What Type of Rfid Cards Can Be Easily Cloned
What Type of Rfid Cards Can Be Easily Cloned
What Type of Rfid Cards Can Be Easily Cloned
Andrzej Mackiewicz
Student ID: 18157815
School of Computing
National College of Ireland
School of Computing
Module: Internship
I hereby certify that the information contained in this (my submission) is information
pertaining to research I conducted for this project. All information other than my own
contribution will be fully referenced and listed in the relevant bibliography section at the
rear of the project.
ALL internet material must be referenced in the bibliography section. Students are
required to use the Referencing Standard specified in the report template. To use other
author's written or electronic work is illegal (plagiarism) and may result in disciplinary
action.
I agree to an electronic copy of my thesis being made publicly available on NORMA the
National College of Ireland’s Institutional Repository for consultation.
Signature: …
Date: 17/08/2020
Assignments that are submitted to the Programme Coordinator Office must be placed
into the assignment box located outside the office.
Reference:................................................................................................................................................................ 23
Abstract
The technology used at the end of ‘40s has advanced, but the security of the RFID has
not improved much since. There are still many vulnerabilities that enable accessing
information from different types of tags or cards and this thesis addresses those available on
the market. RFID systems – tags, sensors, readers, middleware and applications are trying to
solve specific business needs. This technology is used in almost everything - from books,
clothing and parts of aircraft to medicine and many other environments. The general lack of
understanding and awareness leads to confusion about what it is, its capabilities and
limitations. This document makes its contribution to the access control, which are badges that
are used to access office buildings. Many people expose their identity badges, but forgetting
about hackers that might want to steal their identity. This thesis presents different card types
and shows their classifications - the problem of exposing badges concerns academic, private,
and public life. There are tools on the market that enable to clone them. This research shows
how easy it is to clone the latest version of the badges used by companies and colleges in
2020.
1. Introduction
1.1 Motivation
Before developing a methodology to show the vulnerability of the security cards, a better
understanding is a role in cybersecurity is required:
Understanding of the elements required to access a building and current methods used lead to
the following research question:
Chapter 2 includes a description of the elements of the system and RFID components, their
classification and how the system works. There are also tables with a detailed description of
the electronic microchip, different types of communications and general awareness about
RFID cybersecurity.
Chapter 4 talks about the general approach, including a programmatic approach, the
methodology of the research, and specific hardware used for this study.
Chapter 5 describes case studies with challenges including mythology, hardware used and
results. Each case used different hardware and different types of RFID cards.
Chapter 6 contains legal and ethical consideration that has been used in the research,
implication of the decision making and ways of working.
Chapter 7 describes the conclusion and recommendation based on results from chapter 5.
The above picture presents a reader generating a time-varying magnetic field, that has an AC
voltage at the tag. Then AC is changed to DC to energise the microchip tag, the antenna coil
in the reader tag is in an electric circuit (LC), which has the effect of the maximum energy
transfer from the reader to the tag when is in the right frequency. Rate frequency translates to
a lower number of turns in the antenna coil. Amplitude Modulation (AM) is achieved once
the tag and the antenna get energised. The reader modulates its magnetic field amplitude
according to the digital information transmitted to the tag carding its ID by turning on and off
its load resistor by its ID, called load modulation. The reader tunes its magnetic field
according to the information size or signal frequency transmitted to the tag. [11] Enrique
Valero. (2015)
Electromagnetically Coupled Systems called backscatter systems work in the UHF and
microwave frequency. The reader’s antenna sends out a continuous electromagnetic wave
(EM) containing AC power to the tags to energise their microchips. When communication is
achieved (the tag and the reader) by changeable the amplitude of the EM waves reflected the
digital data to be transmitted. Far-field backscatter systems may cause problems that do not
exist in HF or LF systems. The main problem is the reflection of the reader field. It is due to a
similar dimension to the wavelength used and it can cause damping or even cancellation. [12]
Raad Raad. (2010)
[12] Raad Raad. (2010), [13] R. Want. (2006), [14] Suzanne Smiley. (2016), [15] NATE,
TONI_K, A_CAVIS. (2018), [16] Dhanasekaran Raghavan. (2015), [17] Slawomir Jasek
(2018).
Those threats have given a massive rise in the RFID-blocking products. Smart wallets and
clothing may prevent unwanted wireless reading or skimming; however, there is still a
question if skimming is profitable, because on the dark web you can get a stolen credit card
number for $5. [18] Simon Hill. (03/2019).
4.2. Methodology
Hacking RFID is not as hard as people may think. Most conventional systems, some practical
knowledge. UID-based access control.
4.2.1. Use of Specific Arduino and Mifare RC522 Card Reader Antenna
The Mifare Classic tag is used in many places in the world. A card uses stream cypher
CRYPTO1 that has been reverse-engineered shortly after the first attack. The first method
uses Arduino board, and a RC522 Card Reader/Write antenna, plus free software (code for
Arduino) to copy a card is available on github.com. It shows how information is stored and
methods used to dump, read and write info to the clean card. [28] Márcio Almeida. (2014).
5. Case studies
5.1. Case Study 1 Introduction
The first case study was regarding a Mifare Classic card, which uses a RFID reader/writer
‘RC522’ bought on AliExpress. It comes with a card and a tag. The MFRC522’s internal
transmitter is able to drive the reader/writer antenna designed to communicate with ISO/IEC
14443 A/MIFARE cards and transponders without additional active circuitry. The receiver
module provides a robust and efficient implementation for demodulating and decoding
signals from ISO/IEC 14443 A/MIFARE compatible cards and transponders. The digital
module manages the complete ISO/IEC 14443 A framing and error detection (parity and
CRC) functionality. [30] www.nxp.com. (2016).
The card is reliable and extremely thin, inside there is a coil of wire around outside the card.
By using touch, the coil is visible. The chip connected to the coil is embedded in the card.
Sector Trailer is a 3rd block of each sector that contains Access Bits, which allow to read and
write. The last 3 blocks are available for data storage; it means that 48 bytes per 64 are for
own use. The Unique Identifier (UID) stored in block 0 and sector 0 it also contains an
integrated circuit (IC) manufactured data which is highlighted above in purple. Each sector is
protected by secret keys A and secret keys B, data on these tags encrypted by NXP security
protocol.
[33]www.nxp.com.
HF LF
The majority of the LF cards are from HID company and one from COTAG.
This sign indicates it failed to read the UID from the card.
HID
The type of HID cards carries significant markings that identify unique tree characteristics
about the construction and personalisation: Static Artwork - the user to identify technology:
Seos, iCLASS or HID Prox card other. Dynamic Marking - Allows the user to allocate
memory size or program sales number. Slot Punch - marks (dots), in either vertical or
horizontal planes, identify ID-1
The data on any access card it a binary numbers of fixed length and used to determine the
cardholder
Here are the most common types of cards:
• Magnetic Stripe
• Wiegand (swipe)
• 125 kHz Prox (HID & Indala)
• MIFARE contactless smart cards
• iCLASS contactless smart cards
• Many more
Example Output [34]HID. (2017), [35]HID. (2016), [36]HID. (2014), [37]HID. (2012).
The following is an example of an ID card with the number of “816” decimal, which will be
output by the MaxiProx reader, the number “02004CA0661” hex. Note: The customer c e
is never transmitted or displayed: [37]HID. (2012). 10 HEX characters with leading zero drooped
18bit preamble=7bit Customer code+10 zeros+1bit Sentinel 18bit preamble= 7bit Customer code + 10 zeros + 1 Sentinel bit
The known command for HID card is ‘lf hid’ to check other available commands for that
hardware: Interest in this to make a copy of it, had to use ‘lf hid clone UID’:
The example shows that the NCI student number is 102804. At first, I had to put a card on
proxmark3 and used ‘lf search’ command to get HEX number of the card which is
2184032328, next replaced a card with blank card type T5577 and used
‘lf hid clone 2184032328’ command to clone it. To check the result of the card was
successfully cloned, had to used ‘lf search’ again (bellow screenshot).
The last step is to make sure that the HEX ID and UID are the same. To do that, I had to go to
https://www.brivo.com/card-calculator/ and check if the number matches. In the field
“HEX”, I typed “2184032328”, and from the dropdown chose 33 bit (it was the closest one to
the version of the card). The result showed that Internal Card # is the same as on the back of
the student card.
The above picture shows successfully retrieved HEX and decimal information. The next steps
to clone a card is to follow the 5.2.4 Case Study 2 Method.
6.1. Conclusion
This thesis is to show that hardware available on the market allows cloning current RFID
cards used for access control. Arduino and Proxmark3 Easy used in my case study cost less
than 50 euro. Open source software allows to clone the card. The last remote tool that allows
stealing UID card during a walk around people in the public area to steal their card info. All
steps presented in this methodology describe the results of the research on how to clone an
employee badge id. In 2020 this research proves that no steps taken to improve the security of
HID Prox and MIFARE cards because was able to clone some of them. The cards that protect
physical access to workplaces are still vulnerable to attackers that can steal cards ids to enter
the building and access sensitive information. The only problem to get the information was
COTAG card that required specific hardware to get data, and which was not able to find any
device that can clone those cards. It proves that in case studies where HID cards were
available, it is easy to clone and COTAG card can’t be cloned with currently available
hardware. The findings from this thesis apply to most businesses that uses these cards. Most
of the companies that use these cards are not aware of vulnerabilities for this brand and type
of the card. There is more work to do in case study 3, for example to re-solder parts used to
make for stealing card id on the street. Then another future work will be getting aware that
allows read and clone COTAG cards as was unfortunate to access information on this card,
hope to finish those projects later on this year.
6.2. Recommendations
The RFID’s feel weak itself as there a new theft trend called RFID skimming. Because of that
trend, there was a need to introduce new wallets or sleeves to secure RFID cards. Protectors
may address the data stilling and stop data collection. However, to fully ensure access control
to the building, there is a need for an additional PIN or/and biometric signature to identify the
owner of the card. RFID is a technology that has many benefits, and should be used as
authentication for access control, but, it should be used with additional proof of the identity.
Reference:
[1] Peter Darcy, Prapassara Pupunwiwat and Bela Stantic (2010) The Challenges and Issues
Facing the Deployment of RFID Technology. Available at:
https://core.ac.uk/download/pdf/143854065.pdf. Last accessed: 2020
[2] Rich Handley. (2005). The History of RFID Technology. Available:
https://www.rfidjournal.com/articles/view?1338/. Last accessed 2020
[3] n/a. (2017). Friend or foe: securing aircraft IFF systems. Available: www.airforce-
technology.com. Last accessed 2020
[4] Krebs on security. (2014). How Secure is Your Security Badge? Available:
https://krebsonsecurity.com/2014/08/how-secure-is-your-security-badge/. Last accessed
2020.
[5] R. Want. (2006). An introduction to RFID technology. Available:
https://ieeexplore.ieee.org/document/1593568. Last accessed 2020.
[6] Wiki. (2020). Radio. Available: https://en.wikipedia.org/wiki/Radio. Last accessed 2020.
[7] Wiki. (2020). Frequency. Available: https://en.wikipedia.org/wiki/Frequency. Last
accessed 2020.
[8] Wiki. (2020). ID. Available: https://en.wikipedia.org/wiki/ ID. Last accessed 2020.
[9] Chris Woodford. (08/2019). Radiofrequency (RF and RFID) tags. Available:
https://www.explainthatstuff.com. Last accessed 2020.
[10] (n/a). newaverfid.com/. RFID READER ANTENNA BASICS – OPTIMISING TAG
SELECTION & DEPLOYMENT. Available: https://newaverfid.com/blog. Last accessed
2020.
[11] Enrique Valero. (2015). Evolution of RFID Applications in Construction: A Literature
Review. Available:
https://www.researchgate.net/publication/278709835_Evolution_of_RFID_Applications_in_
Construction_A_Literature_Review. Last accessed 2020.
[12] Raad Raad. (2010). Dheeraj K. Klair School of Electrical, Computers,
Telecommunications Engineering, University of Wollongong, Northfields Avenue, NSW,
Australia; Kwan-Wu Chin; A Survey and Tutorial of RFID Anti-Collision
Protocols. Available: https://ieeexplore.ieee.org/document/5455790. Last accessed 2020.
[13] R. Want. (2006). An introduction to RFID technology. Available:
https://ieeexplore.ieee.org/document/1593568. Last accessed 2020.
[14] Suzanne Smiley. (2016). Active RFvsvs. Passive RFID: What is the Difference?.
Available: https://blog.atlasrfidstore.com/active-rfid-vs-passive-rfid. Last accessed 2020.
[15] NATE, TONI_K, A_CAVIS. (2018). RFID Basisc. Available:
https://learn.sparkfun.com/tutorials/rfid-basics/all#introduction. Last accessed 2020
[16] Dhanasekaran Raghavan. (2015). Schematic diagram of active RFID System. .
Available: https://www.researchgate.net/figure/Schematic-diagram-of-active-RFID-
System_fig1_283126585. Last accessed 2020.
[17] Slawomir Jasek (2018). A 2018 practical guide to hacking NFC/RFID. Available:
https://smartlockpicking.com/slides/Confidence_A_2018_Practical_Guide_To_Hacking_RFI
D_NFC.pdf . Last accessed 2020
[18] Simon Hill . (03/2019). RFID-blocking products are practically worthless. Here is why.
Available: https://www.digitaltrends.com/cool-tech/are-rfid-blocking-products-worth-your-
money-we-asked-an-expert/. Last accessed 2020.
[19] WILL OREMUS. (08/2015). The Skimming Scam. Available: https://slate.com/human-
interest/2015/08/credit-cards-passports-and-rfid-fraud-are-special-blocking-wallets-
necessary.html. Last accessed 2020.
[20] Sid Kirchheimer. (n/a). Hands-Free Pickpocketing. Available:
https://www.aarp.org/money/scams-fraud/info-01-
2011/scam_alert_handsfree_pickpocketing.html. Last accessed 2020.
[21] Krebs on security. (2014). How Secure is Your Security Badge. Available:
https://krebsonsecurity.com/2014/08/how-secure-is-your-security-badge/. Last accessed
2020.
[22] Jasser Al-Kassab and Wolf-Christian Rumsch. (2008). Challenges for RFID Cross-
Industry Standardization in the Light of Diverging Industry Requirements. Available:
https://ieeexplore.ieee.org. Last accessed 2020.
[23] rfidnews.com. (2009). SO 11784/85 "STANDARD" WITH BLEMISH. Available:
https://www.rfidnews.com/ISOstandard/ISOstandard.html. Last accessed 2020.
[24] www.iso.org. (2018). iso14443. Available: https://www.iso.org/obp/ui/#iso:std:iso-
iec:14443:-1:ed-4:v1:en. Last accessed 2020.
[25] www.iso.org. (2019).Iso 15693. Available: https://www.iso.org/obp/ui/#iso:std:iso-
iec:15693:-3:ed-3:v1:en. Last accessed 2020.
[26] Mohamed El Beqqal*, Mostafa Azizi. (2017). Review on security issues in RFID
systems. Available: https://www.astesj.com/publications/ASTESJ_020624.pdf. Last accessed
2020.
[27] https://cyberops.in/. (2019). New generation of the hacking RFID.Available:
https://cyberops.in/blog/new-generation-hacking-rfid-attacks/. Last accessed 2020.
[28] Márcio Almeida. (2014). Hacking Mifare Classic Cards. Available:
https://www.blackhat.com/docs/sp-14/materials/arsenal/sp-14-Almeida-Hacking-MIFARE-
Classic-Cards-Slides.pdf. Last accessed 2020.
[29] bishopfox.com. (n/a). RFID-Hacking. Available:
https://resources.bishopfox.com/resources/tools/rfid-hacking/attack-tools/. Last accessed
2020.
[30] www.nxp.com. (2016). MFRC522 Standard performance MIFARE and NTAG frontend.
Available: https://www.nxp.com/docs/en/data-sheet/MFRC522.pdf. Last accessed 2020.
[31] Miguelbalboa and Rotzbua. (2018). Rfid. Available:
https://github.com/miguelbalboa/rfid. Last accessed 2020.
[32] sparkfun.com/. (n/a). Serial Peripheral Interface (SPI). Available:
https://learn.sparkfun.com/tutorials/serial-peripheral-interface-spi/all. Last accessed 2020.
[33] www.nxp.com. (n/a). MF1S50YYX_V1 MIFARE Classic EV1 1K - Mainstream
contactless smart card IC for fast and easy solution development. Available:
https://www.nxp.com/docs/en/data-sheet/MF1S50YYX_V1.pdf. Last accessed 2020.
[34] HID. (2017). HID GLOBAL CREDENTIAL IDENTIFICATION
MARKINGS. Available:
https://www.hidglobal.com/sites/default/files/resource_files/an0109_a.2_credential_id_marki
ngs_application_note.pdf. Last accessed 2020.
[35] HID. (2016). Understanding Card Data Formats. Available:
https://www.hidglobal.com/sites/default/files/hid-understanding_card_data_formats-wp-
en.pdf. Last accessed 2020.
[36] HID. (2014). Card Identification Markings Application Note. Available:
https://www.hidglobal.com/sites/default/files/resource_files/an0109_a.1_card_identification_
markings_an.pdf. Last accessed 2020.
[37] HID. (2012). MaxiProx® DFM Reader - 5375. Available:
https://www.hidglobal.com/sites/default/files/resource_files/21737750-5375-901_e.1.1.pdf.
Last accessed 2020.
[38] Vanderbilt. (2017). Passive Cotag card without magnetic stripe. Available:
https://vanderbilt-ams-assets.s3.eu-west-
1.amazonaws.com/mM84sWEKujnf8kRGvmV9LCGK?response-content-
disposition=inline%3B%20filename%3D%22v54501s74a1_ib958_023_01_en.pdf%22%3B
%20filename%2A%3DUTF-8%27%. Last accessed 2020.
[39] Contributor (2012). Questions and Requests» Cotag cards?. Available:
http://www.proxmark.org/forum/viewtopic.php?id=1258. Last accessed 2020.
[40] Iceman. (2017). Cotag Analysis. Available:
http://www.proxmark.org/forum/viewtopic.php?id=4455. Last accessed 2020.
[41] www.proxmark.org. (2013). pm3-bin-2.4.0 . Available:
http://www.proxmark.org/forum/viewtopic.php?id=1562. Last accessed 2020.
[42] Chris Woodford. (08/2019). Radio frequency (RF and RFID) tags. Available:
https://www.explainthatstuff.com. Last accessed 2020.
[43] James Thrasher. (2013). How is RFID Used in Real World Applications?.Available:
https://blog.atlasrfidstore.com
/what-is-rfid-used-for-in-applications. Last accessed 2020
[44] ROBERT MCMILLAN. (2012). The Pwn Plug is a little white box that can hack your
network. Available: https://arstechnica.com/information-technology/2012/03/the-pwn-plug-
is-a-little-white-box-that-can-hack-your-network/. Last accessed 2020
[45] Frank Thornton, Brad Haines,John Kleinschmidt. (2005). RFID Security. Available:
https://www.sciencedirect.com/book/9781597490474/rfid-security. Last accessed 2020
[46] Mohamed El Beqqal ; Mostafa Azizi. (2017). Classification of major security attacks
against RFID systems. Available: https://ieeexplore.ieee.org/document/7934622. Last
accessed 2020
[47] F5 DevCentral. (2014). Elliptic Curve Cryptography Overview. Available:
https://www.youtube.com/watch?v=dCvB-mhkT0w. Last accessed 2020
[48] Xu Huang1, Son Le2, and Dharmendra Sharma. (2017). A Taxonomy for RFID
Systems. Available:
https://pdfs.semanticscholar.org/6d73/594d0a01539c0a7348909108974388aea0e5.pdf. Last
accessed 2020
[49] Matt Ward. (2006). RFID: Frequency, standards, adoption and innovation. Available:
http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.102.3390&rep=rep1&type=pdf.
Last accessed 2020
[50] Manfred Aigner (TU Graz), Thomas Plos (TU Graz), Antti Ruhanen (Confidex), Stefano
Coluccini (CAEN). (2008). Secure Semi-Passive RFID Tags Prototype and Analysis.
Available: https://docplayer.net/4950927-Secure-semi-passive-rfid-tags-prototype-and-
analysis.html. Last accessed 2020
[51] Prototype Express. . (n/a). RFID Technology White Paper. Available:
http://www.prototypexpress.com/rfidwhitepaper.htm. Last accessed 2020
[52] Suzanne Smiley. (2016). 7 Types of Security Attacks on RFID Systems. Available:
https://blog.atlasrfidstore.com/7-types-security-attacks-rfid-systems. Last accessed 2020
[53] RFIDNEWS. (n/a). SO 11784/85 "STANDARD" WITH BLEMISH. Available:
https://www.rfidnews.com/ISOstandard/ISOstandard.html. Last accessed 2020
[54] ISO. (n/a). ISO 24631-1:2017. Available: https://www.iso.org/standard/63394.html. Last
accessed 2020
[55] www.rfidjournal.com. (2017). What Is the Difference Between ISO 15693 and ISO
14443A Tags. Available: https://www.rfidjournal.com/blogs/experts/entry?11979. Last
accessed 2020
[56] Norbert Druml∗, Manuel Menghin∗, Adnan Kuleta†, Christian Steger†, Reinhold
Weiss† Holger Bock∗, Josef Haid∗. (2014). A Flexible and Lightweight ECC-Based
Authentication Solution for Resource Constrained Systems. Available:
https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6927267. Last accessed 2020
[57] Peter H. (2008). Chapter 16: “A Random Number Generator for Application in RFID
tags”. Available:
https://www.researchgate.net/publication/226272610_A_Random_Number_Generator_for_A
pplication_in_RFID_Tags. Last accessed 02020
[58] Murali Kodialam. (2007). Anonymous Tracking using RFID tags. Available:
https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4215727. Last accessed 2020
[59] Ritu Tripathi, Sanjay Agrawal. (2014). Comparative Study of Symmetric and
Asymmetric Cryptography Techniques. Available:
https://pdfs.semanticscholar.org/e0e4/810c5276f9c05cc82425fcf911f206c52bef.pdf. Last
accessed 2020
[60] Flavio D. Garcia Peter van Rossum Roel Verdult Ronny Wichers Schreur. (2009).
Wirelessly Pickpocketing a Mifare Classic Card. Available:
http://www.cs.ru.nl/~flaviog/publications/Pickpocketing.Mifare.pdf. Last accessed 2020
[61] Ju Wang, Srinivasan Keshav. (2018). RFID Hacking for Fun and Profit-ACM
MobiCom. Available:
https://www.researchgate.net/publication/326560663_Challenge_RFID_Hacking_for_Fun_a
nd_Profit-ACM_MobiCom. Last accessed 2020
[62] Qinghan Xiao. (2009). RFID Technology, Security Vulnerabilities, and
Countermeasures. Available:
https://www.researchgate.net/publication/221787702_RFID_Technology_Security_Vulnerab
ilities_and_Countermeasures. Last accessed 2020
[63] Flavio D. Garcia, Gerhard de Koning Gans, and Roel Verdult. (2012). Tutorial:
Proxmark, the Swiss Army Knife for RFID Security Research. Available:
https://www.cs.bham.ac.uk/~garciaf/publications/Tutorial_Proxmark_the_Swiss_Army_Knif
e_for_RFID_Security_Research-RFIDSec12.pdf. Last accessed 2020
[64] adc.bmj.com. (2018). How to do a postgraduate research project and write a minor
thesis. Available: https://adc.bmj.com/content/103/9/820. Last accessed 2020.
[65] www.impinj.com. (). Various Systems Using RAIN RFID Technology. Available:
https://www.impinj.com/about-rfid/types-of-rfid-systems. Last accessed 2020.
[66] RFID.... (). ieeexplore.ieee.org. Available:
https://ieeexplore.ieee.org/search/searchresult.jsp?queryText=An%20introduction%20to%20
RFID%20technology&highlight=true&returnFacets=ALL&returnType=SEARCH&ranges=2
006_2006_Year. Last accessed 2020.
[67] Todd Brooks. (2017). CLEARING UP THE CONFUSION FOR YOUR CREDENTIAL
OPTIONS. Available: https://cdn.ymaws.com/naccu.org/resource/collection/7C00E2DA-
261A-4BFB-B240-A23790C712BC/03-ClearingUpConfusionForCredentialOptions.pdf. Last
accessed 2020.