Milliways

RFID Exploration Workshop

Hardware Hacking Village
RFID-like technologies are becoming pervasive, but traditionally have not been very open or experimenter-friendly. In the past few years, a growing variety of hardware and software tools have been enabling open-source experimenters to interact with contactless devices in a new way. In this workshop, we: - Show some common tag types and demonstrate ways of identifying them - Describe the very cheap/common Mifare Classic chip type and protocol - Crack the secret keys inside a Mifare Classic card, and clone the content onto a copied card - Have a cute, beepy badge reader to test cloned tags with; lights and sound will show you if your clone worked Participants will: - Learn some RFID basics, learn some UART (Serial Port) basics - (With the PN532 boards) Solder on through-hole header pins - Download and run open source software to control the hardware (works best on Linux; best-effort support for MacOS and Windows/WSL) - Crack the "secret" unknown keys of a provided card, dumping it to a file - Write the dump file to a new card, effectively cloning the original card No novel research or new information will be presented -- this workshop is aimed at empowering more people to interact and experiment with the devices that surround us. Seasoned RFID hackers are welcome to join in and hang out.
For the hardware used to connect computers with contactless devices, there are two types of kits available for participants to buy: - (~35 available; sliding scale €5,-€10,) USB-UART Board + NXP PN532 board (HF tag types) - (~2 available; sliding scale €30,-€50,) Proxmark3 Easy (HF + LF tag types) - (~20) Mifare Classic 1k Cards with the "secret" keys inside - (many/~100; €0,50) "Magic" Mifare Classic 1k Cards that can change their "unique" ID Participants should bring: - A computer: - running Linux (or able to run a Linux VM and pass through a USB Device) - with USB type A connectors - any RFID devices or cards you are curious about To borrow or experiment with during the workshop (but need to be returned at the end): - USB HF readers - Chameleon Mini - Chameleon Tiny

Additional information

Type Live Workshop
Language English

More sessions

8/15/23
Milliways
Hardware Hacking Village
In this 2h workshop, I will teach you to work with the tiny components that modern electronic devices are made of. We will assemble an electronic kitten, that purrs when touched correctly, and hisses when touched wrong. It will work, and is guaranteed to remove your fear of hand-assembling surface mount designs.
8/15/23
Milliways
Milliways
The session proposes a quick overview of Frida, a dynamic instrumentation framework, and how it can be used to enhance our work during the runtime analysis of a mobile application. It will be a walkthrough on how hooking and rewriting functions in runtime may be helpful against anti-reverse engineering measures and SSL pinning mechanisms.
8/15/23
Milliways
Milliways
Hardware FIDO U2F tokens are security devices which are meant to defend user second factor keys from physical and remote attacks. In this presentation different security features and implemented by FIDO U2F tokens and how they are meant to protect a user from various attack scenarios. We will focus on the open source implementation of FIDO U2F token developed and Common Criteria certified by Federal Office for Information Security (BSI). Having access not only to the source code of the token ...
8/15/23
Milliways
Milliways Workshop Dome
Come learn how to hack networks without needing to piss off your housemates, local coffee shop, or the Feds! Bring your laptop and by the end of this workshop, everyone can walk away having intercepted some packets and popped some reverse shells.
8/15/23
Milliways
Milliways
MITRE ATT&CK (Attack Framework among friends) is intimidating sight at first, but is a great tool for risk identification, threat analysis, red teaming, DFIR and security management. Brief introduction to the topic with various examples.
8/15/23
Milliways
Hardware Hacking Village
Solder your own pathlighter badge to illuminate your surroundings at night.
8/15/23
Milliways
Milliways
This talk will show you how many interfaces have to communicate in order to fly experiments on a sounding rocket. We will give you insights into the procedures and the complexity of a research campaign and the actual flight of the rocket itself. In particular, we look at the hardware and software used in the Ground Support Equipment (GSE) and the Service Module (SM) within the rocket.