Defcon25 Nfc Tool From Scratch 20170730
NFC Tool From Scratch
Speaker: shanhaoqi@360.cn Location: Defcon 25 (2017)
- NFC & ISO14443A
- What is UniProxy
- Master and Slave
Quick Demo I
Put the credit card in a UniProxy Master 1. Put the
- 2 UniProxy Hardware
- 1 Cellphone
- 1 NFC enabled credit card
Who we are: Unicorn Team
- Insternal security research team of Qihoo 360, founded in 2014.
- Focus on wireless hardware hacking and defense
- Low cost GPS Spoofing Defcon 23
LTE Redirection
acttac - Defcon 24- Attack on powerline communication, Blackhat USA 2016
-
Ghost Telephonist
- Defcon 25 -
Serial hacking tools developed: HackID, HackID Pro, SafeRFID - more I missed
NFC and ISO14443A
We will focus on ISO14443A for the demo.
-
NFC
- 13.56MHz
- low-cost
- does not require power
- well developed and deployed
-
ISO14443A
- In china: passport, bank card, etc.
- more info in slides
Goals
- ID Card - could be exploited
- Access forbidden area
- Target banking systems
How
- Targeting Protocols
- Proxmark III (The best RFID hardware)
- Supports many protocols, powerful, cannot hack credit cards
- ChameleonMini
- Proxmark III (The best RFID hardware)
- Targeting Data:
NFCProxy
,NFCGate
What is UniProxy
Can be extended for ISO14443 protocol and 15693 standard.
- PN7462AU based NFC relay/proxy device
- Supports ISO14443A Protocol
- Can be extended for other protocols that the chipset supports
- Targeting QuickPass, VisaPay, EMV, Unipay credit cards
- Reader emulator: Master
- card emulator: Slave
- ... see photos
Why PN7462AU
- NXP Chip
- 20 MHz Cortext-M0 Core
24L01 Chip coordinates between the master and slave
Their company has not open sourced the firmware, they didn't let him
I think they write some bits on the iblock and a lot of the iblock is boiler plate?
Lee says the nfc transaction times out easily and this might keep the connection warm?
If there is an R block the card emulator will process itself
Speaker says: Principle Described is "VERY SIMPLE"
Issues
Tons of issues occurred in development.
- First byte of UID is in the firmware, will always be "zero eight"??
- Did not find a way to modify?
- Waiting/Wakeup time
- Real issue when developing a proxy tool
- NFC has no power, uses power from the reader
- Gets response from the reader and turns off
- Must modify wakeup time - see code (to ensure the NFC is powered?)
- I/S/R - Block data
- We do not need to transfer all data
- Just transfer I block data, need to directly transfer S/R block data
- Read the ISO carefully for more info
- Power supply can cause corruption of the chipset
- Don't to do any tricks = follow the regular procedure
- This is very sensitive
The proxy card is used to make the purchase when the master card can be read
There is a video of the proxy card in action on my phone.
You should use a GuardBunny sleeve on your NFC cards to block RF...
Summary
- Read Protocol Well
- Better not develop without official support
Improvements - future
- Improve transmission range to 100 meters
- Currently 50? 15? meters
- Target security ID cards, HID iClass, Chinese ID
- Self-compatibility
- Currently only ISO14443A
- want to adapt to 15693 and let it know which it is using
- How?