Black Hills InfoSec - RFID Proximity Cloning Attacks

Ray Felch // Introduction While packing up my KeyWe Smart Lock accessories, and after wrapping up my research and two previous blogs “Reverse Engineering a Smart Lock” and “Machine-in-the-Middle BLE Attack”, I came across a couple of KeyWe RFID tags. Although I was somewhat already familiar with RFID (Radio Frequency ID) technology, I decided this […]

The post RFID Proximity Cloning Attacks appeared first on Black Hills Information Security.



from Black Hills Information Security https://www.blackhillsinfosec.com/rfid-proximity-cloning-attacks/

Comments

Popular posts from this blog

Krebs - NY Charges First American Financial for Massive Data Leak

KnowBe4 - Scam Of The Week: "When Users Add Their Names to a Wall of Shame"