Closed bigbulse closed 1 year ago
Organizations often give employees/members their own unique ID card that gives them access to their physical and virtual property.
There are the associated risks, concerns, and implications with this. Flipper Zero can read, emulate, and copy these cards.
What data is extracted by the Flipper when it reads the card?
What does the ability to emulate RFID imply about the Security of the reader?
For this task:
https://github.com/ecrawford-0/Capstone/wiki/RFID-Security-Vulnerabilities
Organizations often give employees/members their own unique ID card that gives them access to their physical and virtual property.
There are the associated risks, concerns, and implications with this. Flipper Zero can read, emulate, and copy these cards.
What data is extracted by the Flipper when it reads the card?
What does the ability to emulate RFID imply about the Security of the reader?
For this task: