![]() The PCB can be inserted into any RFID reader that supports the standard Wiegand DATA0/DATA1 output (which is pretty much all of them). Alternatively, the PCB could even be used to weaponize a high frequency (13.56MHz) RFID reader, such as the iClass R90 Long Range reader. Note, this PCB can alternatively be inserted into an Indala reader for testing Indala Prox deployments (e.g. This involved the creation of a small, portable PCB (designed in Fritzing) that can be inserted into almost any commercial RFID reader to steal badge info. ![]() We used an Arduino microcontroller to weaponize a commercial RFID badge reader (the HID MaxiProx 5375AGN00 – bought on Ebay) – effectively turning it into a custom, long-range RFID hacking tool. The hope is that they can get up and running quickly, even if they don’t have an RFID or electrical engineering background. ![]() Our goal is to make it easy for security professionals to re-create this tool so that they can perform RFID physical penetration tests and better demonstrate the risks posed by these technologies to their management. ![]() Specifically, it is targeting 125KHz, low frequency RFID badge systems used for physical security, such as those used in HID Prox and Indala Prox products. The Tastic RFID Thief is a silent, long-range RFID reader that can steal the proximity badge information from an unsuspecting employee as they physically walk near this concealed device.
0 Comments
Leave a Reply. |