Are you looking for Clone Access Card service? Yes! you have come to the right place.
Call me 81246266 KING for all Clone Access Card service. I am the King of all condo access card cloning.
Call me 81246266 KING for all Clone Access Card service. I am the King of all condo access card cloning.
Clone Access Card Bump Cloning
A young man in Waterloo, Jonathan Westhues, has shaken the security industry by its access readers. In October of 2003 he published on his web site a "cloner" for prox cards. This handheld device can be used to secretly copy your access control card from a distance and replay the card for any prox card reader. The young man generously provided construction details and circuit diagrams for verification of his efforts.
I call this technique "bump cloning" because all that a bad guy would have to do is "bump" you in a hallway or elevator to copy your card. This would for all intents and purposes make his device a "clone" of your card, useable in any reader in the system.
This device effectively compromises any card access system that uses the standard prox cards for identification.
As he states in his detailed explanation, he can insidiously read a person's card while it is still in their wallet, cloning the card without the target knowing it. This card read is then replayed to the reader that controls the door he wants to access. Bingo, he is inside the protected space. The most dangerous aspect of this device is the target person has no idea his card was "cloned" and therefore would have no reason to report it as being compromised. Additionally, if any mischief was done then the card access system would dutifully report the target's card number was used to access the space.
As Clone Access Card Security professionals what is our defense?
Computer security and cryptography professionals know this as a "replay" attack. In essence the attacker just replays the card to the reader to gain access. There are two card technologies out there that immune to this sort of attack.
The first is the Weigand wire card. This card uses small magnetic wires embedded in the plastic of the access card to generate an electronically readable number. This card is difficult to "clone" because it cannot be read at a distance but must be inserted into a reader. Unlike the magnetic stripe cards, the physical arrangement of the Weigand wires determines the card number. Typically, removal of the Weigand wires from a card destroys their unique properties. This means that an attacker would have to gain physical possession of the card, have great mechanical skills, and a ready supply of Weigand wire to "clone" even a single card.
The second card technology is known in the industry as a MiFare card. This card is a prox card with a crypto-twist. The card has an encrypted conversation with the reader. A simple "replay" attack as describe above will not work. This means an attacker would have to have the cryptographic keys to the card and know which section of the card is used by the access system for the area he wishes to enter.
A final suggestion would be to incorporate CCTY cameras at each reader location. The cameras are a good idea whatever the card technology and provide after the fact documentation of who was holding the card that was use to access the area to Clone Access Card.
No comments:
Post a Comment