What is RFID, RFID Attacks

GhostWins

Katılımcı Üye
29 Şub 2020
538
575
turk_hack_team_.gif


Hello TurkHackTeam family, welcome to the topic titled What is RFID, RFID Attacks, I will explain them as I can. Good Forums
What is RFID?



RFID is a reading system. RFID is a very popular tool, it is software that works thanks to radio waves. It is especially used in systems such as personnel entry and exit cards. The main purpose of RFID is to provide fast authentication over the air. There are quite expensive and advanced models as well as cheap and economical models. In order for RFID to work, the device to be read must have a barcode to be saved in the database.



jax2s0i.png



How Does RFID Work?

For RFID to work, it must be (RFID+Object with Reader). The system administrator who makes these definitions should make the definitions correctly, especially if there are more than 10 (turnstile or reader) systems in the institution or company, all cards should be classified and authorized one by one according to personnel and authority. Otherwise, unauthorized access may occur.




lzw0e3q.png


Areas Where RFID is Used


1-) Inventory Management

2-) Asset Tracking

3-) Personal Tracking

4-) Supply Chain Management

5-) Controlling Access to Restricted Areas




6d4mmjg.png




What are the types of RFID Attack?


As All Kinds of Device Attacks, RFID also has attacks, although they are not very common, there are methods. A large amount of knowledge is required to perform most of these attacks.




1-) Reverse Engineering Attacks



The target in this type of attack is to copy the card. To Copy the Card, attackers use rfid copying devices, as these devices are on the black market, most attackers prefer to make their own. In this type of attack, the target is to copy a high-access personnel card or credit card. The card is copied and the same is removed. In order to be protected from such attacks, the card should be stored in high places (jacket pocket, coat pocket).

sr91dg9.png




2-) Power Analysis Attacks

The aim of this attack is to steal information from attacker target attackers from killing (vulnerability) from an attacker's mobile phone.

j51867s.png




3-) Listening and Attack

One of the most difficult and challenging methods is to use the RFID reader in the target institution as a listener.



rsbg6t1.png





4-) Denial of Service and attack



The purpose of this type of attack is to corrupt the reader. In order to corrupt the reader, radio frequencies are arranged so that the reader is out of service, and if the attacker moves forward, even rfid barcodes can be deleted.



hu0l31x.png


5-) Man in the Middle Attack


The purpose of attacks on the web is the same. The attacker sends false signals between the rifd and the reader. The purpose of this attack is to steal data. As the attacker steals data, it sends straight signals to the reader. The purpose is to hide the attack.


hl0kuf5.png






turk_hack_team_.gif


have a nice day
 

'The Wolf

Kıdemli Üye
22 Nis 2021
4,043
2,565
Tanrı dağı
turk_hack_team_.gif


Hello TurkHackTeam family, welcome to the topic titled What is RFID, RFID Attacks, I will explain them as I can. Good Forums
What is RFID?



RFID is a reading system. RFID is a very popular tool, it is software that works thanks to radio waves. It is especially used in systems such as personnel entry and exit cards. The main purpose of RFID is to provide fast authentication over the air. There are quite expensive and advanced models as well as cheap and economical models. In order for RFID to work, the device to be read must have a barcode to be saved in the database.


jax2s0i.png



How Does RFID Work?

For RFID to work, it must be (RFID+Object with Reader). The system administrator who makes these definitions should make the definitions correctly, especially if there are more than 10 (turnstile or reader) systems in the institution or company, all cards should be classified and authorized one by one according to personnel and authority. Otherwise, unauthorized access may occur.




lzw0e3q.png


Areas Where RFID is Used


1-) Inventory Management

2-) Asset Tracking

3-) Personal Tracking

4-) Supply Chain Management

5-) Controlling Access to Restricted Areas




6d4mmjg.png




What are the types of RFID Attack?


As All Kinds of Device Attacks, RFID also has attacks, although they are not very common, there are methods. A large amount of knowledge is required to perform most of these attacks.




1-) Reverse Engineering Attacks



The target in this type of attack is to copy the card. To Copy the Card, attackers use rfid copying devices, as these devices are on the black market, most attackers prefer to make their own. In this type of attack, the target is to copy a high-access personnel card or credit card. The card is copied and the same is removed. In order to be protected from such attacks, the card should be stored in high places (jacket pocket, coat pocket).

sr91dg9.png




2-) Power Analysis Attacks

The aim of this attack is to steal information from attacker target attackers from killing (vulnerability) from an attacker's mobile phone.

j51867s.png




3-) Listening and Attack

One of the most difficult and challenging methods is to use the RFID reader in the target institution as a listener.



rsbg6t1.png





4-) Denial of Service and attack



The purpose of this type of attack is to corrupt the reader. In order to corrupt the reader, radio frequencies are arranged so that the reader is out of service, and if the attacker moves forward, even rfid barcodes can be deleted.



hu0l31x.png


5-) Man in the Middle Attack


The purpose of attacks on the web is the same. The attacker sends false signals between the rifd and the reader. The purpose of this attack is to steal data. As the attacker steals data, it sends straight signals to the reader. The purpose is to hide the attack.


hl0kuf5.png






turk_hack_team_.gif


have a nice day
Nice topic, good job.
 
Üst

Turkhackteam.org internet sitesi 5651 sayılı kanun’un 2. maddesinin 1. fıkrasının m) bendi ile aynı kanunun 5. maddesi kapsamında "Yer Sağlayıcı" konumundadır. İçerikler ön onay olmaksızın tamamen kullanıcılar tarafından oluşturulmaktadır. Turkhackteam.org; Yer sağlayıcı olarak, kullanıcılar tarafından oluşturulan içeriği ya da hukuka aykırı paylaşımı kontrol etmekle ya da araştırmakla yükümlü değildir. Türkhackteam saldırı timleri Türk sitelerine hiçbir zararlı faaliyette bulunmaz. Türkhackteam üyelerinin yaptığı bireysel hack faaliyetlerinden Türkhackteam sorumlu değildir. Sitelerinize Türkhackteam ismi kullanılarak hack faaliyetinde bulunulursa, site-sunucu erişim loglarından bu faaliyeti gerçekleştiren ip adresini tespit edip diğer kanıtlarla birlikte savcılığa suç duyurusunda bulununuz.