YoVDO

Cracking HiTag2 Crypto - Detailed Look at the Academic Attacks

Offered By: 44CON Information Security Conference via YouTube

Tags

44CON Courses Cybersecurity Courses Ethical Hacking Courses Encryption Courses Cryptanalysis Courses Brute-Force Attacks Courses RFID Technology Courses

Course Description

Overview

Dive deep into the world of RFID hacking with this comprehensive workshop on cracking HiTag2 crypto, presented by Kevin Sheldrake at 44CON 2017. Explore the intricacies of HiTag2 RFID technology, including its 2-way authentication and encryption protocols. Learn about three powerful attacks on the HiTag2 encryption system, originally developed by academic researchers. Discover how to implement these attacks using RFIDler and desktop computers, including nonce replay for accessing readable tag pages, and time/memory trade-off brute force and cryptanalytic attacks for recovering keys and accessing read-protected pages. Witness practical demonstrations of weaponized attacks that enable tag cloning. Note that viewing the prerequisite talk "Cracking HiTag2 Crypto – Weaponising Academic Attacks for Breaking and Entering" is recommended before watching this workshop.

Syllabus

Cracking HiTag2 Crypto - Kevin Sheldrake at 44CON 2017 - Workshop


Taught by

44CON Information Security Conference

Related Courses

IT: device to device communication
The Open University via OpenLearn
Secure Bluetooth Pairing Made Easy With ST25 NFC - Webinar Replay
STMicroelectronics via YouTube
Raspberry Pi meets Arduino
Udemy
Floppy Disk Console Escape Room Puzzle Tutorial with ESP32 and RFID
Playful Technology via YouTube
Long-Range RFID Vicinity Sensor Christmas Escape Room Puzzle Tutorial Using PN5180 and ESP32
Playful Technology via YouTube