filmov
tv
DEF CON 25 - Haoqi Shan, Jian Yuan - Man in the NFC
Показать описание
NFC (Near Field Communication) technology is widely used in security, bank, payment and personal information exchange fields now, which is highly well-developed. Corresponding, the attacking methods against NFC are also emerged in endlessly. To solve this problem, we built a hardware tool which we called "UniProxy". This tool contains two self-modified high frequency card readers and two radio transmitters, which is a master-slave way. The master part can help people easily and successfully read almost all ISO 14443A type cards, (no matter what kind of this card is, bank card, ID card, Passport, access card, or whatever. No matter what security protocol this card uses, as long as it meets the ISO 14443A standard) meanwhile replaying this card to corresponding legal card reader via slave part to achieve our "evil" goals. The master and slave communicate with radio transmitters and can be apart between 50 - 200 meters.
DEF CON 25 - Haoqi Shan, Jian Yuan - Man in the NFC
DEF CON 25 - Haoqi Shan & Jian Yuan - Man in the NFC
DEF CON 25 Packet Hacking Village - Eric Capuano - Go Beyond Tabletop Scenarios
DEF CON 25 - David Robinson - Using GPS Spoofing to control time
DEF CON 25 - Inbar Raz, Eden Shochat - From One Country, One Floppy to Startup Nation
DEF CON 25 - Cheng - The spear to break the security wall of S7CommPlus
DEF CON 25 - Matt Joyce - Amateur Digital Archeology
DEF CON 25 - Yuwue Zheng, Lin Huang - Ghost Telephonist Impersonates You Through LTE CSF
DEF CON 25 - Marina Simakov, Igal Gofman - Gaining persistency by abusing advanced authe
DEF CON 25 IoT Village - Aaron Guzman - Hide Yo Keys, Hide Yo Car
DEF CON 25 Packet Hacking Village - Michael Gianarakis ,Keith Lee - Portia
DEF CON 25 Rootz Asylum - Rsnake Robert Hansen - Searching The Invisible Internet
DEF CON 25 Recon Village - Dakota Nelson -Total Recoll
DEF CON 25 Rootz Asylum - Aron Rosenberg, Aaron Standridge - Hacking an Insecure WiFi Camera
DEF CON 25 - Dor Azouri - BITSInject
DEF CON 25 - Chaosdata - Ghost in the Droid: Possessing Android Applications with ParaSpectre
IoT Village Hacks Smart Devices at DEFCON 25
DEF CON 25 - Vasilios Mavroudis, Dan Cvrcek - Trojan tolerant Hardware & Supply Chain Security
DEF CON 25 BioHacking Village - Tess Schrodinger - Total Recall: Implicit Learning As Crypto
DEF CON 25 SE Village - Robert Wood - Thematic Social Engineering
DEF CON 25 - Mickey Shkatov, Jesse Michael, Oleksandr Bazhaniuk - Driving down the rabbit hole
DEF CON 25 Rootz Asylum - EFF, Nic0 - Opening Ceremonies:A Place Where Kids Learn White Hat Hacking
DEF CON 25 Car Hacking Village - Jeffrey Quesnelle - An Introduction to AUTOSAR Secure Onboard
DEF CON 25 - Whitney Merrill, Terrell McSweeny - Tick, Tick, Tick Boom You're Dead: Tech & ...
Комментарии