaponized attacks that enable tag cloning. Note that viewing the prerequisite talk "Cracking HiTag2 Crypto – Weaponising Academic Attacks for Breaking and Entering" is recommended before watching this workshop.
Syllabus
Cracking HiTag2 Crypto - Kevin Sheldrake at 44CON 2017 - Workshop
Taught by
44CON Information Security Conference
Related Courses
Supply Chain Unchained - How To Be A Bad SaaS44CON Information Security Conference via YouTube Aviation Security 101
44CON Information Security Conference via YouTube The Anti-Checklist Manifesto
44CON Information Security Conference via YouTube Why Are We Still Doing Authentication Wrong?
44CON Information Security Conference via YouTube What Do Hackers See When They Look at the Clouds
44CON Information Security Conference via YouTube