All Your Badge Are Belong to Us - Vulnerabilities in RFID Access Control Systems
Offered By: BSidesLV via YouTube
Course Description
Overview
Explore the vulnerabilities of RFID-based access control systems in this 43-minute conference talk from BSidesLV. Gain insight into how adversaries can exploit common security flaws through eavesdropping, cloning, and manipulation. Learn from real-life physical penetration test examples that demonstrate the severe practical risks posed by these theoretical vulnerabilities. Understand why outdated and insecure access control systems continue to be installed despite known issues. Discover key considerations for purchasing new access control solutions. By the end of the talk, acquire a comprehensive understanding of the most prevalent vulnerabilities in RFID-based access control systems and their potential consequences.
Syllabus
PasswordsCon, Wed, Aug 7, 20:00 - Wed, Aug 7, CDT
Taught by
BSidesLV
Related Courses
Network SecurityGeorgia Institute of Technology via Udacity Proactive Computer Security
University of Colorado System via Coursera Identifying, Monitoring, and Analyzing Risk and Incident Response and Recovery
(ISC)² via Coursera Hacker101
HackerOne via Independent CNIT 127: Exploit Development
CNIT - City College of San Francisco via Independent