HardwareAllTheThings/docs/protocols/rfid-nfc
Swissky e3b3caac12 NFC dictionnary attack and Vigik services 2024-08-24 13:04:15 +02:00
..
hf-mifare-classic.md NFC dictionnary attack and Vigik services 2024-08-24 13:04:15 +02:00
hf-mifare-desfire.md RFID pages 2024-07-31 22:26:35 +02:00
hf-mifare-ultralight.md RFID pages 2024-07-31 22:26:35 +02:00
hf-vigik.md NFC dictionnary attack and Vigik services 2024-08-24 13:04:15 +02:00
lf-hid-indala.md RFID pages 2024-07-31 22:26:35 +02:00
readme.md RFID pages 2024-07-31 22:26:35 +02:00

readme.md

NFC - RFID

Radio Frequency Identification (RFID) & Near Field Communication (NFC)

Notes about card types

High Frequency

Around 13.56 MHz.

  • MIFARE Classic 1K/4K: basically just a memory storage device. This memory, either 1024 or 4096 bytes, is divided into sectors and blocks. Most of the time used for regular access badges and has really simple security mechanisms for access control
  • MIFARE Ultralight: a 64 bytes version of MIFARE Classic. Its low costs make it widely used as disposable tickets for events or transportation.
  • MIFARE Plus: announced as a replacement of MIFARE Classic. The Plus subfamily brings the new level of security up to 128-bit AES encryption.
  • MIFARE DESFire: those tags come pre-programmed with a general purpose DESFire operating system which offers a simple directory structure and files, and are the type of MIFARE offering the highest security levels.

Low Frequency

Usually around 125 kHz.

  • HID
  • EM410X
  • Indala

Replay Attacks

Replay attack is a technique where a malicious user could implement a device to intercept a NFC transaction and redeem it later, using other device or even in different location.

Relay Attack

The relay attack is a technique where a malicious user implements a man in the middle attack. The attacker(APDUer) is capable to intercept, manipulate and change the transaction in real time to take advantage of it. https://en.wikipedia.org/wiki/Relay_attack

References