RFID Cloning 1 Day Course – 9th May 2022
- Security
- 0 (Registered)
This is a 1 day RFID Cloning course
The Course Outline
This is a structured course aimed at those in the IoT Industry or wishing to learn more about the art of RFID Security. Unlike other courses that just teach techniques, we also explore the risk element and the mitigation of such attacks and some of the challenges of introducing these mitigation’s in the business development chain. The course is designed to be largely practical but given the subject matter their is a theory element but this is kept to the necessary items to address the subject at hand. Students will be taught a methodology for reviewing a new previously unseen board, use industry tools such as Proxmark3, HID IClass Readers etc
We don’t waste hours of your time on the course teaching you to solder, you can do this in your own time, we point you to supplementary material for further reading to expand on your knowledge post the course.
We guarantee to run the course with a minimum of 2 students, so no waiting for numbers, we run the course during the week and over the weekend, if you don’t want to take time off work. We can run the course on your company site if there are 2 or more students from the same company wishing to take the course.
Students are encouraged to bring their own RFID tags and cards, if they wish and use the tools and techniques that are available during breaks and in the evening.
Learning Technology
- Proxmark3
- 16Gb USB stick containing course slides, software and supplementary material
Course Layout – RFID Cloning
- What is RFID and its history
- Explore card/tag technologies and Standards
- Explore memory layouts
- Proxmark3 and software
- Industry Readers and writers
- Arduino with HID IClass reader
- Practical labs supported by industry door entry systems and alarm systems
- Cloning door entry tags
- Cloning alarm arm/disarm tags
Who Should Attend this Course
- Penetration testers who want to get into IoT security
- Bug hunters who want to find new bugs in IoT products
- Government officials from defensive or offensive units
- Red team members tasked with compromising the IoT infrastructure
- Security professionals who want to build IoT security skills
- Embedded security enthusiasts
- IoT Developers and testers
- Anyone interested in IoT security
Student Requirements
No previous knowledge is required, basic knowledge is built upon quickly so students understand theoretical concepts that are put into practice in the labs.
What Students Should Bring
Windows laptop with at least 40 GB free space
8GB RAM
2 x External USB access
Administrative access on the laptop
What Students Will Be Provided With
Software and hardware necessary to complete the course
To register your interest email info@hardware-hacking.co.uk for further details
Course Content
Curriculum is empty