Mifare Attacks | Access Control – Part 2 | InteliSecure

Introduction Our previous posting on Access Control Part 1: Magstripes Revisited, demonstrated the use and subversion of magstripe technology. RFID is our future, and unless implemented in a secure fashion – it to can be vulnerable to attack. Below we will walk through a valid attack methodology, including hardware and software, that can be used to subvert some RFID Access Control Systems. The organisations that tend to be vulnerable are…

Magstripes Revisited | Access Control – Part 1 | InteliSecure

Background You would think in this day and age that everyone would be using RFID for access control on their buildings / environment. You’ll be surprised that magstripes are still quite commonly in use. But unlike hotels (at least the reputable chains I’ve stayed at, I’ve always held onto the keycard and then analysed the keycard back at the office) which appear to encrypt their data, the access control mechanism…