Hi [[ session.user.profile.firstName ]]

RFID LOL

RFID access cards are often used to secure entry points in the corporate enterprise facilities. They are very convenient,relatively inexpensive, and generally assumed to be highly secure. This session explains how these cards are programmed, what their vulnerabilities are, and the choices available to secure them. Also demonstrated will be how the most common access card can be hacked, cloned, and minted to subvert policies and controls to access corporations, data centers and other critical environments.
Recorded Aug 17 2012 52 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Terry Gold
Presentation preview: RFID LOL

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
Presentations from the BSides Events and Beyond
Presentations from the BSides Events and Beyond

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: RFID LOL
  • Live at: Aug 17 2012 8:00 pm
  • Presented by: Terry Gold
  • From:
Your email has been sent.
or close