Geek DIY: RFID thief builds a long-distance penetration weapon[Copy link]
This article uses the latest penetration tool Tastic RFID Thief and RFID induction cracking technology to gain access to some secure buildings.
Tastic RFID Thief is a silent long-range RFID reader that can steal RFID information from a distance without being noticed. When an unsuspecting person wears an access card or RF device, it will be broken. Tastic RFID Thief targets low-frequency 125KHz RF systems, such as those using HID Prox or Indala Prox products. Not only that, you can also use its circuit board to transform it into a 13.56MHz high-frequency RFID reader, so that you can get access control systems like HID iCLASS. The goal of this article is to make it easy for security professionals to use tools to perform RFID physical penetration testing, and to present some of the risks of using RFID technology to the public. All code, parts lists and board designs can be found in this article and downloaded for free :). Design We use an Arduino microcontroller that can be modified to become an RFID reader (the HID MaxiProx 5375 - available on eBay^^) The modified reader will have a long range read feature, making it a portable small RFID reader. Note that this board can also be plugged into an Indala reader for testing the Indala Prox Access control system (such as Indala long-range reader 620) and this board can be modified into any high-frequency (such as 13.56MHz) card reader, it supports all Wiegand standard DATA0/DATA1 outputs.
This tool reads the access control information and saves it as txt to the microSD card:
This method can help us read the target card 3 feet away without attracting the attention of ordinary people. Who would have thought that someone sitting in Starbucks with a card reader in a messenger bag or backpack would be a hacker who steals information?
The Tastic RFID Thief can be inserted into almost any RFID reader on the market and has been successfully tested with all four of the main RFID readers sold by HID Global.
I'm sure you all remember the tool Arsenal from the 2014 Black Hat conference. I used Tastic RFID Thief modified a Long Range Reader 620 and an iCLASS – R90 Long Range Reader, as shown in the following figure, we can see the black and red power wires and the green and white standard Wiegand DATA0/DATA1 output cables.