Tag-side attacks against NFC

DEF CON 27

Presented by: Christopher Wade
Date: Saturday August 10, 2019
Time: 13:00 - 13:45
Location: Track 3

This talk covers tag-side attacks against NFC communication protocols, including cracking of Mifare encryption keys and performing targeted attacks against NFC readers. In addition, it will cover the design and creation of devices capable of emulating NFC tags down to the raw protocol using standard components and tools, with no abstraction to dedicated hardware, covering and expanding on the capabilities of available products. This talk will contain how 13.56MHz NFC works at a raw level, how tools can be built for analysing it, how the protocol can be implemented in full on standard Microcontrollers, and the security weaknesses present in its design.

Christopher Wade

Chris is a seasoned security researcher and testing consultant. His main focuses are in reverse engineering hardware, fingerprinting USB vulnerabilities and playing with Software Defined Radios, with his key strength lying in firmware analysis, which he utilises as part of the hardware testing team at Pen Test Partners. Twitter: @Iskuri1 Github: https://github.com/Iskuri


KhanFu - Mobile schedules for INFOSEC conferences.
Mobile interface | Alternate Formats