diff --git a/docs/protocols/rfid-nfc/mifare-classic.md b/docs/protocols/rfid-nfc/hf-mifare-classic.md similarity index 100% rename from docs/protocols/rfid-nfc/mifare-classic.md rename to docs/protocols/rfid-nfc/hf-mifare-classic.md diff --git a/docs/protocols/rfid-nfc/mifare-desfire.md b/docs/protocols/rfid-nfc/hf-mifare-desfire.md similarity index 100% rename from docs/protocols/rfid-nfc/mifare-desfire.md rename to docs/protocols/rfid-nfc/hf-mifare-desfire.md diff --git a/docs/protocols/rfid-nfc/mifare-ultralight.md b/docs/protocols/rfid-nfc/hf-mifare-ultralight.md similarity index 100% rename from docs/protocols/rfid-nfc/mifare-ultralight.md rename to docs/protocols/rfid-nfc/hf-mifare-ultralight.md diff --git a/docs/protocols/rfid-nfc/vigik.md b/docs/protocols/rfid-nfc/hf-vigik.md similarity index 100% rename from docs/protocols/rfid-nfc/vigik.md rename to docs/protocols/rfid-nfc/hf-vigik.md diff --git a/docs/protocols/rfid-nfc/hid-indala.md b/docs/protocols/rfid-nfc/lf-hid-indala.md similarity index 100% rename from docs/protocols/rfid-nfc/hid-indala.md rename to docs/protocols/rfid-nfc/lf-hid-indala.md diff --git a/docs/protocols/rfid-nfc/readme.md b/docs/protocols/rfid-nfc/readme.md index 96c332a..14ad0d2 100644 --- a/docs/protocols/rfid-nfc/readme.md +++ b/docs/protocols/rfid-nfc/readme.md @@ -4,12 +4,38 @@ ## Notes about card types +### High Frequency + +Around 13.56 MHz. + * **MIFARE Classic 1K/4K**: basically just a memory storage device. This memory, either 1024 or 4096 bytes, is divided into sectors and blocks. Most of the time used for regular access badges and has really simple security mechanisms for access control * **MIFARE Ultralight**: a 64 bytes version of MIFARE Classic. It’s low costs make it widely used as disposable tickets for events or transportation. * **MIFARE Plus**: announced as a replacement of MIFARE Classic. The Plus subfamily brings the new level of security up to 128-bit AES encryption. * **MIFARE DESFire**: those tags come pre-programmed with a general purpose DESFire operating system which offers a simple directory structure and files, and are the type of MIFARE offering the highest security levels. +### Low Frequency + +Usually around 125 kHz. + +* HID +* EM410X +* Indala + + +## Replay Attacks + +Replay attack is a technique where a malicious user could implement a device to intercept a NFC transaction and redeem it later, using other device or even in different location. + + +## Relay Attack + +The relay attack is a technique where a malicious user implements a man in the middle attack. The attacker(APDUer) is capable to intercept, manipulate and change the transaction in real time to take advantage of it. [https://en.wikipedia.org/wiki/Relay_attack](https://en.wikipedia.org/wiki/Relay_attack) + +* NFC Payment Relay Attacks - [intro-to-nfc-payment-relay-attacks/](https://salmg.net/2018/12/01/intro-to-nfc-payment-relay-attacks/) +* NFCopy85 is a 10 dollars device to make replay attacks against NFC payment systems - [nfcopy85](https://salmg.net/2019/06/16/nfcopy85/) + + ## References * [RFID Hacking with The Proxmark 3 - Kevin Chung - May 29, 2017](https://blog.kchung.co/rfid-hacking-with-the-proxmark-3/) diff --git a/docs/protocols/rfid-nfc/relay-replay.md b/docs/protocols/rfid-nfc/relay-replay.md deleted file mode 100644 index f98eadc..0000000 --- a/docs/protocols/rfid-nfc/relay-replay.md +++ /dev/null @@ -1,18 +0,0 @@ -# Relay & Replay - -## Replay Attacks - -Replay attack is a technique where a malicious user could implement a device to intercept a NFC transaction and redeem it later, using other device or even in different location. - - -## Relay Attack - -The relay attack is a technique where a malicious user implements a man in the middle attack. The attacker(APDUer) is capable to intercept, manipulate and change the transaction in real time to take advantage of it. [https://en.wikipedia.org/wiki/Relay_attack](https://en.wikipedia.org/wiki/Relay_attack) - -* NFC Payment Relay Attacks - [intro-to-nfc-payment-relay-attacks/](https://salmg.net/2018/12/01/intro-to-nfc-payment-relay-attacks/) -* NFCopy85 is a 10 dollars device to make replay attacks against NFC payment systems - [nfcopy85](https://salmg.net/2019/06/16/nfcopy85/) - - -## References - -* []() \ No newline at end of file