Home page logo

pen-test logo Penetration Testing mailing list archives

From: "Jason Kratzer" <kratzer.jason () gmail com>
Date: Fri, 12 May 2006 15:51:26 -0400

The security concerns lie in what is actually contained within the RFID and
not necessarily the signal being transmitted.  If you were to overwrite the
data on an RFID with malicious code, that code would then execute on the
underlying DB (SQL, Oracle, etc.).  Typically, DB programmers working with
RFID inventory systems do not spend a great deal of time (if any) on
security measures.  So by simply adding a malicious SQL query or insert ont=
the RFID, that code would execute against the DB with the same permissions
as inventory items being processed.  Demonstrating the risk to your clients
may be difficult unless you actually test it against their inventory DB.

Also, an open-source software package for editing and abusing rfid tags has
been released:

Also check out http://www.line56.com/articles/default.asp?ArticleID=3D7439.

--Jason Kratzer

This List Sponsored by: Cenzic

Concerned about Web Application Security?
Why not go with the #1 solution - Cenzic, the only one to win the Analyst's
Choice Award from eWeek. As attacks through web applications continue to rise,
you need to proactively protect your applications from hackers. Cenzic has the
most comprehensive solutions to meet your application security penetration
testing and vulnerability management needs. You have an option to go with a
managed service (Cenzic ClickToSecure) or an enterprise software
(Cenzic Hailstorm). Download FREE whitepaper on how a managed service can
help you: http://www.cenzic.com/news_events/wpappsec.php
And, now for a limited time we can do a FREE audit for you to confirm your
results from other product. Contact us at request () cenzic com for details.

  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]