Black Hills InfoSec - RFID Proximity Cloning Attacks
Ray Felch // Introduction While packing up my KeyWe Smart Lock accessories, and after wrapping up my research and two previous blogs “Reverse Engineering a Smart Lock” and “Machine-in-the-Middle BLE Attack”, I came across a couple of KeyWe RFID tags. Although I was somewhat already familiar with RFID (Radio Frequency ID) technology, I decided this […]
The post RFID Proximity Cloning Attacks appeared first on Black Hills Information Security.
from Black Hills Information Security https://www.blackhillsinfosec.com/rfid-proximity-cloning-attacks/
Comments
Post a Comment