mwroffo / UMPenTest_RFID_hack

Operation ZOOKEEPER conducts man-in-the-middle (MitM) and denial-of-service (DOS) exploits on the UMass (ZooMass) RFID authentication system. HackUMass 2018, Prize Winner.

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

ZooKeeper

A hack for HackUMass VI by the UMass PenTesting Team + 2.

Table of Contents

Overview

The purpose of our hack is to conduct man-in-the-middle (MitM) and denial-of-service (DOS)exploits on RFID cards of various bit capacities. Our primary motivation was to hack the UMass RFID system. Our exploits were tested using the iClass r-640x-300 reader (tag).

We had two subteams: one worked on researching protocols and exploits for the UCards and the other set up the tool that employs MitM and DOS attacks.

Hack

Our hack consists of a second-hand RFID scanner hooked up to a Raspberry Pi and an Arduino. The RFID scanner reads in card data which the Arduino processes and logs. The data is then sent along to a web server that the Raspberry Pi hosts. The web server hides the logged data behind a login screen. After entering in the correct login, the attacker can access the card data of whoever has unknowingly used their dummy scanner. To use the data, the attacker can select a card code from a dropdown and click "Open Sesame" or "Lock" to lock the door that they've planted the dummy scanner on.

Team

  • Nils Carlson
  • Michael Roffo
  • Jordan Chen
  • Nicholas Sichalov
  • Jake Quilty
  • Aaron Terentiev

Setup

Requirements

  • Python 3.6+
  • virtualenv

Steps

  1. Clone this repository
  2. Navigate into the project folder
cd UMPenTest_RFID_hack
  1. Activate the virtual environment
source venv/bin/activate
  1. Install the project packages
pip install -r requirements.txt

Usage

On the Raspberry Pi

To run the local web server:

  1. Export the requisite environment variables
export FLASK_APP=UMPenTest_RFID_hack.py
export FLASK_ENV=development
  1. Run the Flask web server
sudo python3.6 UMPenTest_RFID_hack.py
  1. Navigate to the server IP (default: http://127.0.0.1:5000/)

  2. Enter your credentials Alt text

  3. Select a logged card code from the dropdown and press either "Open Sesame" or "Lock" Alt text

In Real Life

After getting the Pi up and running:

  1. Rip out the RFID scanner on a door/building
  2. Install our tool
  3. Navigate to the web address and port that you have the Pi running on
  4. Enter your login credentials
  5. Enjoy life in prison

Device

Alt text Alt text

Award

Alt text

About

Operation ZOOKEEPER conducts man-in-the-middle (MitM) and denial-of-service (DOS) exploits on the UMass (ZooMass) RFID authentication system. HackUMass 2018, Prize Winner.


Languages

Language:Python 99.4%Language:HTML 0.2%Language:JavaScript 0.1%Language:CSS 0.1%Language:C 0.1%Language:Shell 0.0%Language:C++ 0.0%Language:Mako 0.0%