Viktor Petersson logo

Podcast

Follow Me

Join Viktor, a proud nerd and seasoned entrepreneur, whose academic journey at Santa Clara University in Silicon Valley sparked a career marked by innovation and foresight. From his college days, Viktor embarked on an entrepreneurial path, beginning with YippieMove, a groundbreaking email migration service, and continuing with a series of bootstrapped ventures.

RFID Hacking with Iceman: Exploring the Intricacies RFID Security

Play On Listen to podcast on YouTube Listen to podcast on Spotify Listen to podcast on Apple Listen to podcast on Amazon music
21 SEP • 2024 1 hour 7 mins
Share:

In this enlightening episode of “Nerding Out with Viktor,” host Viktor engages in a thought-provoking conversation with Iceman, a renowned expert in RFID and NFC hacking. The discussion delves into the intricacies of Bluetooth credentials and their potential vulnerabilities, highlighting the significance of Proxmark, a powerful tool used for RFID and NFC research and development.

Iceman is no stranger to the world of Proxmark, having made significant contributions to the platform’s development and enhancement over the years. His firmware fork, affectionately known as the “Iceman Fork,” has become a staple in the community, extending the capabilities of the standard Proxmark software and adding new features that support a wider range of RFID tags and protocols.

As we dive into this conversation, it becomes clear that Iceman’s involvement with Proxmark began long ago. He shares his memories of working on early versions of the device, collaborating with other developers to push the boundaries of what was possible with RF hacking tools. His expertise has been instrumental in shaping the tool into its current form, and he continues to contribute to its development through his active participation in online forums and communities.

Throughout the conversation, Iceman’s passion for open-source development shines through as he discusses the importance of collaboration and sharing knowledge within the community. He emphasizes that Proxmark is not just a tool, but a platform that enables users to experiment with new ideas and push the boundaries of what is possible in RF hacking. His approachable tone makes complex concepts accessible to listeners with varying levels of technical knowledge.

As we explore the world of Bluetooth credentials, Iceman shares his insights on how attackers can exploit vulnerabilities using modern tools like Proxmark v4 and its custom-built firmware enhancements. He walks Viktor through a scenario where he attempts to clone a lost or forgotten contactless payment card using these advanced techniques.

Iceman’s emphasis on the importance of collaboration and continuous learning in the RF hacking community is particularly noteworthy. He encourages listeners to start with basic devices like the Proxmark v4, which can be purchased for around $30 on online platforms. This approachable tone makes complex concepts accessible to listeners with varying levels of technical knowledge.

As the episode comes to a close, Viktor and Iceman’s conversation leaves listeners with a deeper understanding of the intricacies of RFID and their potential vulnerabilities. The discussion highlights the significance of Proxmark and its custom-built firmware enhancements, providing valuable insights into the techniques used by attackers in this domain.

Transcript

Show/Hide Transcript
[00:00] Viktor Petersson
Welcome back to another episode of nerding out with Victor.
[00:03] Viktor Petersson
Today I have a hacker with me on the show, an RFID hacker that goes by the name Iceman.
[00:10] Viktor Petersson
Welcome to the show, Iceman.
[00:11] Iceman
Thank you so much for having me, Victor.
[00:13] Iceman
It's a pleasure.
[00:15] Viktor Petersson
It's a really fun thing to have a hacker on the show.
[00:19] Viktor Petersson
And I've seen some of your Defcon talks and you've done some amazing things.
[00:24] Viktor Petersson
And today's episode is going to be all about RFID hacking, or RF hacking, I guess more than RFID.
[00:30] Iceman
So, yeah, no, it's going to be RFID hacking.
[00:33] Iceman
RFId hacking is not, it's not the same.
[00:36] Iceman
Radio frequency is a completely different set of things and RFID is a little bit smaller.
[00:41] Iceman
So you can just.
[00:43] Iceman
Quick thing if we.
[00:45] Iceman
RF is about the full spectrum with SDR software, defined radios, and you go for the spectrum.
[00:52] Iceman
RFID hacking is very limited to certain frequencies.
[00:55] Iceman
So there's a low frequency, 125, you have a high frequency, about 13.56.
[01:03] Iceman
Then you have ultra high frequency RFID, UHF.
[01:08] Iceman
And that's about 800 to 900.
[01:11] Iceman
That's the only frequency with we touch.
[01:13] Iceman
We are very similar to RF sense because we into radio frequency or communications over the wires.
[01:22] Iceman
Wireless, of course.
[01:23] Viktor Petersson
Right.
[01:24] Iceman
But it's not that.
[01:25] Iceman
So we also do a different thing.
[01:27] Iceman
The low ff, lf and Hf is about inductance communications.
[01:34] Iceman
So we don't do sending, pushing out signals, but UHF does that.
[01:40] Iceman
So crossover.
[01:41] Viktor Petersson
Right.
[01:42] Viktor Petersson
So big gray area, but fair enough.
[01:44] Viktor Petersson
That's a good distinction.
[01:45] Viktor Petersson
So if you are, if you do have your SDR software or hardware, you cannot necessarily do this.
[01:53] Viktor Petersson
Or can that be used for the same.
[01:54] Iceman
You can.
[01:56] Iceman
It's a very good question, though.
[01:57] Iceman
It's a great question.
[01:59] Iceman
Some of the people who have sdrs, like with lime sdrs or blade RF or hack RF.
[02:05] Iceman
Exactly.
[02:05] Iceman
And you use better antennas, you can actually get down and sniff a little bit better sniffing because you can easily catch up the signals that comes out.
[02:16] Iceman
So just short introduction to what it does.
[02:19] Iceman
RFID does, yeah.
[02:21] Iceman
You take a proxmog, for instance.
[02:23] Iceman
It's an RFID reader and it has antenna on there and it generates a field, an electromagnetic field.
[02:30] Iceman
And you put a, you take a card, an RFID based card.
[02:38] Iceman
Right.
[02:38] Iceman
It also has antenna in here.
[02:39] Iceman
So when you present that card into the field of a reader, it energized because the magnetic field couples so the resonant in the same frequency, they are tuned to the same frequency.
[02:51] Iceman
And that makes the electron walk and excite the electrons.
[02:55] Iceman
Right.
[02:55] Iceman
So this one gets power by coming into the field over here.
[02:58] Iceman
So with strs, they can sniff this communication because we have a field that pulse out and it goes further on, of course, but it doesn't send.
[03:07] Iceman
Right, we don't pulse out.
[03:10] Viktor Petersson
So you can't, so you can't power the chip or the card from SDR, but you can read it?
[03:15] Iceman
You can sniff it.
[03:16] Iceman
Yes.
[03:16] Viktor Petersson
Right.
[03:17] Viktor Petersson
good.
[03:18] Viktor Petersson
All right, that's a fair, that's a really good distinction.
[03:20] Viktor Petersson
So I got really excited about RFID hacking a few years ago.
[03:26] Viktor Petersson
I lived in an apartment complex in London, and they only gave you one fob for my building.
[03:31] Viktor Petersson
And I was really annoyed by that because I was like, well, can I get another one?
[03:35] Viktor Petersson
They were like, oh yeah, that's two out of quid.
[03:37] Viktor Petersson
I'm like, that's stupid.
[03:38] Viktor Petersson
And it just so happened I went to DeFcon the same year.
[03:41] Viktor Petersson
I was like, surely there is a better way for doing this.
[03:44] Viktor Petersson
So I picked up one of these RFID cloners that you can buy for, I don't know, like $100 or whatever.
[03:51] Viktor Petersson
It's not that expensive.
[03:54] Viktor Petersson
Unfortunately, I didn't work for this particular use case because I did not know what technology to use for the Fob.
[03:58] Viktor Petersson
But it kind of opened my eyes to the world of RFID hacking, and I've kind of been intrigued by that since.
[04:05] Viktor Petersson
And that's kind of why I wanted to get you on the show, just properly nerd out about all things RFID.
[04:13] Viktor Petersson
So maybe we can start with kind of like the one ones, the basics of RFID.
[04:18] Viktor Petersson
Like there are families of different types of RFID cards and readers and readers and categories of traffic, I guess, or frequencies.
[04:30] Viktor Petersson
And I presume what happened to me was that RFD cloner had could not do that particular key fob, but it can probably do other things.
[04:38] Viktor Petersson
So maybe we can start there.
[04:39] Viktor Petersson
Like can you break down broadly the categories off different types of key fobs and, wow, room keys.
[04:48] Viktor Petersson
Yeah.
[04:49] Iceman
Wow, this is a wide topic.
[04:51] Viktor Petersson
Yes, I would imagine.
[04:54] Iceman
I usually get questions about that RFID hacking.
[04:56] Iceman
Can I clone my card?
[04:58] Iceman
Number one question, without a doubt, right?
[05:00] Iceman
And fully fair.
[05:02] Iceman
And people go like, how hard can it be?
[05:05] Iceman
That's the next one, right?
[05:06] Iceman
And then they go like, I bought a cloner and it didn't work.
[05:12] Iceman
And you're like, haha.
[05:14] Iceman
And now you enter the realm of RFID hacking is one.
[05:18] Iceman
First step you have to do is actually what you just figure out.
[05:21] Iceman
You have to identify the technology that's being used.
[05:25] Iceman
And then I need to figure out, does the cloner understand that technology and have a way to actually make a copy of that card?
[05:35] Iceman
Does there exist a way to do that?
[05:38] Iceman
Because all technologies or all cards are not cloneable.
[05:42] Iceman
Right.
[05:43] Viktor Petersson
Right.
[05:43] Iceman
So we just start that out of questions.
[05:45] Iceman
Like, when people go like, can I clone my passport?
[05:48] Iceman
Yes and no.
[05:51] Iceman
How much money do you have and.
[05:52] Viktor Petersson
How much time do you have?
[05:54] Iceman
It's actually like, you can't, and that's the whole thing.
[05:58] Iceman
But some people can, and that's end of story.
[06:02] Iceman
Same thing with payment cards, right?
[06:04] Iceman
Without a doubt.
[06:05] Iceman
Number second question is, like, can I clone my.
[06:08] Iceman
I want to be able to pay with my implants.
[06:12] Iceman
Biohacking is a big thing because they want to make these implants on your hand and you put inside everyone.
[06:17] Viktor Petersson
Yeah, I've seen that.
[06:18] Iceman
They want to pay with your hand.
[06:19] Iceman
It's really cool.
[06:20] Iceman
Right.
[06:21] Iceman
But still, they have to move over the EMV data onto your chip, and that's, EMV doesn't really like that.
[06:27] Iceman
So Mastercard and Europe pay.
[06:29] Iceman
They really don't like that thing.
[06:31] Iceman
So they want to have control of it.
[06:33] Iceman
So they put on the cryptographic keys on the factories and very harsh about it, but you can do a semi version of it.
[06:41] Iceman
Another thing that works for payments is downgrade attacks.
[06:44] Iceman
You can do replays and stuff like that.
[06:45] Iceman
That is kind of obvious because the traffic for EMV is not encrypted.
[06:50] Iceman
But you cannot clone it per se.
[06:52] Iceman
Right back again to the thing.
[06:54] Iceman
Yes, you can, but you can't.
[06:59] Iceman
That's a Android store.
[07:00] Iceman
I can't do a diver.
[07:01] Iceman
So it's okay.
[07:02] Iceman
I can make a copy of some things, but I cannot do it.
[07:05] Iceman
So it works always.
[07:07] Iceman
Right?
[07:07] Viktor Petersson
Right.
[07:08] Iceman
So now we already touched base of payment cards, what you can and can't do, and then the top of cloners comes in.
[07:14] Iceman
You showed off a kesey.
[07:16] Viktor Petersson
That's right.
[07:17] Iceman
Yeah.
[07:17] Iceman
And that's Kisi was fun.
[07:19] Iceman
I met the inventor in Zenzhen a couple of years ago, actually.
[07:23] Iceman
He was doing, you know, developing his, like you said, we talked about hardware before a little bit, and he was doing his first revisions and down over there.
[07:29] Iceman
And it's really hard to make business in China sometimes if you don't speak Chinese or Mandarin and bring it up.
[07:36] Iceman
So apparently he was there for a year, and he went over to Mexico and finalized there.
[07:41] Iceman
Anyway, the keys is kind of interesting because it clones low frequency, so it targets with 125 khz tags.
[07:48] Iceman
Right.
[07:49] Iceman
That's usually only used for entry systems.
[07:54] Iceman
Simple entry systems, kind of popular from Wycom.
[07:56] Iceman
From Scandinavia.
[07:57] Iceman
It's lots of those low frequency tags, but you can do that.
[08:01] Viktor Petersson
So like you access key card for your hotel room and so on, right.
[08:05] Viktor Petersson
Is that a common use case?
[08:07] Iceman
Yeah.
[08:08] Iceman
And now I have to do one thing.
[08:10] Iceman
Wait.
[08:13] Viktor Petersson
Because that was the next thing I did.
[08:14] Viktor Petersson
Like the next hotel I stayed, I was like, all right, sure.
[08:17] Viktor Petersson
That could use this case.
[08:19] Iceman
Yeah.
[08:20] Iceman
My headset just went bananas for me.
[08:22] Iceman
So I can't hear your voice very well now, because it's what it is, I have to do one thing.
[08:25] Iceman
Wait, that's all right.
[08:26] Viktor Petersson
That's right.
[08:27] Viktor Petersson
I some hardware hacking live on stage.
[08:31] Iceman
Let's see.
[08:32] Iceman
Are you back?
[08:33] Viktor Petersson
Yeah.
[08:34] Viktor Petersson
Perfect.
[08:35] Viktor Petersson
Yeah.
[08:37] Viktor Petersson
So these are used mostly for access systems for hotel rooms and for buildings and so on, right?
[08:44] Iceman
Oh, no, usually just enter passage entrance to doors, like simple doors to office buildings and stuff like that, or fraternities like that.
[08:55] Iceman
So here comes another thing.
[08:56] Iceman
Bring something down.
[08:58] Viktor Petersson
Yes.
[08:59] Viktor Petersson
Love some hardware.
[09:01] Iceman
We love hardware.
[09:03] Iceman
So Kesey works by now very easily put the card, you put your little reader, it's very smooth.
[09:10] Iceman
You put it on and put it on the card and then you put it on where you want to clone it to.
[09:13] Iceman
Very simple.
[09:14] Iceman
That stemmed from this little vice.
[09:16] Iceman
This is what we call the blue gun cloner.
[09:19] Iceman
This is a low frequency em cloner.
[09:21] Iceman
So has this two little buttons.
[09:23] Iceman
Read, write and that's what it does.
[09:26] Iceman
It's like.
[09:27] Viktor Petersson
So this is what, this is like standard issue red team kind of equipment.
[09:33] Iceman
Oh, this is what you saw back 2010.
[09:35] Iceman
I'm pretty sure they had it.
[09:36] Iceman
Oh, yeah, yeah.
[09:38] Iceman
Then comes the new and better versions and more expensive models.
[09:42] Iceman
You know, things like this, the icopy 100 or something like that.
[09:47] Iceman
This takes low frequency, has that ui and graphical and all that stuff.
[09:51] Iceman
And it does h high frequency as well.
[09:54] Viktor Petersson
Right.
[09:55] Iceman
And then comes even more modern versions of it.
[09:57] Iceman
That's an I copy x, which is speaks and all that stuff.
[10:03] Iceman
And it copies and clones and it.
[10:05] Viktor Petersson
Can write as well.
[10:06] Viktor Petersson
So it can.
[10:07] Viktor Petersson
Okay, cool.
[10:08] Iceman
Yeah, so most of these ones here are more advanced, so we can read up things and do more.
[10:13] Iceman
And we support very much more different car technologies because that was something else were asking about.
[10:19] Iceman
So first we just ended up with cloners, right?
[10:22] Iceman
So it's a tons of cloners and you need to know which one works for my system.
[10:26] Iceman
And you sit now you're like, how do I know my system?
[10:29] Iceman
Well, right, you use something like this.
[10:32] Iceman
This is a simple field detector, so it lights up if you have a RFID signal, something like that.
[10:39] Iceman
Behind it, you will see that it lights up.
[10:41] Iceman
And let's see if we can do like this.
[10:44] Iceman
It's not buttering.
[10:47] Iceman
Let's see what it is.
[10:47] Iceman
Can I do this?
[10:50] Iceman
Yes.
[10:53] Iceman
You see how it flashes because that's the phone.
[10:59] Iceman
Your phone is an NFC reader, high frequency, right?
[11:03] Iceman
So this is what it shows.
[11:04] Iceman
All right.
[11:04] Iceman
This was a high frequency and you see it here on this one.
[11:07] Iceman
You would have presented this one to your reader, what you wanted to clone and see, like, if it's low frequency or high frequency, that would have been one of the things.
[11:14] Iceman
Another thing you would have done is like, you look at the cards and look at the antenna that's in the cardinal and see how many coils it has wrapped around.
[11:23] Iceman
Yeah, few coils, high frequency and tons of coils.
[11:28] Iceman
Massive is low frequency and they are.
[11:31] Viktor Petersson
Probably smaller radius too, I would imagine.
[11:33] Viktor Petersson
On the.
[11:35] Iceman
It's all kinds of styles, so it's not obvious, but, you know, you see about the amount of wires there are like.
[11:41] Iceman
Okay, that's a good indication.
[11:43] Iceman
Some of these cars has dual tech or even triple tech.
[11:47] Iceman
So you have like three different kinds of technology in one card.
[11:50] Viktor Petersson
Oh, wow.
[11:50] Viktor Petersson
Okay.
[11:51] Iceman
Oh, yeah, it gets worse.
[11:55] Iceman
Yeah.
[11:55] Iceman
So this is fun, right?
[11:57] Iceman
So you start out with your card and you had a cloner and you're like, oh, damn, I couldn't do it.
[12:02] Iceman
It's like, has to be something better.
[12:04] Iceman
Yes, right?
[12:05] Iceman
It has to be.
[12:06] Iceman
And I'm pretty sure that you just bought one because here's a flipper.
[12:09] Viktor Petersson
I literally just order a flipper this morning.
[12:11] Viktor Petersson
So.
[12:11] Viktor Petersson
Yes, absolutely.
[12:13] Viktor Petersson
Everybody needs to have a flipper, right?
[12:15] Iceman
Everybody needs to have a flipper because this has an SDR, it has two pins, I O gpios and has low frequency and high frequency and a simple UI and stuff.
[12:26] Iceman
So it's very easy.
[12:27] Viktor Petersson
And it's great ecosystem.
[12:29] Iceman
Yes.
[12:29] Iceman
With apps and everything like that.
[12:31] Iceman
Yeah.
[12:31] Iceman
By the way, though, they are actually in London, the headquarters.
[12:35] Iceman
Are they now?
[12:37] Iceman
You know, you can visit their place.
[12:39] Viktor Petersson
Indeed.
[12:39] Viktor Petersson
Next.
[12:40] Viktor Petersson
My next.
[12:40] Viktor Petersson
I was there last weekend.
[12:41] Viktor Petersson
I'm going to come knock on the.
[12:43] Viktor Petersson
Knock on the next time I'm in London.
[12:44] Iceman
Better do that.
[12:45] Iceman
Like say hi.
[12:46] Iceman
Hi to Pavel and all those guys.
[12:48] Iceman
Those guys made a million, though.
[12:51] Iceman
That is a super success.
[12:53] Viktor Petersson
Oh, yeah.
[12:53] Viktor Petersson
Massively, massively.
[12:54] Viktor Petersson
This is super cool.
[12:56] Viktor Petersson
So we now know.
[12:57] Viktor Petersson
So we use one of these first devices and that narrows down kind of like high version load.
[13:03] Viktor Petersson
Right?
[13:03] Viktor Petersson
So now we have like two buckets of card readers, I guess.
[13:09] Viktor Petersson
And then I would imagine there is a ten families in each of those that you need to be aware of.
[13:14] Iceman
So for low frequency, there's like tons of them.
[13:17] Iceman
I think it's about.
[13:18] Iceman
We have a support for 20 of them in the Proxmo code, right?
[13:23] Iceman
And in the HF world is five big families.
[13:28] Iceman
You have ISO 1443 a b, and then you have 15 693, and then you have 18,002.
[13:38] Iceman
And there's one more.
[13:43] Iceman
There's too many cyclops and peekaboos and all that.
[13:48] Iceman
It's versions of it anyway.
[13:50] Iceman
It's different families.
[13:51] Iceman
I'm so excited.
[13:52] Iceman
I'm sorry, I'm just interrupting you all the time.
[13:54] Iceman
I'm sorry for that.
[13:55] Iceman
Good content.
[13:55] Viktor Petersson
I love it.
[13:57] Viktor Petersson
I want to learn more.
[13:58] Viktor Petersson
I want to absorb like a sponge here.
[13:59] Viktor Petersson
So that's amazing.
[14:01] Iceman
I think it's just too fun.
[14:03] Iceman
Anyway, so all of his cards and tags and all that stuff, this is how I ended up in this world, is because I did as you did.
[14:11] Iceman
I was like, I want to learn to hack something.
[14:14] Iceman
To be really honest.
[14:15] Iceman
It's like my story started out where I was separating and I was very depressed.
[14:19] Iceman
And I was like, I've been doing programming, hacking all my life, but I was not happy, I was not content.
[14:24] Iceman
So I thought like, let's see if I can do something naughty and let's buy something naughty.
[14:29] Iceman
I'm going to buy myself a hacker, too.
[14:31] Iceman
Never done that in my life because that's illegal and all that stuff.
[14:34] Iceman
Right?
[14:36] Iceman
And here's the thing.
[14:37] Iceman
In Umil, one of the towns up here in north, in Sweden, there was this news article about how the local hackerspace actually managed to break the keys of that bus ticket system.
[14:50] Iceman
And I was like, oh, yeah, plenty of stores like that over the years.
[14:53] Iceman
Yeah, yeah.
[14:54] Iceman
And they are the same as here in my town.
[14:56] Iceman
That's where I'm from.
[14:58] Iceman
So I was like, okay, I want to do that.
[15:01] Iceman
So I went online and, like, googled a little bit.
[15:03] Iceman
And then, you know, the name Proxmo comes up everywhere and it's very expensive, $300.
[15:10] Iceman
I'm like, okay, I'm gonna do it for me.
[15:15] Iceman
I'm gonna order one.
[15:15] Iceman
So I ordered one, you know, and all excited, giddle like the boy.
[15:18] Iceman
All get around.
[15:19] Iceman
Two weeks later, you know, you get this package from Alibaba or whatever it was, you know, and I will show you.
[15:27] Iceman
Wait, wait.
[15:33] Iceman
It comes down.
[15:34] Iceman
It doesn't even come in a plastic box.
[15:36] Iceman
It comes like this, like a circuit board, like this.
[15:39] Iceman
This is radio war's versions of it a little bit.
[15:41] Iceman
I have so many versions of Proxmox nowadays.
[15:43] Iceman
I don't know why, I just have it.
[15:45] Iceman
They all better.
[15:46] Iceman
And this was an awful model.
[15:48] Iceman
It was great because there was first model that was actually assembled, and you couldn't get like this before that.
[15:53] Iceman
Everybody has to solve their own things.
[15:55] Iceman
It wasn't sold together, so that was a thing.
[15:57] Viktor Petersson
Looks like a lot of small components we get, right?
[16:00] Iceman
Oh, yeah.
[16:01] Viktor Petersson
I'm not a good soldier.
[16:01] Viktor Petersson
No, I'm not that good soldier.
[16:03] Iceman
No, me neither.
[16:04] Iceman
But I'm better now anyway.
[16:08] Iceman
So I'm like, oh, God, I'm gonna do this.
[16:09] Iceman
I'm like, you know, get on the forum, the Proxmox forum, and try to do this.
[16:13] Iceman
Try to set this one up.
[16:14] Iceman
It's like, oh, it's Mingv and all that stuff.
[16:16] Iceman
And people go like, I don't know.
[16:17] Iceman
Have you read the instruction guys?
[16:20] Iceman
I'm like, no, I'm good at computer.
[16:23] Iceman
I should be able to do this.
[16:24] Iceman
So, of course I failed.
[16:27] Iceman
And I took it very hard in myself because, like, I'm worthless, so I couldn't handle it, so I put it away.
[16:36] Iceman
I have a little shelf up there.
[16:38] Iceman
So I put it up there, and it was reminding me every day, it's like this cat laying up there, despising you, looking down and despising.
[16:45] Iceman
I could look up there and I'm just like, oh, God, my failures.
[16:50] Iceman
It took me six months.
[16:52] Iceman
It took me.
[16:52] Iceman
Sometimes it took me six months before I was ready to learn, you know, right when I was, like, accepting myself, saying, you're not very good at this, Iceman.
[17:01] Iceman
Iceman didn't exist back then.
[17:03] Iceman
You know, he didn't.
[17:04] Iceman
So after six months, I was like, okay, where's the guidance?
[17:08] Iceman
Let's do that.
[17:09] Iceman
Hello.
[17:09] Iceman
That works.
[17:10] Iceman
No, you pull, git, clone, repo, and it compiled.
[17:14] Iceman
Wow, that's great.
[17:15] Iceman
Then flashing phone on embedded device.
[17:19] Iceman
I never done that.
[17:20] Iceman
And it worked.
[17:21] Iceman
Like, oh, great, run the client.
[17:23] Iceman
Oh, the proximal client comes up.
[17:25] Iceman
I'm like, damn.
[17:26] Iceman
It's like, where is my tariff bus ticket system card?
[17:29] Iceman
And I put it on, you know, and I run this command.
[17:31] Iceman
It's the miffer, classic technology.
[17:33] Iceman
So you run this attack called HFMF.
[17:36] Iceman
Dark side.
[17:37] Iceman
The dark side attack.
[17:39] Iceman
And you run it, and it says, you know, 25 seconds average run time, and you sit there and wait, and it goes.
[17:47] Iceman
And then out comes the first key.
[17:51] Iceman
And I'm like, yes, I'm a hacker, but dopamine, Russia, that first key, I still remember it.
[18:03] Viktor Petersson
Oh, yeah, I can imagine.
[18:04] Viktor Petersson
I can imagine.
[18:05] Iceman
Yeah.
[18:08] Iceman
People go like, huh?
[18:10] Iceman
What do you mean?
[18:11] Iceman
It's intense.
[18:12] Iceman
I don't know how it is for yourself, but first time you do something that, and you're like, I have done something amazing.
[18:18] Viktor Petersson
Yeah.
[18:18] Iceman
And everybody else, congratulations, you broke your first.
[18:21] Viktor Petersson
Christ, you finished a readme good.
[18:27] Iceman
We're all newbies, right?
[18:29] Iceman
So, but that's, you know, who I am.
[18:32] Iceman
It's like I always keep on asking questions about curious.
[18:34] Iceman
I was really hooked into this big deep rabbit hole we call RFID hacking and it never ends.
[18:40] Iceman
So one of the things with the proxima world and what you learn very fast is that they talking about the proxima can do everything, but you have to implement it yourself.
[18:54] Viktor Petersson
It's like software, you can do anything, you have to implement it yourself.
[18:57] Iceman
Exactly.
[18:57] Iceman
You just have to learn to do yourself, man, it's like nothing.
[19:00] Iceman
And this is the thing, what I started doing is like, oh yeah, but I'm quite good at that.
[19:05] Iceman
So let's learn c again and learn about embedded and doing that.
[19:11] Iceman
And I started doing things, but it was a rough place.
[19:14] Iceman
So Iceman was just a user then.
[19:18] Iceman
But after a year I think I posted, I'm the guy who has the most question on the whole Proxmox forum.
[19:24] Iceman
I think I will ask more than 6000 questions.
[19:28] Iceman
I kept on asking everything.
[19:29] Iceman
I was like a bottomless because only thing I had was a proxmock and I did things based on that and I changed code because I can't do that and stop fiddling with things.
[19:37] Iceman
And I realized, you know, you want to do things the hard way, you know, you should be reading a raw signal trace and then you see a plot window and you should be able to manually decode that to bits and ones and zeros.
[19:48] Iceman
And then, you know, from there you should be able to twist and decode that one into a vegan pack stator maybe.
[19:54] Iceman
And I'm like, interesting.
[19:57] Iceman
I learned that now, but not very functional because I can't use this.
[20:01] Iceman
If I have to do this, every time I want to look at the cardinal, it's gonna, I'm gonna go nuts.
[20:06] Iceman
So I started doing those changes because I wanted something that the proximal client to work in the way that I want to work with it how I want to see, right?
[20:14] Iceman
So I forced, you know, you start changing the tools in the way that you want to do it.
[20:18] Iceman
So this is how I became very good at the proxy market thing.
[20:22] Iceman
And most of my changes was like the old people who are running the repo was like maybe why do you want to do it.
[20:29] Iceman
So you say, why do you want to do that?
[20:30] Iceman
Very protective Og people.
[20:33] Iceman
And I was like, how was GRN or something?
[20:36] Iceman
And then I realized, well, I can just make a fork right of it.
[20:40] Iceman
And then Iceman fork was born.
[20:43] Iceman
And then I did my changes there and made sure that upstream things comes in as well.
[20:48] Iceman
And it didn't matter what they wanted or not wanted.
[20:51] Iceman
I can just do it how I wanted it to become.
[20:54] Iceman
And I did open source.
[20:56] Iceman
Yes.
[20:57] Iceman
And it starts.
[20:58] Iceman
That's a beautiful source.
[20:59] Iceman
Yes, I love it.
[21:00] Iceman
And it started with that idea of always becoming more and more useful.
[21:07] Iceman
Things work better.
[21:09] Iceman
Another thing that adds, in the beginning there was the static analyzing, this continuous Covid scan.
[21:17] Iceman
That's what it called that make analyzing because it's C code and we always have memory leaks and all that crappy code styles and proxmograph Washington full of it.
[21:25] Iceman
But you know, gradually you start taking away all those problems, starts to become better and better.
[21:31] Iceman
Better.
[21:31] Iceman
And you figure out more and more formats.
[21:33] Iceman
We figure out more and more how to clone, how to read more in ellipse stuff, enhanced and made the high tag or not just the high tech we made for classic attacks, made them better, working more faster.
[21:47] Iceman
And all of that started, ended up.
[21:49] Iceman
So this is where Iceman started showing up everywhere.
[21:52] Iceman
This is where people know about the Eisenman fork and who that is.
[21:57] Iceman
This is why I ended up doing all this code.
[22:01] Iceman
And from there, I never been entered conference, I never been to Devcon, I never done anything like that.
[22:08] Iceman
But I was all of a sudden a maintainer.
[22:12] Iceman
And then I was also administrator of approximate forums.
[22:16] Iceman
And, you know, people was like, yeah, okay.
[22:17] Iceman
You seem to burn for community as well, which I do.
[22:20] Iceman
I'm very much for building a learning community, and we're always welcome to it.
[22:25] Iceman
And that's why we also have a Discord channel now since a couple of years back.
[22:29] Iceman
The forum is not for people anymore.
[22:31] Iceman
It's like the modern, the youth.
[22:35] Iceman
We don't like BBS's and that style.
[22:37] Iceman
I know, it's discord everywhere.
[22:39] Iceman
It's great.
[22:40] Iceman
It's a fucking great.
[22:41] Iceman
You know, we started with that during COVID It was perfect.
[22:43] Iceman
So we have like 11,000 members there.
[22:45] Viktor Petersson
Oh, wow.
[22:46] Iceman
Mostly lurking around, but it's good enough.
[22:48] Viktor Petersson
Sure, sure.
[22:49] Iceman
But around 20 17, 20 18, 20 17.
[22:53] Iceman
And I was involved with three other people.
[22:57] Iceman
Zero XFF from Australia and Dennis and Olaf.
[23:01] Iceman
Olaf is Prox grind.
[23:02] Iceman
He is the boy genius, or he's not boy anymore.
[23:06] Iceman
He's almost 30.
[23:08] Iceman
He's the genius doing very small proxmarks and miniaturizing hardware.
[23:12] Iceman
Very great chinese person for that.
[23:14] Iceman
And then this is the business unicorn, doing networking and talking about things with stuff.
[23:19] Iceman
So we created a company called RFID Research Group, and we made the RB four, an improved version of approxmox, small handled, easy, sleek, better antennas, and overall nice.
[23:33] Iceman
And we made a Kickstarter out of that one.
[23:36] Iceman
It was actually very successful.
[23:37] Iceman
So it came to fruition and all of a sudden I was like, yeah, we have to go out and talk about this product as well.
[23:44] Iceman
Stuff like that.
[23:44] Iceman
So I did that a little bit and then started my career as talker on different conferences, which I never done in my life either.
[23:53] Iceman
So that was a big thing.
[23:54] Iceman
I never went to conferences.
[23:55] Viktor Petersson
Right.
[23:56] Iceman
So this is another thing I keep on talking.
[23:58] Iceman
Sorry, you have to interrupt me.
[23:59] Viktor Petersson
No, no, this is great.
[24:01] Viktor Petersson
I'm learning a lot.
[24:02] Viktor Petersson
It's great.
[24:03] Viktor Petersson
This is exactly what the stuff I wanted to cover.
[24:05] Viktor Petersson
This is perfect.
[24:06] Viktor Petersson
I don't even have to.
[24:08] Iceman
I'm sorry about that.
[24:13] Iceman
Anyway, so I started up doing more things.
[24:16] Iceman
I'm meeting people, and people is like always so touched by the efforts and doing the proctimal stuff.
[24:22] Iceman
And I'm like, wow.
[24:24] Iceman
It's like, you know, after the first talk, I remember a guy comes up and is like, thank you.
[24:28] Iceman
Because of you, I've been having free laundry during my time as a student.
[24:34] Iceman
And I was like, I'm sorry, I.
[24:35] Viktor Petersson
Could not, I could not know this.
[24:37] Viktor Petersson
Please give us a flaws for the ability here.
[24:40] Iceman
And I'm like, huh?
[24:43] Iceman
I'm happy you learned.
[24:45] Iceman
However, how about you don't rip off a small business person, right?
[24:50] Iceman
It's just like, pay for your damn laundry.
[24:55] Iceman
It's not hard.
[24:56] Iceman
It's like, yeah, I get it, you know, so this is what I want to say when you talk about cloning your key fob for your apartment, right?
[25:03] Iceman
This is where it actually comes in.
[25:05] Iceman
People want to have a functional thing between.
[25:08] Iceman
This is a practical thing I can have advantage of versus the illegal part, which is I can make fraud out of it.
[25:15] Iceman
That's why people ask about payments and bus tickets and laundry or coffee machines or you name it, they asked.
[25:25] Viktor Petersson
Yeah, but I think that's for me, it was always like the pursuit of understanding.
[25:30] Viktor Petersson
I want to understand how it works.
[25:32] Viktor Petersson
It made me realize like, oh, shit, there's a crypto key in there.
[25:35] Viktor Petersson
That makes it harder to clone it.
[25:37] Viktor Petersson
Okay, that's clever.
[25:38] Viktor Petersson
And that leads you to, like, NFC, and now you have better grasping of like, how NFC contactless pay work and like, because they're all kind of the same family of things, right?
[25:48] Iceman
Oh yeah.
[25:49] Iceman
Oh yeah.
[25:49] Iceman
NFC is one of the worst names, though, because everybody says, oh, RFID and NFC.
[25:53] Iceman
And I'm like, no, RFID is the umbrella.
[25:58] Iceman
NFC is a part of it underneath.
[26:00] Iceman
Be sure that you keep it correctly.
[26:03] Iceman
And people go, no, it's NFC.
[26:04] Iceman
It's like, no, it's like, yes, but it's a task group and they're very good at it.
[26:08] Iceman
So within RFID is a lot of ISO standards, right?
[26:12] Iceman
And work groups like NFC group, right?
[26:15] Iceman
So they make an NFC readers what you see in phones, they're very good at that.
[26:19] Iceman
And they use a protocol that use NDEF standard or something about NDEF messages.
[26:25] Iceman
That's why you can send your business card and stuff like that over your phone like that, right?
[26:30] Viktor Petersson
Yeah.
[26:30] Iceman
There's also point to point network communications and stuff.
[26:34] Iceman
It's very high tech, but it's another level on top, built on top of different ISO standards, how to communicate physically with cars.
[26:41] Iceman
Right?
[26:42] Iceman
It's like a protocol on top of it.
[26:44] Iceman
And it's used for everything, but it always goes across surfing.
[26:48] Iceman
So MDF use is very much of apus.
[26:51] Iceman
So for one of the systems, payment system does the same thing.
[26:56] Iceman
That's the ISO 7816.
[26:58] Iceman
A lot of ISO standards now, but it's like a package, a wrapped package, saying you have a header, a fire byte header, and then you have the data that you're sending and then a CRC afterwards, right?
[27:10] Iceman
So you pack it up so you can see it goes back and left, up and down, and you need to keep track of it.
[27:17] Iceman
One of the things when you do RFID hacking is that you want to look at the traffic that's happening, because just doing it, like having a reader writing, doing things is good, but you don't learn anything from it.
[27:29] Iceman
And that's why the Proxmox is what we call the swiss army knife of things for RFID hacking, because you can look at the signal on the lower levels, you can look at it on the package tracements, in a sense.
[27:41] Iceman
We don't have wireshark in that sense, but we have annotations and trace logs.
[27:45] Iceman
There is a mode where you can actually export it to wireshark.
[27:49] Iceman
So someone made a wireshark plugin for it somewhere.
[27:53] Iceman
Apparently you can look at the ISO 1443 a packages from there.
[27:57] Iceman
I'm like, cool.
[28:01] Iceman
Yes.
[28:03] Viktor Petersson
So I think what's interesting, like here is if for the most basic cards, essentially it's an identifier, right.
[28:10] Viktor Petersson
It's just like if you swipe the card and you get like a string of text, essentially, right?
[28:14] Viktor Petersson
In various ways.
[28:15] Viktor Petersson
But the obvious thing is like, well, that's just a replay attack waiting to happen.
[28:21] Iceman
Right?
[28:21] Viktor Petersson
So what are the mitigation strategies in place for some of these cards?
[28:27] Viktor Petersson
Some of them have cryptographic id, so I presume there's a clock of sorts in there that generates a timestamp.
[28:31] Viktor Petersson
So you, like, there's a time delay and, like, so you can't do the replay attack.
[28:35] Viktor Petersson
Well, how does that.
[28:35] Viktor Petersson
How does it actually look like?
[28:36] Viktor Petersson
Or is it way too.
[28:37] Iceman
I hear that you from a completely different set of stories of computers.
[28:43] Iceman
One, remember one thing.
[28:45] Iceman
Now, RFID is an old, young technology, but it's very low power, right.
[28:51] Iceman
The ICs on a card is very simple.
[28:55] Iceman
So the simplest one from the low frequency we talked about before, just shouted out the five bytes of information that was there, the EM 4100.
[29:05] Iceman
So the Proxmo quadrant, developed by a guy called Jonathan Bestieu's, as in his masterpieces, where he wanted to prove the state of the governor of California that the Veritas chips that they were trying to implement as an id cardinal for schools is crap.
[29:21] Iceman
And you shouldn't do it because you can very easily capture the data and then replay it.
[29:25] Iceman
So that's why you did this.
[29:27] Iceman
That was 2006, okay?
[29:30] Iceman
Yeah.
[29:30] Iceman
So that's where it started there.
[29:32] Iceman
And then some other very smart people, researchers starting attacking and looking into the more secure versions of RFID cards.
[29:42] Iceman
So low frequency is usually very simple.
[29:45] Iceman
Right.
[29:46] Iceman
There's one exception, and that's high tag, the high tag family.
[29:51] Iceman
And they have a crypto, so that's a handshake of crypto, but it's also.
[29:55] Iceman
It's very similar to my crypto one because it's developed by the same people, by Philips, and they attack that one and they recover keys how we do it.
[30:06] Viktor Petersson
So it has a crypto chip on there with a private key that no sealed.
[30:10] Iceman
It's not a crypto ship, it's only one IC.
[30:13] Iceman
Right?
[30:14] Viktor Petersson
Oh, okay.
[30:14] Iceman
So it's one system on chip in that sense, that runs its things, that have some crypto things that's hard coded into it in the beginning.
[30:22] Iceman
Right.
[30:22] Iceman
So the more years comes, the more advanced the ICs became, and they added proper crypto and proper dedicated more parts of hardware for it, and you can actually run like Java machines on it.
[30:37] Viktor Petersson
So like a secure development style crypto, stuff like that.
[30:41] Iceman
So if you take an EnV cards, they are more likely running on a smart chip inside of there than actually.
[30:49] Iceman
I see.
[30:50] Iceman
Right.
[30:51] Iceman
So 2006 and 2010 is when other researchers start hacking the Mifare classic cards and coming up with a crypto key that's ended up with me ending up in this world.
[31:01] Iceman
And the same thing for you, going, oh, hold on, those cards are more like a USB stick.
[31:09] Iceman
They are like memory cards.
[31:11] Iceman
All of a sudden they start screaming out the UID as well in anti collision process.
[31:17] Iceman
But after that they are like a USB stick memory stick.
[31:20] Iceman
It has memory and it's divided into sectors and blocks.
[31:25] Iceman
Those sectors has two keys and access rights.
[31:28] Iceman
So in order to get rid of the memory, in order to do a clone of a card, you need to break the keys.
[31:35] Iceman
So that's how it improved.
[31:38] Iceman
And in the more later ones, like NXP desfire, they have added proper crypto like AE's and encrypted channels, dedicated hardware and Eil five plus certifications.
[31:51] Iceman
And so they're really good.
[31:54] Iceman
You don't hack both, right?
[31:56] Iceman
Not me, not you.
[31:58] Viktor Petersson
And I would imagine the only way is to do so kind of downgrade attack on those cards then if you were to.
[32:04] Viktor Petersson
Or is that even possible?
[32:05] Iceman
Oh, look at that.
[32:06] Iceman
Someone has been reading up on things.
[32:08] Iceman
Downgrade attacks is a concept.
[32:10] Iceman
Yes, it's a very interesting concept, because in physical access control world, this is more one of the standard attacks there is that you have a reader, and for access control, physical access control vendors, they choose a protocol called VGAN to communicate between the reader and the microcontroller behind doors that decides to open the door strikes or not.
[32:37] Iceman
And by doing so, you can easily swap out the readers as long as it spoke vgana.
[32:43] Iceman
So you can put up a low frequency technology reader of different sorts, or you could put up a high frequency one that was for I class or desk fire or 14 a or 14 b, whatever you want to put on, as long as you spoke v gan and talk back.
[33:01] Iceman
That way the door opened.
[33:02] Viktor Petersson
And that's just plain text protocol, right?
[33:03] Iceman
That was in plain text protocol, yes.
[33:06] Iceman
That's why we do this on wire sniffering and all that attacks you've seen, right.
[33:09] Viktor Petersson
You get to that in a second.
[33:10] Viktor Petersson
But yeah, I, because I think that's worth zooming in on.
[33:13] Iceman
So the downgrade attacks is like, does the reader support multiple different versions of COD technology?
[33:23] Iceman
Does it support a legacy or a simpler version?
[33:26] Iceman
If it does, Bob's your uncle, you just take the data out from vegan wires, put that data on a lower secure credential, and then you have a copy of, but it works.
[33:38] Viktor Petersson
Yeah.
[33:39] Viktor Petersson
And I mean, I think these things are like, well, what makes me love the concept of like, red teaming.
[33:45] Viktor Petersson
Really?
[33:45] Viktor Petersson
Like, you never attack the strongest security parameter.
[33:50] Viktor Petersson
You always find for the weakest link.
[33:51] Viktor Petersson
And in this case, just like, well, okay, you have all this fans security to check the card, but if I just lift this out and put a sniffer behind it, like, what's the point?
[34:03] Viktor Petersson
Like, it's not a complicated attack.
[34:06] Iceman
The thing with red teaming, when you talk to those guys and pen testers who do physical access, they always get in.
[34:14] Iceman
That is the least of their concerns.
[34:16] Iceman
It's like, oh, yeah, we put on two multifactors, biometric and all that stuff.
[34:20] Iceman
They got in anyway.
[34:21] Viktor Petersson
Somebody left the door open, the cleaner forgot the closet.
[34:25] Viktor Petersson
Like, oh, yeah, cool.
[34:26] Iceman
Yeah, like, you know they're going to get in.
[34:29] Iceman
That's not a problem.
[34:30] Iceman
So, yeah, and that's, this is where I started saying to people, for commercial properties like that or for your entering your multi tenant house, is it's secure enough.
[34:41] Iceman
It gives you a feeling that it's secure and you can't easily do it, but it's not secure.
[34:48] Iceman
It's secure enough.
[34:50] Viktor Petersson
I mean, yeah, that's why I want to have another episode later on lock picking because I think that's equally interesting because it's a perception of like, people believe locks are safe, you believe key tags are safe, but to a great degree, they are nothing.
[35:06] Viktor Petersson
No, it's an illusion of security rather than real security.
[35:10] Iceman
Yes.
[35:12] Iceman
And what many people are interested in RFID hacking medicine is that we want to tell the story that the vendors are saying something.
[35:21] Iceman
And by the RFID hacking community, you have now the tools to prove if that statement is correct or false.
[35:31] Viktor Petersson
So let's zoom in on that for a second.
[35:34] Viktor Petersson
So a lot of alarm systems these days are using RFID dongles, both in commercial buildings, but even increasingly residential buildings.
[35:44] Viktor Petersson
It's becoming more like if you buy a new lock, like, oh, do you want the smart version of your lock more often?
[35:49] Viktor Petersson
They're usually more stupid than smart, but that's a different.
[35:53] Viktor Petersson
But when you go to like assabloy, whatever, one of these lock companies, and they sell you a smart lock, how secure are those?
[36:02] Viktor Petersson
What standards are they using to actually secure this?
[36:05] Viktor Petersson
Are they somewhat secure against cloning or are they actually a downgrade from a traditional lock?
[36:13] Viktor Petersson
Yeah, I like where this is going.
[36:19] Iceman
Well, okay, let's see.
[36:24] Iceman
Let's decode that one a little bit.
[36:27] Iceman
One of the most common thing now is to have Bluetooth right.
[36:32] Iceman
So something that they call mobile credentials.
[36:35] Iceman
Yeah.
[36:36] Iceman
So the mobile credential lives in your phone, it lives in a secure element and it's very high crypto because the phone has the compute power and memory to do this stuff.
[36:45] Iceman
Right.
[36:46] Iceman
So that part is very secure.
[36:49] Viktor Petersson
Yes.
[36:50] Iceman
However, over and over again, this is outside already hacking because now we're going into different technology.
[36:56] Iceman
So with Bluetooth, like everything else, right.
[36:59] Iceman
As soon as you can capture the signals, because you can do that before.
[37:03] Iceman
But once you start learning SDR and you're capturing Bluetooth signals and you know how to use the tools, you can also replay things.
[37:10] Iceman
Right.
[37:11] Iceman
And if you don't have a session protocol in that sense in place, those simple Bluetooth locks is very like you just replay, you just record the first opening and then you just replay it.
[37:24] Viktor Petersson
So you go by the day before, put little battery powered sniffer next to the doorway and then you come back the next day.
[37:31] Iceman
Well, you don't have to do that ever.
[37:32] Iceman
It's Bluetooth, it's designed to distance, right?
[37:35] Iceman
So you just need a badass antenna.
[37:37] Iceman
You can sit several meters away, hundreds of meters.
[37:42] Iceman
But it comes to that is a completely different story.
[37:44] Iceman
So this is why it's so fun when you go to Defcon and you go to the radio frequency village or RF hacker sanctuary, right?
[37:51] Iceman
So they teach all of that stuff there.
[37:53] Iceman
They have an excellent CTF that you can play.
[37:56] Iceman
So RF CTF via Devcon, it's well worth it.
[37:59] Iceman
Runs by Ricks.
[38:00] Iceman
Big shout out to those guys and they are really good.
[38:04] Iceman
So if you want to learn the latest and tricks and things, how to do things, you go there and you realize, oh my God.
[38:13] Iceman
But this is yet again, it comes down to costs and administrative money to do this, to secure things with Bluetooth and mobile credentials as is right now it's pretty secure.
[38:27] Iceman
But as always, there are tons of interest.
[38:30] Iceman
As soon as there's a lock, there's a ton of interest among people out there and they're very dedicated to find out there's some bugs and they want to prove to people that they can actually pass by and penetrate that system.
[38:43] Iceman
So there are some interesting talks at Defcon this year, talking about how the secure element on the I class of CIO systems is not proper or they managed to extract the key materials from there.
[38:55] Iceman
And yeah, so that's the same key material that is used for Bluetooth credentials as well.
[39:01] Iceman
So yeah, it comes down to the keys.
[39:05] Iceman
In the end of the day, if you find the keys somehow you can extract it.
[39:09] Iceman
It's game over.
[39:09] Iceman
It doesn't matter.
[39:10] Iceman
It doesn't matter if you have the latest 4000 bits or diffie Hellman or whatever shit you use.
[39:17] Viktor Petersson
Yeah, yeah.
[39:19] Viktor Petersson
If you have access to that, it doesn't really matter.
[39:22] Viktor Petersson
Right.
[39:23] Viktor Petersson
And so walk me back to like, the toolkit that you use.
[39:27] Viktor Petersson
Obviously you have your hardware, the pocmark.
[39:31] Viktor Petersson
And in terms of like, if you go back to the scenario where you try to do your cloning of your bust card that you had ten years ago or 15 years, how many years back that was, how would that process look like with approximately three today or four?
[39:47] Iceman
Sorry, it's proxima free, but auto v four, it's okay.
[39:52] Iceman
It's a silly world.
[39:53] Iceman
It's tons of it.
[39:54] Iceman
But I usually say this, if you want to get started with your fadiac, you don't need very much, right?
[39:59] Iceman
If you have android phone, you can do a lot of HF stuff and learn from there.
[40:04] Iceman
And otherwise you just buy a $30 Proxmox, easy on Tabao, whatever, you buy it, or Amazon, and you have something to start with.
[40:13] Iceman
If you have more money, you can buy a very fancy flipper and then you can do more stuff with that ecosystem.
[40:23] Iceman
But it's a good entry system that you can learn to do things, but you will not understand how.
[40:28] Iceman
It's a point and click.
[40:30] Iceman
That's the cloner thing is one button click.
[40:32] Iceman
Cloners.
[40:34] Iceman
With me, I started out with proximity.
[40:37] Iceman
I had that one for five years.
[40:39] Iceman
People were like amazed, like, how many readers do you have?
[40:42] Iceman
Do you have logic analysis?
[40:44] Iceman
Do you have oscilloscopes?
[40:45] Iceman
What do you do?
[40:46] Iceman
And I'm like, no, I have a proxmox.
[40:49] Iceman
And people didn't understand.
[40:50] Iceman
I can do so much with it.
[40:51] Iceman
It was like, well, you know, I just used the tool that I have and I made it work better to it, but today it looks completely different.
[40:59] Iceman
I have tons of stuff.
[41:01] Viktor Petersson
Yeah, I can imagine.
[41:03] Viktor Petersson
I can imagine.
[41:04] Iceman
It's like, you know the play tools from when you grow up and all of a sudden you have more play twos.
[41:10] Viktor Petersson
That's right, that's right.
[41:11] Viktor Petersson
And less time, but more.
[41:13] Viktor Petersson
More toys, but less time.
[41:14] Viktor Petersson
Yes, yes.
[41:17] Viktor Petersson
So, so if you wanted the crack of my fair card, my fair classic card, that's kind of a super straightforward.
[41:23] Iceman
These days, it's what we call auto porn.
[41:27] Iceman
It's one command, it's you run auto porn and within two to 13 seconds it's done.
[41:33] Iceman
You got all the keys, you've got all memory, and that's it.
[41:36] Viktor Petersson
And then you can clone and write your own key and then you.
[41:38] Viktor Petersson
Happy days, essentially, yeah.
[41:40] Iceman
Mindframe classic doesn't have any security left in it.
[41:44] Iceman
It had some.
[41:45] Iceman
This is amazing research, by the way, I just presented.
[41:47] Iceman
That's why we met up.
[41:49] Viktor Petersson
Yeah, that's right.
[41:50] Iceman
Philip Turvin Dojox is a really good RFID hacker and a great researcher.
[41:57] Iceman
And he works for Quarks Lab, and he has been deeply involved in RFID hacking for years in different other projects.
[42:06] Iceman
And he also used, he actually used to work for NXP and doing the death fire cards in generation 1 hz.
[42:13] Iceman
So it's a big shout out to him.
[42:14] Iceman
He's a great guy.
[42:15] Iceman
He's amazing.
[42:16] Iceman
He's really smart as well.
[42:17] Iceman
He's super smart.
[42:19] Iceman
And what he came up now is one of the cards that was left.
[42:24] Iceman
So my favorite classic came from original ics from NXP.
[42:29] Iceman
First one, the hacked that we broke, that they made an improvement of it, and they call that MiFare classic EV one evolution one.
[42:37] Iceman
That's how they call it.
[42:38] Iceman
Right.
[42:38] Iceman
So that one was secure, came out 2010, I think it was.
[42:42] Iceman
And then 2015 came up in a new attack called the hard nested attack.
[42:46] Iceman
So we have different names of attacks.
[42:48] Iceman
You know, we have a dark side.
[42:49] Iceman
The nested, the hard nested, and it sold these genuine cards.
[42:54] Iceman
Genuine cards follow standard protocol and behaves nicely accordingly.
[42:57] Iceman
And pop Zonken.
[42:59] Iceman
Right.
[43:00] Iceman
However, there was a difference, because when you start doing things, those shows up illegal copies or sublicensed copies of this IC, the Mifra classic.
[43:10] Iceman
Right.
[43:11] Iceman
And they are usually by Fudan, is in microelectronics in China.
[43:16] Iceman
One of them, Fudon, is one of the big ones.
[43:19] Iceman
And they had something that they didn't quite follow the protocol perfectly.
[43:25] Iceman
So the attacks were used before the cryptkeys that you can figure out the nonsense is used, you can restart the PRNG that is used for it.
[43:33] Iceman
But for Fudan cards, they had a different way of doing it.
[43:37] Iceman
We saw one version that had static nones use and only once number, random number is supposed to be used only once static means, but it's not, it keeps on sending the same number.
[43:50] Iceman
It's like, okay, and it was a problem with that.
[43:53] Iceman
And I.
[43:54] Iceman
Till 2020, because then we had to figure out a way to get another nonce and then we could all of a sudden recover keys for it.
[44:00] Iceman
Right.
[44:01] Iceman
But there was another model of this one that we call the static encrypted nonsense.
[44:06] Iceman
And it had a dynamic first nonce, but the second one in the nested part of authentication process, was static.
[44:14] Iceman
And it's really annoying as fuck because you can't do very much with it.
[44:18] Iceman
However, Philipp had a look at this in May this year, and he came up with some amazing findings.
[44:25] Iceman
Made paper, research paper that is gigantic.
[44:28] Iceman
He's going to do a talk about this paper and his findings on hardware I o in October.
[44:33] Iceman
So I don't.
[44:34] Iceman
It's a big shout out to him.
[44:35] Iceman
And I don't want to, you know, take anything about away from his jams.
[44:39] Iceman
I'm not going to talk very much more about the paper in pure respect that I want him to deliver his own message.
[44:44] Viktor Petersson
Right, fair enough.
[44:45] Iceman
But what he did find is a way to figure out things.
[44:50] Iceman
But he started fuzzing.
[44:52] Iceman
Authentication properly call.
[44:53] Iceman
Right.
[44:54] Iceman
So you have an act, you know, to authenticate.
[44:56] Iceman
We have sector key over key a, you send 60, the hex byte 60.
[45:00] Iceman
If you want to authenticate with key b, you send a hex byte 61.
[45:04] Iceman
Right.
[45:04] Iceman
And then the block number.
[45:06] Iceman
Now he was just for the fun of it, let's, you know, he likes doing that things.
[45:10] Iceman
Let me fuzz that one.
[45:11] Iceman
What happens if I send 62?
[45:14] Iceman
What happens, you know, if I go up to six f.
[45:16] Iceman
Right.
[45:17] Iceman
Because why?
[45:18] Iceman
Nothing.
[45:19] Iceman
And then he found out some of the cars actually answered.
[45:24] Iceman
So by fuzzing the authentication protocol, he got announced out of it.
[45:28] Iceman
And it's like, holy mo.
[45:30] Iceman
How come?
[45:30] Iceman
And start to identify with categories of IC, what might be, and, you know, doing his contacts, whatever he has and figuring things out and start collecting things.
[45:39] Iceman
And he comes up with some amazing ideas about.
[45:42] Iceman
Now I can reuse some data that we have here because we got two different ones.
[45:47] Iceman
So the static encrypted nerds, he started analyzing that one back one.
[45:51] Iceman
And then he realized that there is, when you're looking at, there's also android.
[45:58] Iceman
It's android app and you can do things.
[46:00] Iceman
And he looked at the API calls for that one.
[46:02] Iceman
And it's like he can look at the data, goes, oh, wait, I know that data.
[46:05] Iceman
And he realized there's a key.
[46:07] Iceman
It's like, oh, what's this key?
[46:08] Iceman
And it turns out it's static.
[46:10] Iceman
Since a backdoor key that answers to those unauthenticant, not genuine authentication protocol bytes, right?
[46:18] Iceman
It has a static key, so you can read out the memories of his cards.
[46:21] Iceman
That's his findings in his paper.
[46:22] Iceman
And it's fucking amazing how he came up with that.
[46:25] Iceman
He spent like two and a half, three months about it.
[46:27] Iceman
And I'm like, wow.
[46:29] Viktor Petersson
Yeah, that's amazing.
[46:31] Iceman
It is.
[46:32] Iceman
It is.
[46:33] Viktor Petersson
So my fair classic game over in all shapes and form then.
[46:37] Iceman
Yeah, now it's.
[46:38] Iceman
Now it's game over.
[46:40] Iceman
It's nothing there, but it's.
[46:41] Iceman
It's end of life since I think we call it end of Life 2012 or something like that.
[46:46] Iceman
So.
[46:47] Viktor Petersson
But the thing is like life cycle, these locks or wherever doorway, they.
[46:52] Viktor Petersson
They will exceed that, right.
[46:53] Viktor Petersson
They will be in use for like a long period of time past.
[46:56] Iceman
Yeah, yeah, yeah, yeah.
[46:58] Iceman
You know, how often do you change the door locks down there?
[47:01] Iceman
It's like 20 years.
[47:02] Iceman
Right, right.
[47:03] Viktor Petersson
When you change.
[47:04] Viktor Petersson
When you buy a new house and you change the lock because you don't know who has the key previously.
[47:09] Viktor Petersson
Right.
[47:09] Iceman
No husky keys.
[47:10] Iceman
And you know, when we don't want to change the world, so you just want to change the reader.
[47:14] Iceman
So you get the same reader that speaks wigan anyway, because it's cheap.
[47:18] Iceman
And those cards, Mifare classic cards is like what, six cents a dollar now per card?
[47:23] Viktor Petersson
I have a bunch here that I bought for testing.
[47:25] Viktor Petersson
Right, yeah.
[47:27] Iceman
But genuine ones, like desk five is secure ones.
[47:29] Iceman
It's like $0.38.
[47:31] Iceman
So it's a bloody difference in money, right?
[47:35] Iceman
So it's.
[47:36] Iceman
If you're big company or a big house, you know, if you take one of these modern houses, you know, with multi tenants in and people lose the keys left and right and up and downs, it's a lot of money.
[47:47] Iceman
If you go for hotel systems is even worse.
[47:50] Iceman
Right?
[47:50] Viktor Petersson
I mean, they're disposable essentially, right, hotels.
[47:52] Iceman
Mm.
[47:53] Iceman
That's a lot of money.
[47:54] Viktor Petersson
Yeah.
[47:55] Iceman
So secure enough, remember?
[47:58] Viktor Petersson
Right.
[47:59] Iceman
Yeah.
[48:00] Viktor Petersson
So that's.
[48:01] Viktor Petersson
That's interesting.
[48:02] Viktor Petersson
So then obviously there are more modern versions that people should be using, but we expect to see these for the next decade in real world at minimum.
[48:11] Viktor Petersson
Right.
[48:12] Iceman
It's very practical.
[48:13] Iceman
Remember, you can just give them, you know, you can give.
[48:16] Iceman
Here, you can get in.
[48:17] Iceman
Use my card.
[48:18] Iceman
You get in.
[48:18] Iceman
It's practical.
[48:19] Iceman
If you have a mobile credential, you're never going to do this.
[48:21] Iceman
Take my mobile phone and go and open that door.
[48:25] Viktor Petersson
Well, what you can do with mobile credentials, which I think is one of the first, I forgot I started an Airbnb in the Bay Area.
[48:33] Viktor Petersson
This is a long time ago.
[48:34] Viktor Petersson
And they have one of the first smart locks and they have something very clever.
[48:38] Viktor Petersson
This is before the whole like Bluetooth key, but they had expiry.
[48:42] Viktor Petersson
So you can grant people access for a specific duration of time and then your credential automatically expires.
[48:49] Viktor Petersson
Right.
[48:50] Viktor Petersson
Which is much better.
[48:52] Viktor Petersson
Right, than giving somebody key or like if you want to give you cleaner access to your house.
[48:55] Viktor Petersson
Well, I know the clean's gonna gone Wednesday at 09:00 a.m.
[48:58] Viktor Petersson
well, keys can work between 09:00 a.m.
[49:00] Viktor Petersson
and 11:00 a.m.
[49:01] Viktor Petersson
and any time beyond that.
[49:03] Viktor Petersson
No, just no.
[49:04] Viktor Petersson
Right.
[49:06] Viktor Petersson
So I think there is a lot of validity and I think the same thing.
[49:11] Viktor Petersson
I mean in London you have the oyster card which was like the predominant way of like paying for your subway fares, right?
[49:19] Viktor Petersson
Has more lows been eroded for contactless?
[49:22] Viktor Petersson
Like nobody's using oyster card these days because it's like why you have five contactless cards with you that you can equally well pay with.
[49:30] Iceman
Yeah, but you can also pay with your phone, right.
[49:32] Iceman
You just tap and pay for it.
[49:33] Viktor Petersson
Yeah, that's what I mean.
[49:35] Viktor Petersson
Contactless in the sense of like your phone or your watch or whatever it may be kind of supersedes these cards or the need for cards.
[49:45] Viktor Petersson
So yeah, my gut feel would be like they will probably be replaced by software equivalent rather than the next generation of that perhaps.
[49:56] Iceman
Here's the thing with it though, with technology, it's like, I know that you and I, we like technologies for, you know, it's fun and exciting and let's see if there's some bugs in it.
[50:05] Iceman
But when it comes to credentials, remember they always have to work.
[50:10] Viktor Petersson
Yeah.
[50:10] Iceman
So mobile credentials means that your phone has to have some sort of battery, which we usually have, but some of them needs then if you have online verification.
[50:20] Iceman
So your bluetooth has to go to your lock and that one has to verify online that has to be able to talk twenty four seven to a sampling system to verify things, right.
[50:28] Viktor Petersson
And if NFC doesn't do that, NFC can work like Apple pay for instance can work even if you have no signal, right?
[50:34] Iceman
Yes it does.
[50:35] Iceman
Right.
[50:35] Iceman
So and you can also do it like up to 8 hours this reserve some battery power for minimum things, right.
[50:43] Iceman
Because you use your phone today even to start a car.
[50:45] Iceman
Right.
[50:46] Viktor Petersson
That was going to be my next thing I want to talk about.
[50:48] Viktor Petersson
Yeah.
[50:48] Iceman
Yeah.
[50:49] Iceman
So I see it's like you see it as well.
[50:52] Iceman
So mobile credentials and using your phone is going to be natural, but it comes to cost.
[50:56] Iceman
The mobile NFC is not cheap, it's really you pay extra, right?
[51:00] Iceman
Remember it costs thirty eight cents per dollar to get a card and if you add thirty five cents to that you're up in seventy six cents per credential.
[51:09] Iceman
But you can turn it off and turn it on and very easily because you can just sit and maintain that one, you say yes, no, remove, revoke his access, it's gone.
[51:19] Iceman
That's not the same thing with cards.
[51:20] Iceman
Remember, if it's not up connected cards.
[51:23] Iceman
Right.
[51:23] Iceman
Or readers.
[51:24] Viktor Petersson
Right, right.
[51:25] Viktor Petersson
Absolutely.
[51:26] Viktor Petersson
Yeah.
[51:27] Viktor Petersson
Because I was renovating my house and were looking at like, should I get smart locks for every doorway?
[51:33] Viktor Petersson
And I was like, the nerd in me really wants this, but the security person in me is,
[51:39] Viktor Petersson
Is this really a good idea or not?
[51:41] Viktor Petersson
I was looking at the unifi ubiquity office access stuff, which that's probably a company I would trust with this stuff.
[51:47] Iceman
But nonetheless, I think Unifi or ubiket uses desfire.
[51:52] Iceman
So as card credentials is good enough, but then it comes down to cost as well.
[51:57] Iceman
For you, it's like, what do you want it?
[51:59] Iceman
What kind of buck is it?
[52:01] Iceman
How often do my cleaner come, do I need it for that?
[52:04] Iceman
Or.
[52:05] Viktor Petersson
Oh, it was purely like a nerdy exercise.
[52:07] Viktor Petersson
More so than.
[52:07] Iceman
Yeah.
[52:10] Viktor Petersson
Can I justify this as a expense rather than, do I really need this?
[52:15] Viktor Petersson
Because the answer is very much, no, I do not need this.
[52:18] Viktor Petersson
It's more like, can I justify it?
[52:19] Viktor Petersson
Because it's kind of fun.
[52:21] Iceman
It is.
[52:22] Iceman
But I get it.
[52:23] Iceman
I get it totally.
[52:23] Iceman
It is fun.
[52:24] Iceman
And you always get curious, how secure is it?
[52:27] Iceman
And you can bet your bottom dollar on that.
[52:29] Iceman
There is a couple of people looking into just that system and they're bound to find something.
[52:35] Viktor Petersson
Yeah, absolutely.
[52:37] Viktor Petersson
All right, that brings me on.
[52:38] Viktor Petersson
You mentioned cars, and so I think I'm almost bucket cars and consumer alarm system into the same bucket, because I would imagine they're somewhat similar intact.
[52:46] Viktor Petersson
Well, maybe they are.
[52:46] Viktor Petersson
Maybe they are.
[52:47] Viktor Petersson
But let's start with cars.
[52:49] Viktor Petersson
Like what?
[52:51] Viktor Petersson
They use some kind of rfid, I would imagine, for like the authentication for the handshake or is that completely different tech?
[52:59] Iceman
Well, here's the same thing again.
[53:01] Iceman
Right.
[53:03] Iceman
So the old cars use this old technology.
[53:06] Iceman
They have propriety.
[53:08] Iceman
Cryptos, DS 40 and DS 80 and DST 40, DS t 80, I think if that was called.
[53:15] Iceman
And it's also called Megamos ID 48.
[53:19] Iceman
And then it's high tech two and the high tech three and high tech pro.
[53:24] Iceman
It's a lot of things that goes on in the evolution of car entry systems.
[53:28] Iceman
So you have two ways.
[53:29] Iceman
You have a mobilizer system and the car entry.
[53:32] Iceman
Car entry usually is dual frequency today.
[53:36] Iceman
So because key fob sends an rfid signal to the car and the car turns on and sends, or we present, I don't know which one it is.
[53:51] Iceman
If you present the ILF to the door and then the car responds with a signal back.
[53:57] Iceman
Or is it because when you press the button, you send an RF signal and the 433 MHz field of 314 car responds back by looking if the key is near the reader.
[54:09] Iceman
Yeah.
[54:09] Iceman
Like that is.
[54:10] Iceman
So you have to present your key near your handle.
[54:12] Iceman
So it's dual tech to enter the car.
[54:16] Iceman
And then when you start the car, it's usually an authentication process with exchange crypto and say, yes, this is an enrolled key fob in the immobilizer system in Ecuadore.
[54:31] Iceman
However, there's no standard to it.
[54:34] Iceman
Right.
[54:35] Iceman
Hotel system, car systems is not the same as PAX.
[54:42] Iceman
PAx uses the vegan data and then, you know, you can always find that one somewhere there.
[54:48] Iceman
But in the hotel systems and in car systems is individual, how that works.
[54:53] Viktor Petersson
Okay.
[54:54] Viktor Petersson
Yeah.
[54:54] Iceman
Tons of research going on though and I.
[54:57] Iceman
Yeah, yeah.
[54:58] Viktor Petersson
Because a friend of mine had his car stole about one of the replay attacks.
[55:02] Viktor Petersson
Not replay the relay attacks.
[55:03] Viktor Petersson
Right.
[55:03] Viktor Petersson
Where they basically, like, you had to put, like they basically just.
[55:06] Viktor Petersson
Yeah, they big antenna.
[55:08] Viktor Petersson
And they figure out your car is your car keys, probably by the door.
[55:12] Viktor Petersson
So they walk up to the door with big antenna, relay that to the car, open the door and drives away.
[55:19] Iceman
Right.
[55:20] Iceman
It depends on the car and system, you know.
[55:22] Iceman
Was it Toyota, what it was that you can open with a usb stick?
[55:26] Iceman
You can just as soon as you broke in, you can just put a usb stick into, you know, you pop over plastic near them, the key holder, whatever, ignition.
[55:37] Iceman
And then you just put a usb stick in there.
[55:39] Iceman
And the car was on.
[55:41] Iceman
That was Hyundai.
[55:45] Iceman
Same thing.
[55:46] Iceman
But what we do with that relay attack, you know, is.
[55:49] Iceman
See the flipper?
[55:49] Iceman
That's another research.
[55:50] Iceman
We rolling codes and.
[55:52] Viktor Petersson
Yeah.
[55:53] Iceman
And making that you can get out of sync.
[55:56] Iceman
So you record by being a distance when people open or unlock the doors and then you can just replay those.
[56:04] Iceman
Yeah, it's not very good.
[56:06] Iceman
No, no.
[56:08] Viktor Petersson
Yeah.
[56:08] Viktor Petersson
Car hacking is interesting as well, for many reasons.
[56:10] Viktor Petersson
Why I think there was one attack on, I forgot what car that was.
[56:12] Viktor Petersson
I think was a Range Rover, something like that, where they found that if you remove the left front light, you could access the canvas from outside the car and jacks the canvas.
[56:22] Viktor Petersson
Like, game over.
[56:22] Iceman
Yeah, yeah, we do a lot of those things.
[56:26] Iceman
I saw some videos from Ukraine.
[56:28] Iceman
I had this interest this spring looking into high tech two, and it eventually always comes into.
[56:34] Iceman
When you look into high tech two, there's a reason.
[56:37] Iceman
It's because it's very close to car hacking.
[56:41] Iceman
It's very popular for cars.
[56:44] Iceman
Well, it's one more case in England, where you're from, is that the Paxton system uses high tech, too, for copy on cars.
[56:53] Iceman
Anyway, once recovered the keys there, it turns.
[56:58] Iceman
People get very careful because the car hacking and the car stealing, car theft, it's.
[57:06] Iceman
People are like, I asked around because I needed some firmware for the icus.
[57:11] Iceman
I'm like, yeah, I'm looking this, and, you know, and people go like, I like you, icemandhe, but why do you want that stuff for?
[57:21] Viktor Petersson
It's like, you don't get close to my car.
[57:25] Iceman
It's like, you know, all of a sudden, it was very dodgy and people got scared.
[57:29] Iceman
Real.
[57:29] Iceman
Like, I could ask people about EMV payments stuff, and people were like, oh, yeah, you can do this and this.
[57:34] Iceman
But as soon as you start talking about being an interesting car hacking, people were very restrictive with sharing information.
[57:42] Iceman
All of a sudden, I.
[57:44] Viktor Petersson
So, yeah, there is probably a big.
[57:48] Viktor Petersson
A far higher price tag to sell toolkits for stealing cars on the dark web than there is to sell kits for.
[57:59] Viktor Petersson
Like, cloning a hotel fob.
[58:00] Viktor Petersson
Right?
[58:01] Viktor Petersson
Like, there's a lot more financial interest in.
[58:03] Viktor Petersson
In that space than there is obviously, in.
[58:05] Viktor Petersson
In passageways.
[58:07] Iceman
Oh, God.
[58:08] Iceman
I can show you one thing.
[58:09] Iceman
One more thing.
[58:10] Viktor Petersson
Yeah.
[58:11] Iceman
I'm sorry.
[58:12] Viktor Petersson
No, no, I see you have.
[58:15] Viktor Petersson
I see you have the best social engineering kit behind you there, which is a hive.
[58:20] Viktor Petersson
This vest, that's the best.
[58:21] Iceman
Yeah, it's from Wigglenet.
[58:24] Iceman
I got it now at Defcon.
[58:25] Iceman
So big shout out to those people.
[58:29] Iceman
Hi, wiz.
[58:30] Iceman
I should have it.
[58:31] Iceman
This is what I bought because this is a high tech two cloner, and the software says it can clone BMV, Opal, and all these different things.
[58:40] Iceman
But none of the software has their needed phones files for it, so it's completely useless.
[58:47] Iceman
So I was like, okay, where do I get those from?
[58:49] Iceman
And it's like, no.
[58:52] Iceman
So you see, this one is sold everywhere, but it's completely useless as is.
[58:58] Iceman
And with software that you get.
[59:01] Viktor Petersson
Yeah, no, because that.
[59:03] Viktor Petersson
Yeah, I was looking at.
[59:04] Viktor Petersson
I have on my car.
[59:05] Viktor Petersson
I only have one car key on my car, so I was.
[59:08] Iceman
Which car do you have?
[59:09] Viktor Petersson
It's Passat.
[59:10] Viktor Petersson
So not.
[59:10] Viktor Petersson
Not super sexy, but I want to get clone.
[59:12] Viktor Petersson
I was gonna clone it.
[59:13] Viktor Petersson
How old is it?
[59:15] Viktor Petersson
2020?
[59:17] Viktor Petersson
I think that.
[59:17] Viktor Petersson
2016, I think 16.
[59:19] Iceman
Oh, then it could be a high tech, too.
[59:22] Viktor Petersson
Yeah.
[59:23] Viktor Petersson
So I was just thinking, like, can I clone it myself?
[59:27] Viktor Petersson
And I was looking at it.
[59:28] Viktor Petersson
A lot of people can come and clone it for you.
[59:29] Viktor Petersson
I was like,
[59:30] Viktor Petersson
I don't really want some random dude, shop my doorway, clone my core key and give me a spare copy.
[59:35] Viktor Petersson
And he's like, let me save that firmware real quick.
[59:39] Iceman
But of course, you know, let me hook up my gear to your can bus and program it for you, because that's how you do it.
[59:45] Iceman
But I forgot to delete the files.
[59:48] Viktor Petersson
Exactly.
[59:49] Viktor Petersson
But it's.
[59:50] Viktor Petersson
It's interesting because I was, like, looking into how hard is to buy the kit.
[59:53] Viktor Petersson
And you can buy the kit.
[59:54] Viktor Petersson
It's not that expensive to buy it.
[59:55] Viktor Petersson
Well, it's far more expensive than buying a key clone, of course.
[59:59] Viktor Petersson
But, yeah, it's in the hundreds of pounds.
[01:00:02] Viktor Petersson
Rather than paying somebody 50 quid to do it.
[01:00:04] Iceman
Yeah, 400 pounds.
[01:00:06] Viktor Petersson
Yeah, something like that.
[01:00:07] Viktor Petersson
400 quid or something like that.
[01:00:09] Viktor Petersson
So I was on the verge of, like, purely from a scientific perspective, kind of want to buy one of these myself.
[01:00:14] Iceman
I was about to buy one as well.
[01:00:15] Viktor Petersson
Yeah.
[01:00:17] Viktor Petersson
Just, just for shits and giggles, really.
[01:00:19] Iceman
But sure, whatever tickles you.
[01:00:24] Iceman
I was, for the interest of learning.
[01:00:27] Viktor Petersson
Yeah, let's call that.
[01:00:32] Viktor Petersson
But, yeah, it's.
[01:00:33] Viktor Petersson
But, yeah, it's interesting that.
[01:00:36] Viktor Petersson
But it's relatively accessible.
[01:00:38] Viktor Petersson
These toolkits you can buy.
[01:00:39] Viktor Petersson
I mean, Flipper is kind of the same category of, like, click and play security tool.
[01:00:45] Viktor Petersson
So there is the same thing for the car space, like things that can connect to the canvas and do a lot of funny things.
[01:00:51] Viktor Petersson
I haven't really gotten that far in my journey of car hacking, but maybe.
[01:00:57] Iceman
Do you feel it now?
[01:00:58] Iceman
Do you feel how it spreads out?
[01:00:59] Iceman
I usually call RFId hacking that it.
[01:01:02] Iceman
It encompasses.
[01:01:03] Iceman
It engulfs all of hacking.
[01:01:07] Iceman
Right?
[01:01:08] Iceman
It's low level hardware.
[01:01:09] Iceman
It's firmware extraction, it's crypto keys, it's software, bugs, patches or whatever.
[01:01:15] Iceman
It really covers all of it and spreads out.
[01:01:18] Iceman
It's not just this narrow little thing.
[01:01:20] Iceman
Oh, no, it's just this.
[01:01:21] Iceman
It just spreads out.
[01:01:23] Viktor Petersson
Yeah, no, absolutely.
[01:01:25] Viktor Petersson
And it's used both for identity and for cryptography.
[01:01:29] Viktor Petersson
And like, yeah, there's a lot of intersection about all things tech in the realm of RFID, which is super interesting.
[01:01:37] Viktor Petersson
The last thing I want to cover is alarm systems.
[01:01:40] Viktor Petersson
I'm curious about, like, that's probably the most common use case for RFID tags for consumers, home consumers today, because almost every alarm system you buy today, they would have an RFID ish right with them.
[01:01:56] Viktor Petersson
How much can you speak about that?
[01:01:57] Viktor Petersson
Like what?
[01:01:58] Viktor Petersson
How secure are they?
[01:01:59] Viktor Petersson
Like, how worried should one be about cloning attacks on those types of forbes?
[01:02:06] Iceman
It's kind of similar to pax.
[01:02:09] Viktor Petersson
Oh, yeah.
[01:02:10] Iceman
So it's if you go from my, our region in the world where I said that they have a lot of low frequency tags, a lot of alarm systems in our region in the world has low frequency tags encoded into them.
[01:02:23] Iceman
So that's, that tells you a little bit about that one.
[01:02:26] Iceman
And there are some with more, you know, with high frequency tags, but usually it's, if it uses one of card technologies that is normal.
[01:02:39] Iceman
You know, what we already have full access to and ways of recovering the keys and access the memory.
[01:02:46] Iceman
It's not a thing to make a copy of it.
[01:02:49] Iceman
Right.
[01:02:51] Viktor Petersson
Have you thought about brute force attacks for like alarm system like that?
[01:02:54] Viktor Petersson
Can you do like a brute force attack with something like an SDR esque thing where you just like, well, I know the identity looks like six, I don't know, six characters or it's a six inch, whatever it may be.
[01:03:04] Viktor Petersson
Right.
[01:03:05] Viktor Petersson
Can you just like, are these alarm system, for instance, sophisticated enough to prevent against the brute force, like we just like literally iterate to all combinations?
[01:03:13] Iceman
I don't think so.
[01:03:15] Iceman
To be honest, I haven't looked into that one, but I doubt that they take those kinds of attacks in because it's not feasible that you're going to stand next to when you've broken in and you're going to put your flip over and like, no, but you could.
[01:03:28] Viktor Petersson
Stand outside and just broadcast it, right?
[01:03:31] Iceman
Yeah, well, yeah, if it's all like we did again with RFID, it's.
[01:03:37] Iceman
You can't transmit.
[01:03:38] Iceman
Yeah.
[01:03:38] Iceman
You have to be physically there.
[01:03:40] Iceman
So that's the limit.
[01:03:41] Iceman
Right.
[01:03:43] Iceman
You should be able, if you access to the house, whatever to do, you know, to make a simulation and then you change the data that is needed to iterate the different things and you keep on doing it until you figure, hit the pay dirt.
[01:03:56] Iceman
I mean, that's another way of when we do RFID hacking is to let the proxmo Cora nowadays, a flipper to simulate a tag and then you see what comes out of it.
[01:04:06] Viktor Petersson
Right.
[01:04:07] Iceman
And simulate different things.
[01:04:08] Iceman
Yeah.
[01:04:08] Viktor Petersson
Trial and error essentially.
[01:04:09] Viktor Petersson
Right?
[01:04:10] Iceman
Yeah.
[01:04:11] Iceman
Well, it's kind of fun.
[01:04:13] Iceman
You can also make things go boop if you know how to fuzz 14 a or whatever anti collision protocol, if you know that you can make readers go, holy moly, I didn't like this anymore.
[01:04:26] Iceman
And you don't overheat and just, and.
[01:04:29] Viktor Petersson
Just collapse, or I would imagine that's an other interesting attack factor.
[01:04:40] Viktor Petersson
Yeah, fair enough.
[01:04:42] Viktor Petersson
All right.
[01:04:43] Viktor Petersson
I think we cover a lot of interesting ground here and I think there's probably like an hour worth more of content that we could be zooming in.
[01:04:50] Viktor Petersson
Maybe we'll break that into another episode for the readers and listeners to have a bit of a break.
[01:04:56] Viktor Petersson
But I think this has been super interesting.
[01:04:58] Viktor Petersson
I've learned a lot and I have not even gone through all my notes yet because I had a lot a few more here that I wanted to cover.
[01:05:05] Viktor Petersson
So I think that to be an episode part two for this one where we dive into even more of these things.
[01:05:11] Viktor Petersson
Once I made my through my backlog of your Defcon talks and your other talks, I probably got a couple even more questions.
[01:05:19] Iceman
No worries, man.
[01:05:19] Iceman
I liked it.
[01:05:20] Iceman
Much appreciated to be on your show, man.
[01:05:23] Viktor Petersson
Really good.
[01:05:24] Viktor Petersson
So, and if one wants to buy a Proxmark three, where does one go and procure one of those?
[01:05:30] Iceman
Well, you just go to Amazon or eBay or Aliexpress Alibaba and you buy something.
[01:05:36] Iceman
I usually tell people, don't spend too much money.
[01:05:40] Iceman
If you're corporate and you're working as a pen tester, you can spend the two $300 that you have to do for an auto v four.
[01:05:47] Iceman
It's worth it.
[01:05:48] Iceman
But if you like a hobbyist, buy a $30, make sure that's a 512 flash memory on it, and then you will run the latest firmware, the Iceman version of course, on it.
[01:06:03] Iceman
And you will have everything that needs to be done right.
[01:06:06] Iceman
But the quality could be a bit dodgy sometimes for someone.
[01:06:09] Iceman
But that's why we have a discord.
[01:06:11] Iceman
We have, in the discord, we have a shopping channel where you get, you know, you just ask there and you will get a link to places where unknown to sell great stuff.
[01:06:22] Iceman
And I, you know, I don't take sides anymore in that sense.
[01:06:26] Iceman
I think it's just, you know, they, you know, if you want to buy it in English, I can mention a lot of people who can sell it for you in England.
[01:06:36] Viktor Petersson
I can put them in the show links if you send over some afterwards.
[01:06:39] Viktor Petersson
And I can put in links to their Discord channel as well because it seems like a lot of stuff.
[01:06:43] Viktor Petersson
That's where a lot of conversation is happening.
[01:06:45] Iceman
Oh yeah, for sure.
[01:06:46] Iceman
Sure.
[01:06:46] Viktor Petersson
So I'll make sure to put that in the show notes.
[01:06:48] Viktor Petersson
So good stuff.
[01:06:50] Viktor Petersson
Much appreciated as well.
[01:06:51] Viktor Petersson
Very much enjoyed the hour conversations and I guess until next time, thank you so much.
[01:06:57] Iceman
Thank you so much.
[01:06:58] Viktor Petersson
Bye.

Found an error or typo? File PR against this file or the transcript.