Mifare Attacks | Access Control – Part 2 | InteliSecure

Introduction Our previous posting on Access Control Part 1: Magstripes Revisited, demonstrated the use and subversion of magstripe technology. RFID is our future, and unless implemented in a secure fashion – it to can be vulnerable to attack. Below we will walk through a valid attack methodology, including hardware and software, that can be used to subvert some RFID Access Control Systems. The organisations that tend to be vulnerable are…