e3b3caac12 | ||
---|---|---|
.. | ||
hf-mifare-classic.md | ||
hf-mifare-desfire.md | ||
hf-mifare-ultralight.md | ||
hf-vigik.md | ||
lf-hid-indala.md | ||
readme.md |
readme.md
NFC - RFID
Radio Frequency Identification (RFID) & Near Field Communication (NFC)
Notes about card types
High Frequency
Around 13.56 MHz.
- MIFARE Classic 1K/4K: basically just a memory storage device. This memory, either 1024 or 4096 bytes, is divided into sectors and blocks. Most of the time used for regular access badges and has really simple security mechanisms for access control
- MIFARE Ultralight: a 64 bytes version of MIFARE Classic. It’s low costs make it widely used as disposable tickets for events or transportation.
- MIFARE Plus: announced as a replacement of MIFARE Classic. The Plus subfamily brings the new level of security up to 128-bit AES encryption.
- MIFARE DESFire: those tags come pre-programmed with a general purpose DESFire operating system which offers a simple directory structure and files, and are the type of MIFARE offering the highest security levels.
Low Frequency
Usually around 125 kHz.
- HID
- EM410X
- Indala
Replay Attacks
Replay attack is a technique where a malicious user could implement a device to intercept a NFC transaction and redeem it later, using other device or even in different location.
Relay Attack
The relay attack is a technique where a malicious user implements a man in the middle attack. The attacker(APDUer) is capable to intercept, manipulate and change the transaction in real time to take advantage of it. https://en.wikipedia.org/wiki/Relay_attack
- NFC Payment Relay Attacks - intro-to-nfc-payment-relay-attacks/
- NFCopy85 is a 10 dollars device to make replay attacks against NFC payment systems - nfcopy85