Description: https://www.defcon.org/images/defcon-17/dc-17-presentations/defcon-17-ricky_lawshae-picking_electronic_locks.pdf
https://www.defcon.org/images/defcon-17/dc-17-presentations/Ricky_Lawshae/defcon-17-ricky_lawshae-picking_electronic_locks-wp.pdf
https://www.defcon.org/images/defcon-17/dc-17-presentations/Ricky_Lawshae/open-sesame.py.zip
As networked building access systems become more and more popular, the security of using RFID, magstripe, and biometrics as authentication mediums is constantly under scrutiny. But what about the security of the access system itself? Is it possible to unlock a door by sending a spoofed command to it over the network, bypassing the need for an authentication medium entirely? SPOILER ALERT: Yeah, it is.
Tags: securitytube , defcon , def con , hacking , hackers , information security , convention , computer security , DC 17 , Defcon 17 , dc-17 ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.