W Cloning Attacks

Popularity:

1

Simplicity:

1

Impact:

10

Risk Rating:

4

This attack involves the attacker being close enough to read the target tag and understand the data contained on the tag. Once this information is known, the attack can use either software to emulate a new tag or an RFID writer to create a hard copy. Depending on the particular system, the latter is much harder since most RFID tags have a unique ID burned-in by the factory. Blank tags are generally not available to the public.

However, RFID simulator hardware and software is commercially available in the market. Unless cryptographic authentication is used, any RFID tag can be simulated with such hardware.

Reverse engineering may be used to understand the manufacturing process and manipulate the factory ID. The attacker would then use the cloned tag to access buildings and manipulate prices on tagged items or other activities, depending on the application.

Was this article helpful?

0 0
The Ultimate Computer Repair Guide

The Ultimate Computer Repair Guide

Read how to maintain and repair any desktop and laptop computer. This Ebook has articles with photos and videos that show detailed step by step pc repair and maintenance procedures. There are many links to online videos that explain how you can build, maintain, speed up, clean, and repair your computer yourself. Put the money that you were going to pay the PC Tech in your own pocket.

Get My Free Ebook


Post a comment