, Track 2
This talk provides a concise overview of Radio Frequency Identification (RFID) technology and its vulnerabilities, focusing on the Chameleon Ultra, a powerful RFID emulation tool. Through a detailed explanation and live demonstration, we will explore how attackers can clone and write to RFID cards used in access control, simulating real-world security threats. Attendees will gain insights into RFID’s weaknesses and the critical need to protect emerging technologies from unauthorised exploitation.
This session introduces the fundamentals of Radio Frequency Identification (RFID) technology, explaining how RFID tags enable applications like access control and asset tracking. The focus then shifts to vulnerabilities that allow attackers to clone and write to RFID cards. Using the Chameleon Ultra, an open-source RFID tool, we will demonstrate real-world attack scenarios, showing how to read, emulate, and write card data to bypass security measures. Attendees will see the step-by-step process of cloning cards and learn about technical and ethical challenges. The talk concludes with practical defense strategies, such as cryptographic authentication and anomaly detection, to secure RFID systems as their use expands across industries.
Smitha Bhabal is a passionate offensive security enthusiast and an undergrad cyber security student, constantly exploring the digital world’s vulnerabilities and mastering the art of ethical hacking.
Recent first-class Computer Science graduate and top of my class, skilled in engaging training and RFID 2FA research to reduce cyber risk.