This course is designed to familiarize students with Radio Frequency Identification (RFID) and Near Field Communication (NFC) technology, historic timeline, RFID industry standards, federal rules and regulations (FCC), the different types of RFID typologies (readers, tags, etc.), differences between RFID vs. NFC, low-frequency (LF), high-frequency (HF), and ultra-high frequency (UHF), and the evolution of RFID from it’s inception to our current and modern times. Students will also learn about RFID vulnerabilities, such as cloning, data manipulation, middle-man attacks on RFID systems, and much more.
Additionally, students will learn about the different Command Line Interface (CLI) commands for the Proxmark3, where we’ll dive deeper into reading, writing, and cloning RFID tags with Proxmark, and other RFID capable devices, such as the Keysy, Flipper Zero, and HackRF with GNU Radio, where we will explore a conceptual model of signal reading, processing, decrypting and relaying a high-frequency RFID tag, such as the MiFare Classic (ISO 14443). We will also discuss different RFID industry leaders, government contractors, protocols, and independent authorities who set the industry precedent for RFID and NFC.
This course is designed to bring about RFID awareness from a security researcher perspective, and is designed for ethical hackers, cybersecurity researchers, and IT professionals, with an emphasis on signals intelligence.
Who this course is for:
- Security researchers and hackers with a particular interest in Radio Frequency Identification and Near Field Communication technology.
What you’ll learn
- Radio Frequency Identification history, timeline, and evolution. Difference between Low-Frequency, High-Frequency, Ultra-High Frequency, and NFC RFID.
- Basic command line skills, and familiarity with Github repository, linux and/or Windows command line interface (CLI). Downloading, installing, and flashing soft
- RFID & NFC Physical Access Control Systems, or PACS, and different tag typology, hardware, readers, and industry application such as U.S. government contracts.
- RFID vulnerabilities, encryption, standards, and government guidelines. HackRF, and other RFID capable readers, writers, and tools.
Free Download Links-
Note: Comment below if you find the download links dead and comment with fake or temporary Email-id is going to be ignored.