YoVDO

MiLazyCracker

Offered By: Recon Conference via YouTube

Tags

REcon Conference Courses Hardware Hacking Courses

Course Description

Overview

Explore a powerful tool for cracking Mifare Classic and Mifare Plus smart cards in this 17-minute conference talk from RECON 2017 Brussels. Discover how Kevin Larson, a Computer Science Masters student, combines code from Proxmark3 and LibNFC to create miLazyCracker, a user-friendly script that works with an affordable $30 USB reader. Learn how this tool simplifies the process of determining card vulnerability, selecting appropriate attacks, and dumping card data for cloning purposes. Gain insights into the potential security risks associated with easily cloneable smart cards and understand the importance of moving away from vulnerable Mifare technologies. Delve into the world of smart card security, wireless technologies, and hardware hacking as presented by an experienced embedded systems researcher with a passion for cybersecurity.

Syllabus

recon 2017 Brussels - miLazyCracker by Kevin Larson


Taught by

Recon Conference

Related Courses

Harnessing Intel Processor Trace on Windows for Fuzz
Recon Conference via YouTube
Reverse Engineering Satellite Based IP Content Distribution
Recon Conference via YouTube
Reverse Engineering Windows Defender's JavaScript Engine
Recon Conference via YouTube
DIY ARM Debugger for Wi-Fi Chips
Recon Conference via YouTube
Subverting Your Server Through Its BMC - The HPE iLO4 Case
Recon Conference via YouTube