Zurück   Nachrichten Forum | Infokrieg.TV > Die Neue Weltordnung > Globaler Polizeistaat
 

Hinweise

Antwort
 
Themen-Optionen
  #1  
Alt 14.02.2008, 09:47
R_F_I_D R_F_I_D ist offline
Gesperrt
 
Registriert seit: 16.08.2007
Beiträge: 6.876
Standard Hacker clonen einen IMPLANTIERTEN Verychip---R_F_I_D

Wie HAcker der GRuppe HOPE ( HAckers on Planet Earth ) einen implantierten Verychip klonten.

http://www.theregister.co.uk/2006/07...richip_cloned/


Hackers demonstrated how to clone a copy of an human-implanted RFID chip at a hacking conference this week. The demonstration goes against claims from people-chipping firm VeriChip that its technology, the subject of the experiment, can uniquely identify an individual.

By cloning a chip it would be possible to assume someone's identity, at least in situations where VeriChip devices are used as the sole means of identification.

The main difficulty against such an attack is that a VeriChip can only be read at a range of less than 30cm.

During a presentation at the HOPE (Hackers on Planet Earth) conference in New York, Jonathan Westhues demonstrated how it was possible to read the ID number of a VeriChip implanted into the arm of his colleague, Annalee Newitz, using a standard RFID reader, an antenna, and a laptop running signal-processing software.

Westhues first held the RFID reader against Newitz's arm. He then scanned the tiny device again using an antenna connected to his laptop in order to record the signal transmitted by the implanted device. Westhues then waved the RFID reader by the antenna, revealing Newitz’s until then "unique" ID. This information is enough to produce a cloned chip, the hackers claim.

"Their [VeriChip's] website claims that it cannot be counterfeited — that is something that Jonathan and I have shown to be untrue," Newitz said, adding that the tiny RFID chip used by VeriChip contains no built-in security (such as a challenge response mechanism) that prevents the attack.

A spokesman for VeriChip, a subsidiary of Applied Digital, said it hadn't had a chance to review the experiment so it wasn't able to comment on the hacker's cloning claim.

"We can't verify what they may or may not have done," a spokesman told Reuters. "We haven't seen any first-hand evidence other than what's been reported in the media.

"It's very difficult to steal a VeriChip… it's much more secure than anything you'd carry around in your wallet," he added.

"VeriChip" is described by its manufacturers as an implantable, passive radio frequency identification device (RFID) about the size of a grain of sand that can be used in a variety of applications such as assessing whether somebody has authority to enter a high-security area.

In medicine (the main market), the idea is that if a patient is unconscious, or otherwise unable to tell doctors about their medical condition, medics can still find out this information using the ID contained on the VeriChip. This number is cross-referenced with hospital databases to give a patient's medical records.


GENAUERES ÜBER DAS WIE HIER


http://cq.cx/verichip.pl



Demo: Cloning a Verichip


In brief: Verichip markets their product for access control. This means that you could have a chip implanted, and then your front door would unlock when your shoulder got close to the reader. Let us imagine that you did this; then, I could sit next to you on the subway, and read your chip's ID. This takes less than a second. At this point I can let myself in to your house, by replaying that ID. So now you have to change your ID; but as far as I know, you cannot do this without surgery.

All of this relates to an article that Annalee Newitz wrote for Wired. I would not have looked at these parts otherwise; the Verichip is built with no attempt at security, and is therefore not very special to clone. The designers of this product must be aware that an attack like I outline below is possible. But, Reuters quoted ‘VeriChip spokesman’ John Procter, who said that:

‘We can't verify what they [Annalee and I] may or may not have done....We haven't seen any first-hand evidence other than what's been reported in the media.’ (Sat Jul 22, 2006)

This is just silly. The Verichip is a repurposed dog tag; there is no reason (counterfeit housepets?) why it would have been designed with any security features, and in fact it was not. Their own technical staff—or failing that, the technical staff of the company that sells them the tags—can tell them this, with or without me.

(And while I used my proxmarkii, there's an easier way, if you want to do it yourself.)

* * *

I will briefly describe the steps that I went through to duplicate an ID-only RFID tag using my proxmarkii device. We will be cloning a Verichip, which should not rationally make any of this more interesting but does.




I have a reader and some tags. The first thing to do is to determine the frequency of operation. I could have used the proxmarkii, but I actually just used a coil of wire and my 'scope. I measured the voltage across the coil, energized the reader, and used cursors to measure the frequency of the signal received. These tags happen to work around 134 kHz.

TI's glass transponders work near that frequency, so my first thought was that the Verichip was basically one of them. I therefore tried to read my Verichip as a TI-type tag. That means that I excite it with a pulse a few dozen milliseconds long, and then turn off my carrier and listen for a response.







Clearly, this did not work. The Verichip is not a TI-type tag. That means that it's probably the continuously-illuminated kind. I actually could have determined this from the signal that the reader sends out, if I had paid more attention then. The proxmarkii device could read 134 kHz continuously-illuminated tags if I wrote the proper software for it. Instead I will be lazy and just try it at 125 kHz; the read range will suffer, but that isn't really critical.





So now I did a low-frequency read, and this time I got something. What is unfortunate is that it is a mess. I just want to duplicate the tag, so there is no particular reason to reverse-engineer the exact structure of the bits sent over the air. Still, it would be nice to know the fundamentals, like the period...





I do a quick autocorrelation to determine the period of the returned signal. We could save a trace and do it in MATLAB, but I prefer to do it in the proxmarkii software. MATLAB is nice for signal processing, but not so good for scrolling through long traces. The graph tool that I use is more like the user interface of a digital storage 'scope. It is obvious that the period is 2048 samples (which, sampling every other carrier clock, is 4096 carrier clocks).





Actually it looks like there's a little more structure to the signal, considering all those transitions for an ID that is mostly zeros. I would guess that it is Manchester-coded ASK, or something differential, or something weird. If we wanted to determine the mapping between the tag's ID and the signal sent over the air, then we would spend more time on this. For now it is not worth the bother.





If all that I want is to clone the tag, then it is arbitrary which point in the signal I designate as t=0. The ID just loops, so the signal over the air is unaffected. That feature between the cursors looked sort of like a sync pattern, though, and it occurs in both tags’ traces. For want of a better idea, I will write my demod code to correlate for that, and use that as its reference. Then I can demodulate the received signal to a bit string.





At this point it is only a matter of remodulating the received signal, and we're done. Then I can download that signal to my proxmarkii, put it in ‘simulate’ mode, and it should be indistinguishable from the legitimate tag. To be on the safe side, I read my ‘simulated tag’ using another proxmarkii device, to make sure that my simulated ID is correct. If that looks okay, then I am ready to check my work against the legitimate reader, and as we would hope, it reads:





(Notice that the demodulation and remodulation steps are in a sense unnecessary; I could have just replayed the exact signal that I received over the air, without demodulating and remodulating it. That means that you get twice as much noise, though, because the signal received from the tag never gets ‘cleaned up.’ If I wanted to make this very automatic, then I could write code for the proxmarkii that would automatically determine the period, read the ID many times, and average those together, lining them up at the points of maximum cross-correlation. That might be sort of cute, because it would be fully automatic for any modulation scheme, but it seems like a lot of trouble.)

This took me a couple of hours. I could have done it faster if I had not constantly been interrupting myself to take a screenshot or a picture. Of course it will take me some time if I want to build out the software to read them properly, at 134 kHz.

The screenshots and the photograph prove nothing. I therefore save the traces:

* verichip-raw.tr: the raw signal from the tag, voltage versus time, one sample every other carrier clock
* verichip-remod.tr: the remodulated (i.e., cleaned up) ID, ready for replay, one sample per carrier clock

These are for Annalee's Verichip, number 1022000000047063.

There is a curious aside: the Verichip that I read here is not supposed to have that ID, according to medical records; but the ID that I cloned is the ID that my legitimate reader reports. As to what this means—malpractice? sloppy record-keeping? that I have the special ‘reverse engineer's edition’ of the reader?—I haven't a clue.

Oh, and lest anyone get overly worried about drive-by Verichip identity theft: that is probably not a big deal. Their biggest security feature is the absurdly short read range, which is restricted by the tiny antenna. As long as the user stays at least a foot away from any unsecured person or thing, there is very little risk.




SO auch die andere Seite schläft nicht.


Es gibt übrigens schon den ersten R_F_I_D Virus.

Mit Zitat antworten
Antwort

Lesezeichen


Forumregeln
Es ist Ihnen nicht erlaubt, neue Themen zu verfassen.
Es ist Ihnen nicht erlaubt, auf Beiträge zu antworten.
Es ist Ihnen nicht erlaubt, Anhänge hochzuladen.
Es ist Ihnen nicht erlaubt, Ihre Beiträge zu bearbeiten.

BB-Code ist an.
Smileys sind an.
[IMG] Code ist an.
HTML-Code ist aus.

Gehe zu

Ähnliche Themen
Thema Autor Forum Antworten Letzter Beitrag
RFID-Hacker knacken eine Milliarde Zugangskarten R_F_I_D Globaler Polizeistaat 2 15.09.2008 00:49
Die kleinsten R_F_I_D Tags-R_F_I_D Puder- R_F_I_D Chemtrails R_F_I_D Globaler Polizeistaat 2 14.02.2008 10:14
R_F_I_D Hacking R_F_I_D Globaler Polizeistaat 0 14.12.2007 18:16
R_F_I_D IM Fahrzeug? R_F_I_D Globaler Polizeistaat 0 21.11.2007 01:52


Alle Zeitangaben in WEZ +2. Es ist jetzt 22:18 Uhr.

Powered by vBulletin® Version 3.8.1 (Deutsch)
Copyright ©2000 - 2010, Jelsoft Enterprises Ltd.
Ad Management by RedTyger