{"guid":"import-b6d9b9d565c00a5acb","title":"Analyzing RFID Security","subtitle":null,"slug":"25c3-3032-en-analyzing_rfid_security","link":"http://events.ccc.de/congress/2008/Fahrplan/events/3032.en.html","description":"Many RFID tags have weaknesses, but the security level of different tags varies widely. Using the Mifare Classic cards as an example, we illustrate the complexity of RFID systems and discuss different attack vectors. To empower further analysis of RFID cards, we release an open-source, software-controlled, and extensible RFID reader with support for most common standards.\n","original_language":"eng","persons":["Henryk Plötz","Karsten Nohl"],"tags":["25c3"," Hacking"],"view_count":665,"promoted":false,"date":"2008-12-29T01:00:00.000+01:00","release_date":"2009-01-18T01:00:00.000+01:00","updated_at":"2026-04-15T00:30:05.841+02:00","length":3241,"duration":3241,"thumb_url":"https://static.media.ccc.de/media/congress/2008/25c3-3032-en-analyzing_rfid_security.jpg","poster_url":"https://static.media.ccc.de/media/congress/2008/25c3-3032-en-analyzing_rfid_security_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2008/import-b6d9b9d565c00a5acb-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2008/import-b6d9b9d565c00a5acb-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/25c3-3032-en-analyzing_rfid_security","url":"https://api.media.ccc.de/public/events/import-b6d9b9d565c00a5acb","conference_title":"25C3: nothing to hide","conference_url":"https://api.media.ccc.de/public/conferences/25c3","related":[{"event_id":626,"event_guid":"import-938a45e3503283dad8","weight":4},{"event_id":979,"event_guid":"import-ca377fadd50f41d378","weight":3},{"event_id":1053,"event_guid":"import-6809edc70e003b4ece","weight":6},{"event_id":1203,"event_guid":"import-fc58b881c2cf74003e","weight":20},{"event_id":1268,"event_guid":"import-2d1502d5b973b7f55d","weight":2},{"event_id":1277,"event_guid":"import-46ee25357ca568906f","weight":4},{"event_id":1299,"event_guid":"import-5fa5d5ff35316aaa6c","weight":3},{"event_id":1321,"event_guid":"import-0ec6cf83fd3d4ca115","weight":2},{"event_id":1385,"event_guid":"import-60fab54854e0de0861","weight":3},{"event_id":1475,"event_guid":"import-6494b3c268a64f31b0","weight":3},{"event_id":1503,"event_guid":"import-019cfe6488a1c1abe9","weight":2},{"event_id":1654,"event_guid":"import-efc946f94edef3de15","weight":11},{"event_id":2157,"event_guid":"szHEwO2pazLIG7w8wQTa1w","weight":2},{"event_id":3615,"event_guid":"74783236-46f4-493c-9574-1b27a44847b7","weight":2},{"event_id":3633,"event_guid":"530f0400-e4e8-4d99-909d-4cfc8121c0b0","weight":5},{"event_id":3640,"event_guid":"700a07e7-a9c4-437b-a4c5-4491b23a9b4a","weight":3},{"event_id":3695,"event_guid":"c300b194-2a85-4705-92aa-b4e789882303","weight":2},{"event_id":6403,"event_guid":"385ac419-50f5-49b5-b571-701691d2734f","weight":2}],"recordings":[{"size":414,"length":3241,"mime_type":"audio/ogg","language":"eng","filename":"25c3-3032-en-analyzing_rfid_security.ogg","state":"downloaded","folder":"audio_only","high_quality":true,"width":720,"height":576,"updated_at":"2014-05-10T15:26:47.353+02:00","recording_url":"https://cdn.media.ccc.de/congress/2008/audio_only/25c3-3032-en-analyzing_rfid_security.ogg","url":"https://api.media.ccc.de/public/recordings/2371","event_url":"https://api.media.ccc.de/public/events/import-b6d9b9d565c00a5acb","conference_url":"https://api.media.ccc.de/public/conferences/25c3"},{"size":414,"length":3241,"mime_type":"video/mp4","language":"eng","filename":"25c3-3032-en-analyzing_rfid_security.mp4","state":"downloaded","folder":"video_h264_720x576","high_quality":true,"width":720,"height":576,"updated_at":"2016-01-27T11:03:34.668+01:00","recording_url":"https://cdn.media.ccc.de/congress/2008/video_h264_720x576/25c3-3032-en-analyzing_rfid_security.mp4","url":"https://api.media.ccc.de/public/recordings/2370","event_url":"https://api.media.ccc.de/public/events/import-b6d9b9d565c00a5acb","conference_url":"https://api.media.ccc.de/public/conferences/25c3"},{"size":414,"length":3241,"mime_type":"video/webm","language":"eng","filename":"25c3-3032-en-analyzing_rfid_security.webm","state":"downloaded","folder":"webm","high_quality":true,"width":720,"height":576,"updated_at":"2016-01-27T11:03:34.697+01:00","recording_url":"https://cdn.media.ccc.de/congress/2008/webm/25c3-3032-en-analyzing_rfid_security.webm","url":"https://api.media.ccc.de/public/recordings/2369","event_url":"https://api.media.ccc.de/public/events/import-b6d9b9d565c00a5acb","conference_url":"https://api.media.ccc.de/public/conferences/25c3"}]}