Closed bigbulse closed 1 year ago
As we know, it is not exactly feasible to intercept the RFID data of the card due to its limited range.
Instead we have other things to consider:
What data is extracted by the Flipper when it reads the card?
What does the ability to emulate RFID imply about the Security of the reader?
These are vulnerabilities and should be recognized as such. Although the initial plan was to have some grandiose attack scenario, we should focus on the vulnerabilities and security implications of what can be exploited.
Unlock door with ID card and Intercept with Flipper Zero to establish a baseline.
Come up with feasible and creative way to repeat this as a Threat Actor scenario.
Document in easy-to-follow step by step guide.