Categories

DEFCON 20 – NFC Hacking: The Easy Way

Posted on Sunday, December 23rd, 2012 in open source, RF, software, Videos, wireless by the machinegeek


Eddie Lee, a security researcher at Blackwing Intelligence, gave this presentation at last Summer’s DEFCON 20 conference. His technique involves using NFCProxy, an open source software tool released at the conference to analyze 13.56 MHz RFID protocols and proxy transactions using Android phones. NFCProxy can view the wireless transmissions from the perspective of the tag or the PCD (proximity coupling device).

You obtain more information and download NFCProxy from the project’s Sourceforge page.

This entry was posted on Sunday, December 23rd, 2012 at 6:00 pm and is filed under open source, RF, software, Videos, wireless. You can follow any responses to this entry through the RSS 2.0 feed. You can skip to the end and leave a response. Pinging is currently not allowed.

Leave a Reply

Notify me of followup comments via e-mail. You can also subscribe without commenting.

Recent Comments

  • Pekka Akselin: This is ridiculous!? :-) We are back at 256(!) byte EPROMs that needed multiple, a handful, of voltages to run! :-(
  • KH: Let's try a back-of-envelope calc balancing energies. From MCP1700 datasheet, there are graphs for a 200mA load step. Estimate the energy shortfall as 12uJ. Say...
  • Daniel: It's been a week and my comment is still awaiting moderation. Apparently the CIA doesn't want their involvement known?
  • KH: Agree, so okay, I guess he must have learned from somewhere. 100nF and 1000uF is so far apart, that was jarring; it's more magic incantation...
  • Max: I have a suspicion the hefty electrolytic cap might be some sort of cargo cult carry-over from other RF-based projects - for instance, I've seen...