»Card cloning doesn't have to be hard.«
2019-11-09, 17:00–17:25, Blue Day

I’ve created an open source web interface to the Proxmark3-rdv4 hardware that makes it easy for anyone to work with the tools. I do a quick overview of technologies, and a live demo of the tool.

Many people use low-frequency and hi-frequency cards to control access to their offices, datacenters, and even hardware devices. I’ve created an open source web interface for the Proxmark3-rdv4 hardware that makes it easy for anyone to work with the tools. This could be easily deployed to something like a Raspberry Pi zero, and then any mobile device with a web browser can talk with it, making this a mobile tool for pentesting projects. I will do a quick overview of the common types of access cards, and how you can easily clone some of these cards or even run brute force attacks against the readers. I will have a demo set up for people to check out the software/hardware and can do some real-time badge cloning in the space after the talk.