Introduction Our previous posting on Access Control Part 1: Magstripes Revisited, demonstrated the use and subversion of magstripe technology. RFID is our future, and unless implemented in a secure fashion – it to can be vulnerable to attack. Below we will walk through a valid attack methodology, including hardware and software, that can be used to subvert some RFID Access Control Systems. The organisations that tend to be vulnerable are…
Radio-frequency identification
Magstripes Revisited | Access Control – Part 1 | InteliSecure
Background You would think in this day and age that everyone would be using RFID for access control on their buildings / environment. You’ll be surprised that magstripes are still quite commonly in use. But unlike hotels (at least the reputable chains I’ve stayed at, I’ve always held onto the keycard and then analysed the keycard back at the office) which appear to encrypt their data, the access control mechanism…