Building an NFC attack tool using STM k2l 496 zji microcontroller and discussing security weaknesses in Mifare classic tags
- Built an NFC attack tool using STM k2l 496 zji microcontroller with one megabyte of flash and 320 kilobytes of RAM
- Discussed hardware limitations of the previous device and the need for a more powerful one
- Implemented DES fire attack and used Mifare DESFire des fire tool to mess with responses
- Explained weaknesses in Mifare classic tags, including the uselessness of crypto one and vulnerabilities to replay attacks and key recovery
The speaker explained how they built an extremely simple device using a big coil of wire, capacitor, diode, resistor, and another capacitor to convert the microcontroller into an NFC tag. They also discussed the need for a more powerful device due to hardware limitations of the previous one, and how they used an android application to mess with responses and implement DES fire attack. They then went on to explain the weaknesses in Mifare classic tags, including the uselessness of crypto one and vulnerabilities to replay attacks and key recovery.