Sarwar Jahan & Ashwath Kumar

Security Consultant at Cigital Asia Pvt Ltd

Talk Title

Case Study on RFID (proximity cards) hacking



Proximity ID cards or contactless ID cards are widely used as:

  • Security card for door access/li>
  • Transport pass or ticket
  • Hotel Room key


  • Clone a given Proximity card and get un-authorized access to restricted area.
  • Modify the card data to bypass business logic or gain extra benefit.

Case Studies

Testing has been done on various vendors and results are analyzed. The demonstration will follow responsible disclosure policy.

Speaker Bio

Sarwar Jahan M
Twitter Handle: @sarwarjahanm

Ashwath Kumar K
Twitter Handle: ka3hk

Copyright © 2019-20 | Nullcon India | International Security Conference | All Rights Reserved