magistrsko delo
Andrej Burja (Author), Patricio Bulić (Mentor), David Jelenc (Co-mentor)

Abstract

Rele napad je razširitev dosega med značko in čitalcem. Napadalec lahko z dvema namenskima napravama podaljša doseg delovanja sistema RFID/NFC. Eno napravo prisloni na strani pristne značke, drugo napravo pa na strani čitalca. Škodljivi napravi skrbita, da gre vsa komunikacija, ki si jo izmenjata čitalec in značka, prek njiju. V tem delu smo raziskali različne možnosti izvedbe rele napada in v skladu z ugotovitvami izdelali svoje orodje za izvajanje rele napada. Med izvajanjem rele napada lahko komunikacijo tudi spreminjamo in dodajamo, lahko tudi z namenom, da pridobimo več časa, kar je pri izvajanju rele napada ključnega pomena. Naše orodje najbolje deluje pri standardu ISO/IEC 14443-4A, ki se v praksi tudi najpogosteje pojavlja. Škodljivi napravi med seboj komunicirata preko brezžične povezave. Za upravljanje našega orodja smo izdelali tudi uporabniški vmesnik, preko katerega lahko tudi spreminjamo nastavitve, gledamo zgodovino komunikacije, beremo dogodke itn. Na koncu smo orodje testirali na nekaj sistemih, ki se uporabljajo v praksi. Pri testiranjih smo merili čas in tako izmerili zakasnitev, ki jo za izvedbo napada povzroča naše orodje. Testirali smo tudi, kolikšne so največje zakasnitve, ki nam jih dovoljujejo posamezni sistemi in ugotovili, da so v nekaterih primerih te tako visoke, da lahko komunikacijo zakasnimo za več sekund.

Keywords

rele napad;MITM;NFC;RFID;Proxmark;magisteriji;

Data

Language: Slovenian
Year of publishing:
Typology: 2.09 - Master's Thesis
Organization: UL FRI - Faculty of Computer and Information Science
Publisher: [A. Burja]
UDC: 621.396.44:004.056(043.2)
COBISS: 136683523 Link will open in a new window
Views: 69
Downloads: 13
Average score: 0 (0 votes)
Metadata: JSON JSON-RDF JSON-LD TURTLE N-TRIPLES XML RDFA MICRODATA DC-XML DC-RDF RDF

Other data

Secondary language: English
Secondary title: A tool for performing relay attacks on RFID/NFC systems
Secondary abstract: A relay attack is an attack where the attacker extends the communication range of an RFID/NFC system. The attack usually involves two dedicated and malicious devices, one on the side of the actual tag, and the other on the side of the actual reader; the first pretends to be a reader, the second to be a tag. The two devices then communicate and thus bridge the physical gap between the actual tag and the actual reader. We investigated various possibilities for implementing a relay attack and, based on the findings, created our own tool for performing them. The tool can modify exchanged messages and thus gain additional time; a crucial capability in such attacks. The tool works best with most common systems in practice, that is, those based on ISO/IEC 14443-4A standard. In our solution, the malicious devices communicate via a wireless connection. We have also created a graphical user interface through which one can change settings, view communication history, read logs, etc. Finally, we tested the tool on a few real-world systems. We measured the delay that an attack introduces, and we probed systems for the maximum delays allowed. We found that in some cases these are so high that we can delay communication by several seconds.
Secondary keywords: relay attack;MITM;NFC;RFID;Proxmark;computer science;computer and information science;master's degree;Sistemi za radiofrekvenčno prepoznavanje;Varstvo podatkov (računalništvo);Računalništvo;Univerzitetna in visokošolska dela;
Type (COBISS): Master's thesis/paper
Study programme: 1000471
Embargo end date (OpenAIRE): 1970-01-01
Thesis comment: Univ. v Ljubljani, Fak. za računalništvo in informatiko
Pages: 129 str.
ID: 17351929
Recommended works:
, magistrsko delo
, magistrsko delo