DEF CON 29 - Babak Javadi, Nick Draffen, Eric Bettse, Anze Jensterle - The PACS man Comes For Us All

Aug 5, 2021 17:35 · 6541 words · 31 minute read

- All right. Hello, everyone. Welcome to the virtual stream of the DEF CON talk, “The PACS-man Comes For Us All: We May Still Be Vaccinated, but Access Control Still Sucks. “ We’re gonna jump right into it today ‘cause we have a lot to cover.

00:17 - For those of you who don’t know, my name is Babak Javadi.

00:21 - I am a lock picker, hardware hacker, and reverse engineer.

00:24 - I’ve also been a professional red teamer and covert entry instructor for over a decade.

00:30 - Founded The Open Organisation of Lockpickers, the Red Team Alliance, and The CORE Group.

00:38 - Nick, tell us a little bit about yourself. - Sure, yeah.

00:43 - I’m Nick Draffen. I like to hack things where the physical and digital world intersect.

00:49 - I’m involved in the RFID Hacking by Iceman Discord and you can find me there.

00:54 - Eric, can you tell us a little bit about yourself? - I’m Eric Betts.

01:02 - (Babak laughs) - Hi, everyone. My name’s Anze.

01:09 - I’m a student of computer science in Slovenia, a security researcher for about five years now.

01:14 - Disassemble everything I find. Bug bounty hunter.

01:17 - Made into the Google Vulnerability Research Program Hall of Fame.

01:21 - Mostly now I do RFID research. - All right, so today we’re gonna talk about two things.

01:30 - We’re gonna talk about a new tool that we’re releasing that’s gonna make red team a whole lot more fun and a whole lot more easier and we’re also gonna talk about a interesting vulnerability that we found in some readers.

01:42 - So, first, what are PACS? What is the PACS-man? Well, that refers broadly to physical access control systems.

01:51 - And we’re not gonna go in depth into how they all work but we’ll give you a very light overview.

01:55 - If you’re interested in more, check out our other DEF CON talks or check out the RFID Hacking Discord or Red Team Alliance.

02:03 - But we are talking about enterprise access control systems.

02:06 - These are embedded boards that take in inputs of various kinds, most often, credentials, and based off of logic, controls certain outputs, such as door hardware, magnetic locks, electrified strikes, et cetera.

02:22 - The most important concept to keep in mind throughout this first part of the talk here is that RFID credentials, regardless of what technology they are, they are basically very simple, very tiny containers.

02:36 - So whether it’s a prox credential or a iCLASS or a MIFARE credential, these are just different ways of all storing the same data.

02:45 - So a lot of older low-frequency credentials, they’re simply like folders, electronic, wireless folders, that contain a very small bit of data inside.

02:55 - And when we present that folder to the system, some interesting things happen.

02:59 - So to talk to you about that, we’re gonna cover a really short, very simple analogy.

03:04 - We have some characters here. Some of you may have seen them before.

03:07 - So we have our RFID reader, we have our RFID credential, we have our door controller, and then, of course, we have the door hardware.

03:17 - So what happens normally is that RFID reader is always scanning looking for credentials nearby.

03:24 - As soon as that credential comes into range of the reader, it actually is powered on by the field of the reader and immediately starts transmitting the data stored on the credential.

03:36 - The reader receiving that information takes that and then retransmits it out to the door controller.

03:42 - The door controller performs some logic functions, decides, hey, is this person authorized or not? And if so, we go ahead and release the electrified strike, magnetic lock, what have you.

03:54 - Of course, it’s not just low-frequency credentials that work this way.

03:58 - High-frequency credentials work in a very similar way but with a couple of extra layers of protection.

04:03 - So the data might not be in plain text. It might be stored in some sort of obscure to encrypted format.

04:10 - And most importantly, that data is protected.

04:13 - So if we imagine our credential data being folded into an envelope, placed into a secure bag, and then that bag being put into a locked container, that is similar in many ways to how a lot of contactless smart cards and high-frequency credentials work.

04:29 - The data inside is ultimately the same. We are just adding additional layers of protection.

04:34 - So, again, really oversimplifying how these technologies work.

04:39 - If we take a look at, you know, a high-frequency credential, here is an example where a mutual authentication takes place.

04:47 - So it doesn’t immediately start transmitting the cardholder data but, rather, a secret handshake has to take place where the credential and the reader mutually authenticate each other without revealing any secret key material and once that information is verified, then the cardholder information is provided to the reader, the reader then retransmits that to the door controller, and everything else continues as usual.

05:13 - So credentials come in a lot of different shapes and sizes.

05:17 - A lot of them are broken. A few of them are not.

05:20 - And ultimately, they are just one major component of the access control system.

05:26 - So we have a bunch of different credentials.

05:28 - We have readers. We have the door hardware, different types of sensors, motion sensors, door contact sensors, et cetera.

05:38 - Then, of course, we have the door controller or control panel that is making all the decisions and that is all managed by some server-side software or PACS software package.

05:49 - So oftentimes when in the hacker community we’re talking about interacting with access control systems, very often, we’re really talking about hacking just the RFID Ps, the credential side, which really just refers to the method of communication used between the credential itself, the card itself, and the card reader.

06:12 - So all of these different pieces, they are set up in a very interesting way and they all kind of work independently of each other but are kind of glued together in a couple of different ways that we’ll see.

06:25 - However, let’s talk about some of the most common tools of the trade when we’re talking about RFID hacking in general and red teaming as it applies to it.

06:35 - Some of the really common tools that you’ll see or may already be familiar with is, first of all, the Proxmark3.

06:41 - This thing is ubiquitous. It’s an open-source hardware project originally released by Jonathan Westheus ages and ages ago.

06:49 - Since then, there have been many different hardware variants that have come out, some good, some not so good.

06:57 - It’s very much a kind of Swiss Army knife of RFID.

07:01 - It’s a software-defined RFID tool that can, just with, you know, reprogramming the code and firmware, we can change what different credentials it can talk to and this is one of the reasons why it’s been so popular with the community.

07:17 - The most recent, most common variant of this tool is the Proxmark 3 RDV4 made by the RFID Research Group and it’s one of our favorite variants.

07:28 - It’s very mature today and it finally has become stable and good enough that it can be used much more easily for red teaming.

07:36 - One of the coolest add-ons that it has that hasn’t really been fully taken advantage of yet is the Bluetooth add-on or the Blue Shark, which is a Bluetooth 2 interface to the reader.

07:48 - And we’re also gonna be using in this first part of the talk the ESPKey.

07:54 - This is a Wiegand interception device originally made by Kenny McElroy or octosavvi on GitHub and Twitter.

08:03 - And this is a Wiegand interception and replay device.

08:07 - And it’s not the first of its kind. There have been a number of others before it, the BLEKey and, of course, the Gecko made by Zac Franken and Adam Laurie.

08:15 - And this is a device that is optimized for field deployment.

08:19 - So it’s very fast to install. It has a very easy-to-use user interface.

08:24 - And, very happily, is one of my favorite and cheapest, fastest ways to weaponize any reader.

08:32 - What do we mean by weaponizing a reader? Well, that’s just a fancy way of saying we took a regular card reader that knows how to talk to the credential that we wanna talk to and we’re gonna connect the data logger to it.

08:43 - So we supply it some portable power in the form of a battery.

08:47 - We connect a data logger of some kind. That can be a Arduino or a Raspberry Pi or whatever you wanna use.

08:54 - In this case, we’re using an ESPKey. And that’s it. You have a weaponized reader.

08:59 - Data is read by the reader, the reader sends it to the door controller, except there is no door controller, only the ESPKey, which records it.

09:07 - So this is a really cool, versatile, multifunction tool.

09:11 - Typically, in the field, what that workflow might look like is once you capture that cardholder information, now we have to then encode it onto a card, which we often do manually either from a computer terminal or maybe if you have an Android phone, you might use the Bluetooth-enabled phone application.

09:32 - But it’s a little bit clunky, sometimes requires some extra steps, and it does take a little bit of time.

09:37 - So once you clone a credential in the field, you still have to then go back and write it to a card later.

09:45 - So how do we improve this experience in the field? Well, we know that there are these Bluetooth capabilities out there for the Proxmark3 and we know the ESPKey has Wi-Fi, so surely there must be a way to automate these things.

10:01 - And to tell us what we ended up coming up with to create this automation, I’m gonna hand things over to Nick, who wrote some really cool software.

10:13 - - So, yeah, thanks for the introduction there, Babak.

10:16 - Yeah, Babak and I were on a phone call talking about usage of weaponized readers and Proxmark3s in the field, trying to come up with a unique way to glue them together and leveraging those functions that are already on the ESPKey with the Wi-Fi and the Proxmark3 with the Bluetooth.

10:36 - We kind of thought about what else had Wi-Fi and Bluetooth and the quick and easy answer to that, what would be portable in the field, was a Raspberry Pi Zero W.

10:48 - It’s small, it’s able to be battery powered, and it has both Wi-Fi and Bluetooth peripherals so we can connect it.

10:57 - So this is where we kind of came up with the idea for Odo.

11:03 - Odo, if you don’t know, is a character on “Star Trek: Deep Space Nine. “ Odo is a Changeling in the show, which is a shapeshifter, meaning that he can take the shape of any object or person.

11:17 - So with the idea for Odo being that you capture a credential via the weaponized reader, you then shapeshift into that person, essentially leveraging a physical privilege escalation in the field.

11:28 - You can bump into someone, grab their badge, and become that person and use that to your advantage.

11:37 - So what is Odo under the hood? Odo is an open-source framework that takes credentials in, puts credentials out, and it’s language agnostic because it basically leverages the fact that it’s a JSON over MQTT API.

11:53 - So there are credential producers, there are credential consumers.

11:57 - One side, like an ESPKey, produces credentials and emits an MQTT message.

12:05 - The other side, like the Proxmark3, can consume those messages and then do something with that data.

12:10 - So this allows it to be language agnostic. Even though the base framework is written in Python, we have a number of different modules that are in different languages.

12:21 - Currently, basically Python, Node. js, but it doesn’t really matter.

12:25 - So, essentially, this framework can drive not just the implementation that we are gonna show here today of the weaponized reader and the ESPKey but any type of thing that can produce a credential, data that you can then write to another credential, you could add modules to this framework.

12:50 - So it also gets better with hats (chuckles) and haptics.

12:55 - So for that field usage, being able to see the credentials that you’ve captured, select a specific one.

13:03 - Specifically, if one was better for you than another, you can go and select that credential and it will rewrite that to the tag that’s on your waistband or on a lanyard ‘cause the Proxmark will be battery powered on a class behind the tag.

13:20 - And then using a haptic feedback device, which we have pictured here, will indicate to you that you have captured or cloned a credential.

13:30 - And with that being said, I’d like to do a quick demo.

13:35 - So let me switch down to my top-down camera and do the big version here.

13:41 - So you’ll see that I have a Proxmark3 powered by its battery.

13:48 - Blue light is on ‘cause it’s connected to the Raspberry Pi Zero W over there.

13:52 - Our haptic feedback device is here in a case so it doesn’t go haywire on us.

13:58 - This is our target credential and then this here, I’m showing it in front of me, is the source credential.

14:05 - Source and target credential technology doesn’t really matter ‘cause we’re taking that Wiegand value and encoding that onto a target credential.

14:12 - So I have a weaponized reader here off-frame.

14:14 - I’m gonna scan this credential. We will see a new item appear on the screen and the haptic device (chuckles) indicates that it has seen a credential.

14:24 - And then once that credential is written, which we see the blue light blinking on the Proxmark, it vibrates again to indicate that the credential has been written.

14:31 - So, yeah, that’s pretty much what we have with Odo.

14:38 - The ways that you can contribute and make one, we have a GitHub open source repo with the framework and our initial modules.

14:50 - Raspberry Pi Zero Ws are cheap and readily available.

14:53 - The PiSugar that we chose to use here is a great way to battery power the Pi in the field and the LCD module is helpful for that local interface.

15:04 - And there are a number of different ways that this could be extended pretty much immediately with other credential producers and consumers, new feedback mechanisms and leveraging some sort of wearable smart watch or even haptic feedback vest, and just go wild with all the different possible producers and consumers.

15:31 - So with that being said, I’d like to hand it back over to Babak with the evolution of PACS.

15:45 - You’re muted. - (chuckles) Thank you.

15:49 - One of the things I really enjoy about the Odo framework is that this now allows us a way to do, like, in-field, live privilege escalation completely automated and touchless, and if you come to our live talk, you’ll see what that looks like in action and it’s really, really cool.

16:10 - Now, that’s just one part of something that we wanted to talk about today.

16:13 - Something else that’s really interesting has to do with how evolution takes place in access control.

16:20 - So what we’re gonna talk about is what I’m calling the physical security chain of trust and it really kind of underscores how discrete and rather independent a lot of these components are and the way that they’re glued together really has nothing to do with other components necessarily in the system.

16:43 - So what I mean by that is, for example, let’s take a look at an old, old system that’s running Wiegand wire and a Wiegand reader.

16:51 - When this system first came out, it was very good.

16:54 - It was the newest technology, very difficult to clone and manipulate.

16:58 - But systems age. So as they age, the chain of trust ages as well, and because of budget constraints, you don’t really rip and replace the whole thing.

17:07 - You replace specific links in the chain selectively.

17:11 - So maybe a new technology comes out, prox hits the market and you’re like, “Oh, man, I’m so tired of swiping cards.

17:19 - I just wanna use a prox card so I can just go boop and, you know, get through the door,” right? So we replaced just those links but they had to be backwards compatible because that’s the only way that we can really afford to deploy a lot of this new technology in massive scale sometimes.

17:36 - So what that means is only parts of those links are replaced.

17:40 - So then the chain of trust continues aging and we have different components replaced.

17:46 - We again upgrade our cards and readers. This time we might also upgrade our door controllers and server-side software because maybe we want some of those new functions, some new capabilities, more memory, you know, faster, all of the things.

18:02 - But it’s not necessarily, again, addressing the whole thing.

18:07 - So you might notice there’s one particular link in this chain that keeps aging more and more and more and so now by the time that we are in biometrics territory and people have, you know, facial recognition this and iris scanning that, a lot of systems, historically, were still using Wiegand.

18:27 - That’s this really old link in the chain here.

18:30 - So considering that your chain is only as strong as the weakest link, that is of concern, right? So recently over the past couple years, this has begun to be taken care of with OSDP.

18:42 - It’s something that we talk about more in some of our other talks and in our trainings, but it is the replacement for Wiegand.

18:49 - It’s the replacement for that weak link and it offers a lot of new functionality in the form of bidirectional communication and encryption that really kind of help improve the overall security of the whole physical security chain.

19:03 - However, security alone is not enough for the industry and for a lot of customers.

19:09 - We keep wanting more and more functionality.

19:12 - So even though we’ve now had this new tool here for this chain, the development elsewhere has not stopped.

19:19 - Now the new hotness is mobile credentials. So mobile credentials are the new black in access control.

19:27 - They can come in a lot of different shapes and sizes, but, ultimately, if we have to work with smartphones, we only have a few different interfaces that we can work with.

19:36 - Ideally, we would want to use NFC with the credential data stored in a secure element on the phone, but not all phones have NFC.

19:44 - Only the more higher end, more modern phones have that.

19:47 - And even of the phones that do, not all phones provide a proper API that you can use.

19:54 - Apple, until very recently, had iOS pretty locked down when it comes to anyone but Apple using that NFC interface on the phone.

20:03 - So a lot of vendors have resorted to BLE, or Bluetooth Low Energy, because almost all smartphones have this technology.

20:12 - But unfortunately, BLE, as a lot of you know, was not designed for this purpose.

20:17 - So how do we shove BLE into these older readers that did not necessarily have this technology? There’s a couple of different ways that vendors have done this.

20:28 - There’s in-line adapters that you connect to the Wiegand line that are basically Bluetooth-enabled ESPKeys that are not used for attacking but, rather, functionality.

20:39 - And then there’s also stuff like this where, you know, one major vendor decided, “Hey, why don’t we use the debug interface on the back of the reader that we made for upgrading and programming, why don’t we use that to add Bluetooth functionality to the reader and now we can have this beautiful new future where everything is, you know, mobile enabled?” And now we have this phone-based diagnostic capability, we can do firmware upgrades, and, most importantly, we can reconfigure the reader.

21:10 - We can disable older technologies that, you know, we don’t need anymore or that are insecure.

21:17 - So for this particular platform, what was used was an application called Reader Manager.

21:23 - Reader Manager allows you to reconfigure the reader settings, what protocols it supports, et cetera.

21:29 - It scans for nearby Bluetooth-enabled readers and it allows you to reconfigure it.

21:34 - So it allows you to change configuration, turn credentials on, turn credentials off.

21:40 - But if you’re using Bluetooth, Bluetooth is not a short-range technology.

21:45 - It can cover quite a bit of distance. If you have a lot of readers, how do you know which one you’re reconfiguring? That is the question.

21:54 - So there are a couple of different ways that companies have dealt with this but what this particular company did, and we’ll go ahead and see if we can cut video here, there we go.

22:05 - So what we have here is a example reader and I just have a little field detector card here in front of it.

22:14 - We’re gonna talk about that in a few slides.

22:16 - And it’s kinda hard to see, so we’re gonna adjust the brightness here.

22:22 - Let’s see if we can see my phone a little bit better.

22:26 - Not really, unfortunately. So one thing that it has, and it should pop up here shortly, is there is, there we go, so we could see all the readers listed there and when I tap on a reader, I get this option to inspect or locate.

22:44 - So when I tap Locate what it will do is it will make the LED flash and make the reader beep so I know which reader I’m about to configure or touch.

22:55 - You might have also noticed something else unusual that just happened, which is the LEDs on this field detector card turned off.

23:03 - And we’ll talk about in a moment why that’s a problem because while that reader field is off, we’re not actually able to scan and process media.

23:19 - So where does that leave us? We have that locate functionality to identify which readers we’re working with.

23:28 - There are some security functions that we found that was built into this.

23:33 - The changes, sorry, the functions were allowing you to make changes to the reader, or the inspection functions.

23:39 - These are functions that require some form of authentication.

23:43 - So the most common method that is used is you have to power cycle the reader to apply certain changes because we don’t want people just turning credentials on and off unexpectedly.

23:56 - So the reader only accepts certain administrative configuration commands for a very short period after power on.

24:05 - But that by itself may not be enough for a lot of applications and this is where a lot of customers can go an extra step and get a custom key or elite key in certain systems.

24:17 - So custom keys basically add an additional restriction in that not only do the credentials have to have that special key but also any phones that need to recognize the reader also have to have a special administrative key that is unique to that site.

24:35 - Now, what’s interesting here is that some locate functions did not require any authentication, meaning we found that you could locate a reader regardless of whether or not it was a standard reader or an elite reader and because that locate function temporarily shuts off the field, that is of concern.

24:59 - So in regards to the Bluetooth, I’d like Anze to really talk a little bit more about some of the things that we found once we took a closer look at this.

25:13 - - Thank you, Babak. So after further looking at what is happening over Bluetooth Low Energy, we found out that all of the readers advertise a single service, all of them, of course, with the same UUID.

25:27 - The service had a single notify and write without response characteristic.

25:31 - Upon subscription to that characteristic, the reader sent an initial message.

25:36 - If it didn’t receive a reply in a certain amount of time, the reader disconnected automatically quite aggressively.

25:44 - So under the hood, we wanted to see what the BLE conversation looked like and so we wanted to sniff that out.

25:51 - We got an nRF52 development kit, loaded nRF Sniffer for Bluetooth LE, located the device, saw what was exchanged, and got the messages as PCAP files.

26:04 - So in those PCAP files, we wanted to look at what a BLE conversation looked like.

26:10 - We can see here that the message looks quite similar to an ISO 7816 ADPU, which is also used in other smart card protocols, most notably in credit card processing or EMV cards.

26:25 - And to that, the phone replied that the AID the reader was trying to select was not found.

26:32 - So you might be wondering now what is with all the readers that everyone has behind them at this talk.

26:40 - And the readers have some blinking lights. So why are the lights blinking? The readers have field detector cards made by Proxgrind and RFID Research Group.

26:54 - The LEDs on them are powered by the electromagnetic field emitted by the readers to make them blink.

27:02 - There are separate LED colors and separate antenna windings on the BCBs for low frequency and high frequency.

27:09 - So the red LED means that an LF or a 125 kilohertz field has been detected and the white LED means that a 13. 56 megahertz or the HF field was detected.

27:25 - But because we all know that PCAPS are boring, we of course went and implemented our first demo in Python and it was able to take down one device.

27:40 - We then rewrote it in Node. js, made it async, which allowed us to take down about five readers at a time.

27:51 - But then we wanted to see if we can go even further.

27:54 - We got ourself an nRF52 development kit, rewrote the whole thing in C, and were able to connect to quite a bit more devices.

28:04 - But because we all know that a development kit is something that you don’t carry around, we then moved to a Pug. js, which is a nRF52832-based development board with RGB LEDs, a button, and powered by a CR2032 coin cell battery.

28:27 - And now we will have a demo of what happens when we start sending that to all the readers in our vicinity.

28:36 - So I would ask everyone here to please turn on your dongles.

28:43 - - And we’ll go ahead and activate. And what the code is going to do is automatically look for any available readers nearby and, one by one, add them to the list of readers that we send a barrage of locate commands to.

29:07 - And now you can see almost all the readers except for that one guy, don’t worry about that one guy, had the fields shut off.

29:14 - And in that state, they are unable to process media, meaning no cards will be able to be read by that reader.

29:22 - So you just had a physical denial-of-service event.

29:30 - - And now I would like to give my word to Eric.

29:39 - - Yes, so as Babak mentioned before, these field detectors, they stopped blinking.

29:45 - What does it mean? It means there is no EM field.

29:48 - That means it doesn’t matter if you present anything to it.

29:51 - These are basically just like dead plastic at this point.

29:55 - And so that is very bad for all of this, sorry, that’s the sort of field detector part of it.

30:02 - And we got to thinking, what else has an nRF52? And for anybody that’s been around at DEF CON the previous couple of days, they may have watched a talk about this.

30:12 - You know what else has an nRF52? A motherfucking AirTag.

30:16 - So we put our firmware on an AirTag. So here’s me putting in the battery.

30:20 - Gonna go ahead and slide that closed. Flip over to this and y’all can see it has also knocked out the readers.

30:32 - Except for that one. Nope, no, got that one too.

30:40 - And so now I’ll hand it back to Anze. - Thank you.

30:48 - So we wanted to really bring it home, and remember the backpack that added BLE to our readers? Well, we found out that that BLE is also powered by an NRF-based chip for Bluetooth Low Energy and we asked ourself if we can also reprogram that and we found out that it is possible to reprogram it the same way as an AirTag.

31:12 - So with that, we were able to take down eight readers in the vicinity of the backpack being powered.

31:22 - And then, of course, because nRF52 is such a widespread chipset, we then asked ourself what else we can use as an emitter for the attack and we came to, we found out that there’s a COVID test that has an nRF52 in it, there’s some development devices, personal pleasure devices, and the universe of nRF52 is pretty much endless.

31:49 - And now I would like to give it to Babak for some closing words.

31:55 - - So what does this all mean, right? What’s the real practical impact other than just annoying some people? That depends on the situation.

32:04 - So we’ve evaluated a number of different customer deployments and different use cases where these readers and Bluetooth backpacks have been used and what we’re looking at is really dependent on what the attacker wants to do.

32:21 - So we can do either a very high selective or a very area-wide denial-of-service attack.

32:28 - So we can identify specific readers and attack just specific readers or we can deny access to an entire area.

32:36 - And in the field, in practice, what this means is that there are sensitive egress and ingress points that we can then prevent people from using unexpectedly and without any indication as to why or what’s going on.

32:50 - So turnstiles, especially locations that have a required, you know, badge in, badge out systems for mustering purposes, security vestibules and mantraps, you could create some problems by preventing those readers from working properly.

33:11 - So, you know, if you disabled the RFID readers and the turnstiles or mantraps from working, then you might be able to create artificially a situation where you’d more easily be able to social engineer your way into the building because if none of the employees can use their cards and, you know, business has to go on, they might revert to just visual confirmation or identification via the printed badge.

33:36 - Or any other special areas, security operation centers, equipment rooms, et cetera.

33:41 - On the lighter side, yeah, you could, you know, just use the beeping function to annoy the heck out of some employees by beeping all the readers.

33:50 - Or a attacker may choose to use the denial of service post-entry to evade security.

33:58 - So after you successfully work your way through a door by whatever means, whether it’s lock picking, bypass, or card cloning, you might choose to disable the reader temporarily so that even if someone does try to come after and inspect what’s going on or engage you that they will have increased difficulty in actually getting to your location.

34:22 - And the final really interesting thing that we came up with, especially after Eric figured out how to reprogram an AirTag, is ghost mode where we can program a device like an AirTag to scan for and only jam or, rather, you know, do the denial-of-service attack against the first one or two readers that have the strongest signal and what this would do is it would create the unusual situation where if you place this AirTag in someone’s bag, any reader that they approach will suddenly stop working and by the time they get to the reader and try to present their card, the reader won’t actually read the card and so they’ll be like a ghost.

35:06 - They become invisible to card readers. So for some customers, this is a big deal.

35:12 - For others who may not have these particular modules or Bluetooth-enabled readers installed yet, it may not be a big deal.

35:20 - However, we have been in contact with the vendor in working with some solutions.

35:27 - So the vendor in question, which in this case is HID, is aware of the problem.

35:34 - They are working on some firmware updates that will mitigate or minimize the risk related to this issue.

35:41 - It will be made available through their Reader Manager application so you can remotely go around and update all these readers.

35:49 - Although, at the moment, it does require that you use that app physically at each reader to do so.

35:54 - They’re also working on some methods in the future that are not available yet to allow for upgrading of certain readers over OSDP as long as the right hardware fits.

36:07 - So that’s not something that is finalized yet, but will be available for certain configurations.

36:13 - In the short term, there’s a couple of options that we think may be possible depending on the use case for different customers.

36:21 - We do recommend that if you have to use mobile credentials, if you have to have these Bluetooth-enabled readers in the field, that you do provide some guidance and education to relevant security staff on how to respond to different situations if a bunch of readers stop working correctly, for example.

36:39 - Some customers may decide to ask to have Bluetooth functionality disabled.

36:45 - If you are one of these customers, we do recommend that you reach out to your HID account manager and ask for guidance.

36:53 - We may have update guidance that we can provide at the live talk but we don’t have that yet, so we’re staying nice and general at this time.

37:01 - And finally, some customers that are not using mobile credentials but still require OSDP may be able to, under certain circumstances, get OSDP-only backpacks that, you know, don’t have that additional Bluetooth layer of functionality.

37:19 - But, ultimately, this is something that is really just kind of a byproduct of a lot of things kind of going wrong and adding up to a very unexpected situation.

37:30 - So these are one of the reasons why a lot of us in the hacker and security community get a little bit nervous when people start just adding Bluetooth to all of the things.

37:42 - So we’d really like to send out some thanks and acknowledgements to people who kind of really supported us along the way.

37:48 - First of all, a huge thank-you to HID for listening and responding to the problem.

37:55 - We know that this is not a problem that is unique to one vendor, but these kinds of mistakes can be made, you know, by a number of vendors.

38:04 - In this case, it happened to be them and they are working through it.

38:08 - Thank you to Iceman and all the other core contributors and developers, you know, Philippe, or doegox, and everyone else who is constantly contributing code to make the Proxmark3 even better and more stable.

38:22 - All of our friends at the RF Village and RFID Hacking Discord.

38:29 - RFID Research Group and the iCopy-X team for donating some prizes that we’ll be giving out during our live talk.

38:38 - And, also, Gordon Williams for providing us some guidance on some of the Node. js stuff when Eric was working through that code on some of the things that we had to tweak to improve performance.

38:52 - So we also want to, all of us, briefly say thank you, let me switch back to the quad view, and say thanks for joining us, for listening.

39:04 - Thanks for kind of putting up with how fast we’ve been trying to go through everything to try to fit it into the time slot that was made available and hopefully you guys really enjoyed it.

39:17 - If you have more questions, as we know you will, feel free to reach out to us, talk to us in person or on the RFID Hacking Discord.

39:25 - We hope that you take a little bit closer look at some of the other Bluetooth solutions that are out there in the access control world.

39:32 - And finally, if you’re interested in really cutting your teeth, getting your feet wet, learning more, if you’re a hobbyist, come check us out at the RFID Hacking Discord.

39:45 - Link is right here in the slides. And if you’re a working professional and you’re interested in more hands-on training and certification for physical security, come check out Red Team Alliance and see what we have to offer.

39:57 - Thank you very much again, and that’s it, that’s all we got. .