📕
Blog
  • 🐞Vulnerabilities & Techniques
    • Web Vulnerabilities
      • Open Redirect
      • HTTP Parameter Pollution (HPP)
      • Host Header Injection (HHI)
      • XSS
      • HTML-Injection
      • clickjacking
      • S3
      • EXternal Xml Entity (XXE)
      • XSS prevention | CSP
      • DOM-XSS
      • SQL Injection | SQLI
      • Response Manipulation Technique & How Burp Suite Works
    • API Vulnerabilities
      • Mass Assignment Vulnerability
  • 🚩CTF
    • ASCWG
  • ✍️Writeups
    • Read Writeups
      • REST API WriteUps
      • Web Vulnerabilities WriteUps
    • Technical Writeups
      • Reset Password Poisoning Via Host Header Injection Lead to (ATO)
      • OTP/2FA Bypasses
        • OTP bypasses
  • 😈TryHackMe
    • THM Advent of Cyber 3 (2021) NoSQL WriteUp
  • 🔱Web-CyberTalents
    • CyberTalents-Web-Easy
    • CyberTalents-Web-Medium
    • CyberTalents-Web-Hard
  • 🖇️Pentesting & Bug Hunting Tips
    • ATO Via Host Header Injection
    • OTP Bypass
    • OutLook Plugin Pentest Guide
  • 💻Port-Swigger Labs
    • XML external entity (XXE) injection
    • DOM-XSS
      • DOM XSS in the document.write sink using source location.search
      • Lab: DOM XSS in document.write sink using source location.search inside a select element
      • Lab: DOM XSS in innerHTML sink using source location.search
      • Lab: DOM XSS in jQuery anchor href attribute sink using location.search source
      • Lab: Reflected DOM XSS
      • Lab: Stored DOM XSS
    • SQL injection
      • Lab: SQL injection vulnerability in WHERE clause allowing retrieval of hidden data
      • Lab: SQL injection vulnerability allowing login bypass
      • Lab: SQL injection UNION attack, determining the number of columns returned by the query
      • Lab: SQL injection UNION attack, finding a column containing text
      • Lab: SQL injection UNION attack, retrieving data from other tables
      • Lab: SQL injection UNION attack, retrieving multiple values in a single column
      • Lab: SQL injection attack, querying the database type and version on Oracle
      • Lab: SQL injection attack, querying the database type and version on MySQL and Microsoft
      • Lab: SQL injection attack, listing the database contents on non-Oracle databases
  • 🛜Wireless Networks Penetration Testing
  • ⚔️Wi-Fi Attacks
    • 🕸️Network Scanning attack
    • 🌊DOS / Flooding
      • 1️⃣DoS - Frame Flooding (Deauth, EAPOL, Beacons)
      • 2️⃣DoS- Exploiting Countermeasures (MIC failure)
    • Jamming Attacks (هجمات التشويش)
    • Probe Requests Attack
    • Handshake Attacks
      • Dictionary Attack
      • Clientless Attack
      • KRACK Attack
      • Downgrad Attack
    • Rouge AP Attack
  • Lab Notes
  • RFID and NFC
  • Bluetooth
  • ZigBee
  • Google Map Test
Powered by GitBook
On this page

RFID and NFC

PreviousLab NotesNextBluetooth

Last updated 10 months ago

RFID (Radio Frequency Identification) and NFC (Near Field Communication) are both technologies used for wireless communication between devices over short distances.

RFID (Radio Frequency Identification):

  • Definition: RFID is a technology that uses electromagnetic fields to automatically identify and track tags attached to objects. These tags contain electronically stored information.

  • Working Principle: RFID tags are typically small, passive devices that can be attached to or embedded in objects. They contain a unique identifier and sometimes additional data. RFID readers emit radio waves to interact with these tags, allowing them to read the information stored on them without requiring direct line-of-sight or physical contact.

  • Applications: RFID is used in various industries for asset tracking, inventory management, access control, and contactless payment systems.

Passive RFID (Radio Frequency Identification) refers to a type of RFID technology where the RFID tags do not have an internal power source or battery. Instead, they rely on the electromagnetic energy emitted by an RFID reader to power them and to transmit data.

  1. NFC (Near Field Communication):

    • Definition: NFC is a subset of RFID technology that enables two devices (or a device and a tag) to communicate with each other when they are brought within a few centimeters of each other.

    • Working Principle: NFC operates at 13.56 MHz and allows for communication between devices in peer-to-peer mode or between a device (like a smartphone) and an NFC tag. It can read and write data on compatible NFC tags, facilitating interactions such as mobile payments, data exchange, and pairing electronic devices.

    • Applications: NFC is widely used in contactless payment systems (e.g., Apple Pay, Google Pay), public transport ticketing, electronic access cards, and smart posters.


RFID and NFC attacks

  1. RFID Card Clone

هي عملية نسخ محتويات الكارت الأصلي في كارت أخر مزيف يمكن استخدام في عمليات الاختراق

  1. Card Emulation Attack

تجميع عدد من الكروت على كارت واحد واستخدامه في اكتر من مكان لهذه الكروت سواء كروت بنكيه او كروت تمنح صلاحية دخول

  1. Cloning NFC Cards using Mobile Phones