SlideShare una empresa de Scribd logo
1 de 25
Descargar para leer sin conexión
Near Field Communications
Security Concerns and NFCProxy
Shane Turner
Master of Science in Information Security
68-595 Information Security Practicum
Lewis University
April 22, 2013
NFC Security - Introduction
Near Field Communication (NFC)
• NFC is a short range wireless technology that allows communications to take
place between devices that either touch or are momentarily held close
together.
• Frequency 13.56Mhz
• Subset of RFID
• Range – usually less than 4cm
• Narrow Bandwidth (106 to 424 Kbits/s)
• Patented in 1983, ISO 14443 and ISO 7816
• First phone to use NFC – Nokia 6131
• Nokia, Sony and Phillips formed the NFC Forum
NFC Security – How is NFC Used ?
Uses for NFC Technology
• Digital Wallet (i.e. Google Wallet)
• Expect NFC smartphones to account for about 50 percent of the phone marketplace by 2014 [source: Popular
Science]
• Info Tags or Smart Tags
• A system called Personal Rosetta Stone that lets cemetery visitors pull information from chip-laden headstones
to read the life stories and obituaries of the deceased [source: Rosetta Stone].
• Movies Posters embedded with NFC chips will be able to link the user to the movie trailer or coupons that
could be used at the theater.
• Gentags
• Diagnostic skin tags that are affixed directly to the patient. These tags can monitor temperature, glucose levels
or ultraviolet light exposure and then send pertinent health information directly to a smartphone.
NFC Security – How is NFC Used ?
Uses for NFC Technology
• NFC in your Car
• Car companies are using NFC technology for proximity sensors that allow you to unlock your car
• Push button start in cars as long as your NFC device is in the car.
• Hotels
• NFC chips are embedded into devices that will unlock the door to your hotel room.
• At Work
• NFC Devices used as access control devices allowing or disallowing access into secure areas.
NFC Security – How is NFC Used ?
Uses for NFC Technology
• Virtual press kits and business cards (http://www.tapmy.biz/)
• Smartphones
• Information points such as posters
• Speakers, Headphones, various music players
• Cameras
• TV
• Appliances
• Computers
• Smart Meters for Utilities Companies
• Digital bubble gum machine
• Heart Monitor
• Wii U
• Public Transportation
NFC Security – Advantages of NFC
What are the Advantages of NFC?
• Augmented Shopping Experience
• Many Tech Companies are getting on board
• Other companies – McDonalds, Toys-R-Us, CVS, Home Depot, Radio Shack, Office Max,
Walgreens, Sports Authority and many other retailers
• Quick and Easy access
• Improved Customer Service
• Real Time Updates
• Versatility
• Safety
NFC Security – Risks
What are the Security Risks of NFC?
• Sensitive Financial Data
• Data confidentiality
• Eavesdropping
• Data Corruption
• Viruses
• Man-in-the-middle
• Lack of Education
• Theft
NFC Security – NFCProxy Demonstration
NFCProxy
Demonstration
NFC Security – NFCProxy
What is NFCProxy?
• Proof of Concept Tool for Pentesters
• Demonstrates insecurities in near field communication and contactless credit cards.
• Demonstrated by Eddie Lee @ Defcon 20 (Security Researcher @ BlackWing Intelligence)
• Software developed by Igor Miladinovic.
• Useful in NFC protocol analysis for further NFC security research.
• Project was to create a pentest tool that could analyze RFID protocols and
proxy transactions using Android phones.
• Proxy transactions, Save transactions, Export transactions, PCD relay and Tag
relay
NFC Security – NFCProxy Architecture
Architecture
NFCProxy
Normal
List of Acronyms
• APDU - Application Protocol Data Unit
• NFC – Near Field Communications
• PCD - Proximity Coupling Device
• POS - Point of Sale
NFC Security – NFCProxy Hardware
NFCProxy Hardware
• A Proximity Coupling Device (PCD) such as one made by VivioPay
• Two Android smartphones with NFC capabilities. For example; Galaxy S3,
Nexus S or Galaxy Nexus.
• A contactless credit card.
NFC Security – NFCProxy Software
NFCProxy Software
• NFCProxy which can be found at soundforge.net
• CyanogenMod – custom ROM found at cyanogenmod.org
• Must be installed on smartphone used for Proxy Mode
• Android version 2.3 (Gingerbread) or newer running on the smartphones.
NFC Security – NFCProxy Setup
NFCProxy Setup
• Must have a Wi-Fi connection to transport data.
• Download and install NFCProxy Software to both smartphones.
• Configure Wi-Fi Connection between phones.
• Have PCD unit powered on.
NFC Security – NFCProxy - Proxy Mode
Proxy Mode
• Set up the smartphone (not running Cyanogen) in Relay mode near the credit
card you want to use for a transaction.
• Go to the other smartphone that is running the Cyanogen custom ROM and
ensure NFCProxy is running in Proxy mode.
• Relay mode opens up a network socket and waits for a network connection
from the other device running NFCProxy in proxy mode.
• With the Relay Mode smartphone, place it near the contactless credit card
until NFCProxy displays the credit card information on the screen.
• Now send the information to the smartphone running in Proxy Mode.
• With the smartphone running in Proxy Mode swipe the phone in front of the
PCD and you should hear an alert and see green light upon a successful
transaction.
NFC Security – NFCProxy Credit Card Data
Credit Card Data
Credit Card Data Successful Transaction
NFC Security – NFCProxy - Proxy Mode
NFC
NFCWiFi (IP)
Proxy
Mode
Set to
REPLAY
Mode
Set to
PROXY Mode
APDU
APDU
NFC Security – NFCProxy – Relay Mode
Relay Mode
• Use smartphone running Cyanogen ROM
• Open NFCProxy and set it in Replay mode.
• Scan RFID credit card and acquire the information on card.
• Long click on the credit card information on the screen and then select the
“REPLAY TAG” option at the top of the phone
• You should then see a letter “T” at the top of the screen.
• Place the smartphone in front of the credit card reader.
• Credit Card reader should light up and beep if there is a successful transaction
NFC Security – NFCProxy - Relay Mode
NFC
NFC
Relay
Mode APDU
APDU
Set to
Relay Mode
Walk to PCD
NFC Security – NFCProxy Discussion
Discussion / Lessons Learned
• Both phones must be rooted
• Need correct tools to complete this process
• Install correct version Cyanogen Mod
• Most current version is now working
• Point of Sale devices like the PCD units are easy to acquire
• Able to acquire on EBay (VivioPay 4000 & VivioPay 4500)
• Local Wi-Fi connections easy to set up, long distance connection - some advanced
networking skills needed (VPN knowledge)
• Acquiring an RFID credit Card.
• Visa - PayPass
• Built in security from credit card companies
• Attempts to scan the card out of sequence the card will be deactivated.
NFC Security – Vulnerabilities in Detail
Vulnerabilities
• Credit Card skimming using NFCProxy
• Identity Theft
• Financial ruin
• Malware
• Know Malware programs
• End of July 2012 – 5,000
• End of September 2012 - 51,500
• End of 2012 - 283,000
• Scanning of malicious NFC tags
• Can transfer your data if compromised
• 25% or 25,000,000 Android Devices are infected
NFC Security – Vulnerabilities in Detail
Vulnerabilities Continued
• Google Apps
• 75% of malware-infected apps downloaded from Google Play [McAfee Mobile Security]
• One-in-six chance of downloading a risky app
• ¼ of these apps contain both malware and a suspicious URL capable of
• Click fraud
• Phishing schemes
• McAfee Labs - found that 40% of malware misbehaved in a complex way
• Hard to detect
• Take advantage of specific technology (NFC)
NFC Security – Mitigating NFC Security Risks
Mitigations
• Needs to be a team effort – Proactive not Reactive
• NFC Forum Members
• Consumers
• Application Developers
• Manufactures
• Turn NFC off
• Do not use RFID credit Cards
• Virus Protection on Smartphone
• Use trusted / certified apps only
NFC Security – Questions
Questions?
NFC Security – Other Resources
Other NFC Resources Worth Mention
• NFC Videos
• NFC Proxy Demo - http://www.youtube.com/watch?v=w_vYuLyfw3E
• Defcon 20 video, NFC Hacking: The Easy Way -
http://www.youtube.com/watch?v=7ElZBI9PufY
• NFC Proxy – University of Texas at Austin - UT ComSoc -
http://www.youtube.com/watch?v=Yjfc60LGjik
• Shmoocon 2012: Credit Card Fraud: The Contactless Generation Application Developers -
http://www.youtube.com/watch?v=HRXb-FZ6WFM
• How NFC phones can steal your credit card info -
http://www.youtube.com/watch?v=EKks3vfiy6Q
Thank You

Más contenido relacionado

La actualidad más candente

Near FIeld Communication
Near FIeld Communication Near FIeld Communication
Near FIeld Communication
Maajidleo
 
NFC technical presentation
NFC technical presentationNFC technical presentation
NFC technical presentation
Akshat Rohatgi
 
NFC (Near Field Communication) by sandip murari
NFC (Near Field Communication) by sandip murariNFC (Near Field Communication) by sandip murari
NFC (Near Field Communication) by sandip murari
Sandip Murari
 
Near field communication
Near field communicationNear field communication
Near field communication
Jwal Dakwala
 
AUTOMATING VEHICLE FINE COLLECTION SYSTEM USING NFC AND GPS
AUTOMATING VEHICLE FINE COLLECTION SYSTEM USING NFC AND GPSAUTOMATING VEHICLE FINE COLLECTION SYSTEM USING NFC AND GPS
AUTOMATING VEHICLE FINE COLLECTION SYSTEM USING NFC AND GPS
Journal For Research
 
Near field communication
Near field communicationNear field communication
Near field communication
Dipen Jain
 

La actualidad más candente (20)

Mobile Transaction Using Near Field Communication(NFC)
Mobile Transaction Using Near Field Communication(NFC)Mobile Transaction Using Near Field Communication(NFC)
Mobile Transaction Using Near Field Communication(NFC)
 
Nfc kp561997 kv2_kalpakkam
Nfc kp561997 kv2_kalpakkamNfc kp561997 kv2_kalpakkam
Nfc kp561997 kv2_kalpakkam
 
shirsha
shirshashirsha
shirsha
 
NFC (Near Field Communication) presentation
NFC (Near Field Communication) presentationNFC (Near Field Communication) presentation
NFC (Near Field Communication) presentation
 
Near field communication(NFC)
Near field communication(NFC)Near field communication(NFC)
Near field communication(NFC)
 
Transforming the NFC Public Transport Experience from Vision to Reality -- Th...
Transforming the NFC Public Transport Experience from Vision to Reality -- Th...Transforming the NFC Public Transport Experience from Vision to Reality -- Th...
Transforming the NFC Public Transport Experience from Vision to Reality -- Th...
 
Near FIeld Communication
Near FIeld Communication Near FIeld Communication
Near FIeld Communication
 
NFC technical presentation
NFC technical presentationNFC technical presentation
NFC technical presentation
 
Vodafone Cash Service - NFC tag
Vodafone Cash Service - NFC tagVodafone Cash Service - NFC tag
Vodafone Cash Service - NFC tag
 
NFC (Near Field Communication) by sandip murari
NFC (Near Field Communication) by sandip murariNFC (Near Field Communication) by sandip murari
NFC (Near Field Communication) by sandip murari
 
Near field communication
Near field communicationNear field communication
Near field communication
 
AUTOMATING VEHICLE FINE COLLECTION SYSTEM USING NFC AND GPS
AUTOMATING VEHICLE FINE COLLECTION SYSTEM USING NFC AND GPSAUTOMATING VEHICLE FINE COLLECTION SYSTEM USING NFC AND GPS
AUTOMATING VEHICLE FINE COLLECTION SYSTEM USING NFC AND GPS
 
Nfc presentation
Nfc presentationNfc presentation
Nfc presentation
 
Near field communication (nfc) technology
Near field communication (nfc) technologyNear field communication (nfc) technology
Near field communication (nfc) technology
 
NFC: Accelerating Momentum, Expanding Opportunities
NFC: Accelerating Momentum, Expanding Opportunities NFC: Accelerating Momentum, Expanding Opportunities
NFC: Accelerating Momentum, Expanding Opportunities
 
NEAR FIELD COMMUNICATION
NEAR FIELD COMMUNICATIONNEAR FIELD COMMUNICATION
NEAR FIELD COMMUNICATION
 
Ultrabook Development Using Sensors - Intel AppLab Berlin
Ultrabook Development Using Sensors - Intel AppLab BerlinUltrabook Development Using Sensors - Intel AppLab Berlin
Ultrabook Development Using Sensors - Intel AppLab Berlin
 
Near field communication
Near field communicationNear field communication
Near field communication
 
NFC Security Guard Systems
NFC Security Guard SystemsNFC Security Guard Systems
NFC Security Guard Systems
 
SIM application toolkit in the context of Near Field communication Applications
SIM application toolkit in the context of Near Field communication ApplicationsSIM application toolkit in the context of Near Field communication Applications
SIM application toolkit in the context of Near Field communication Applications
 

Destacado

Nfc forum 14_feb07_press_and_analyst_briefing_slides
Nfc forum 14_feb07_press_and_analyst_briefing_slidesNfc forum 14_feb07_press_and_analyst_briefing_slides
Nfc forum 14_feb07_press_and_analyst_briefing_slides
Babu Kumar
 
Near field communication
Near field communication Near field communication
Near field communication
Paurnima Pawar
 

Destacado (20)

Near Field Communication (NFC)
Near Field Communication (NFC)Near Field Communication (NFC)
Near Field Communication (NFC)
 
NFC Technology
NFC TechnologyNFC Technology
NFC Technology
 
PLA 2012: Librarian's Field Guide to Near Field Communication
PLA 2012: Librarian's Field Guide to Near Field CommunicationPLA 2012: Librarian's Field Guide to Near Field Communication
PLA 2012: Librarian's Field Guide to Near Field Communication
 
Near field communication
Near field communicationNear field communication
Near field communication
 
Le guide de la convergence ooh 2015
Le guide de la convergence ooh 2015Le guide de la convergence ooh 2015
Le guide de la convergence ooh 2015
 
Near field communication - NFC
Near field communication  - NFCNear field communication  - NFC
Near field communication - NFC
 
NFC
NFCNFC
NFC
 
Nfc forum 14_feb07_press_and_analyst_briefing_slides
Nfc forum 14_feb07_press_and_analyst_briefing_slidesNfc forum 14_feb07_press_and_analyst_briefing_slides
Nfc forum 14_feb07_press_and_analyst_briefing_slides
 
Near field communication - Data transmission
Near field communication - Data transmissionNear field communication - Data transmission
Near field communication - Data transmission
 
Near Field Communication by Mohammed Mudassir
Near Field Communication by Mohammed MudassirNear Field Communication by Mohammed Mudassir
Near Field Communication by Mohammed Mudassir
 
Le nfc
Le nfcLe nfc
Le nfc
 
Next Big Trends: A Librarian’s Field Guide to Near Field Communication
Next Big Trends: A Librarian’s Field Guide to Near Field CommunicationNext Big Trends: A Librarian’s Field Guide to Near Field Communication
Next Big Trends: A Librarian’s Field Guide to Near Field Communication
 
NEAR FIELD COMMUNICATION (NFC)
NEAR FIELD COMMUNICATION (NFC)NEAR FIELD COMMUNICATION (NFC)
NEAR FIELD COMMUNICATION (NFC)
 
Near Field Communication(NFC)
Near Field Communication(NFC)Near Field Communication(NFC)
Near Field Communication(NFC)
 
e-wallet , The future of Cards and Money
e-wallet , The future of Cards and Moneye-wallet , The future of Cards and Money
e-wallet , The future of Cards and Money
 
Nfc
NfcNfc
Nfc
 
Near field communication
Near field communicationNear field communication
Near field communication
 
Nfc
NfcNfc
Nfc
 
Near field communication
Near field communication Near field communication
Near field communication
 
Near Field Communications (NFC) Technology & Measurements
Near Field Communications (NFC) Technology & MeasurementsNear Field Communications (NFC) Technology & Measurements
Near Field Communications (NFC) Technology & Measurements
 

Similar a Nfc security shane_turner_spring2013

Mobile Commerce: A Security Perspective
Mobile Commerce: A Security PerspectiveMobile Commerce: A Security Perspective
Mobile Commerce: A Security Perspective
Pragati Rai
 
Techpubs_NFC-TI100-R
Techpubs_NFC-TI100-RTechpubs_NFC-TI100-R
Techpubs_NFC-TI100-R
James Dickson
 
Near Field Communication (NFC Architecture and Operating Modes)
Near Field Communication (NFC Architecture and Operating Modes)Near Field Communication (NFC Architecture and Operating Modes)
Near Field Communication (NFC Architecture and Operating Modes)
Deepak Kl
 
Nearfieldcommunication 130807091143-phpapp02
Nearfieldcommunication 130807091143-phpapp02Nearfieldcommunication 130807091143-phpapp02
Nearfieldcommunication 130807091143-phpapp02
student
 
Near field communication.pptx
Near field communication.pptxNear field communication.pptx
Near field communication.pptx
Poriumlimited
 
IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014
IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014
IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014
Brian Knopf
 

Similar a Nfc security shane_turner_spring2013 (20)

Introduction to NFC
Introduction to NFCIntroduction to NFC
Introduction to NFC
 
Mobile Commerce: A Security Perspective
Mobile Commerce: A Security PerspectiveMobile Commerce: A Security Perspective
Mobile Commerce: A Security Perspective
 
NFC attacks
NFC attacksNFC attacks
NFC attacks
 
Razorfish nfc technologies presentation 2013
Razorfish nfc technologies presentation 2013Razorfish nfc technologies presentation 2013
Razorfish nfc technologies presentation 2013
 
Man in the NFC by Haoqi Shan and Qing Yang
Man in the NFC by Haoqi Shan and Qing YangMan in the NFC by Haoqi Shan and Qing Yang
Man in the NFC by Haoqi Shan and Qing Yang
 
Near field communication
Near field communicationNear field communication
Near field communication
 
Near Field Communication
Near Field CommunicationNear Field Communication
Near Field Communication
 
NFC Bootcamp Seattle Day 1
NFC Bootcamp Seattle Day 1NFC Bootcamp Seattle Day 1
NFC Bootcamp Seattle Day 1
 
NFC & RFID: Enhancing the Customer Experience Near and Far
NFC & RFID: Enhancing the Customer Experience Near and FarNFC & RFID: Enhancing the Customer Experience Near and Far
NFC & RFID: Enhancing the Customer Experience Near and Far
 
Techpubs_NFC-TI100-R
Techpubs_NFC-TI100-RTechpubs_NFC-TI100-R
Techpubs_NFC-TI100-R
 
Near Field Communication (NFC Architecture and Operating Modes)
Near Field Communication (NFC Architecture and Operating Modes)Near Field Communication (NFC Architecture and Operating Modes)
Near Field Communication (NFC Architecture and Operating Modes)
 
Nearfieldcommunication 130807091143-phpapp02
Nearfieldcommunication 130807091143-phpapp02Nearfieldcommunication 130807091143-phpapp02
Nearfieldcommunication 130807091143-phpapp02
 
Nearfieldcommunication 130807091143-phpapp02
Nearfieldcommunication 130807091143-phpapp02Nearfieldcommunication 130807091143-phpapp02
Nearfieldcommunication 130807091143-phpapp02
 
NFC TECHNOLOGY
NFC TECHNOLOGYNFC TECHNOLOGY
NFC TECHNOLOGY
 
near field communication
near field communicationnear field communication
near field communication
 
Firewalls
FirewallsFirewalls
Firewalls
 
Near field communication.pptx
Near field communication.pptxNear field communication.pptx
Near field communication.pptx
 
IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014
IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014
IoT_and_the_Impact_on_Security_Brian_Knopf_ISSA-OC_July-2014
 
Unit-3.pptx
Unit-3.pptxUnit-3.pptx
Unit-3.pptx
 
HCE. . . and Beyond - It's Not Just a Transaction
HCE. . . and Beyond - It's Not Just a TransactionHCE. . . and Beyond - It's Not Just a Transaction
HCE. . . and Beyond - It's Not Just a Transaction
 

Nfc security shane_turner_spring2013

  • 1. Near Field Communications Security Concerns and NFCProxy Shane Turner Master of Science in Information Security 68-595 Information Security Practicum Lewis University April 22, 2013
  • 2. NFC Security - Introduction Near Field Communication (NFC) • NFC is a short range wireless technology that allows communications to take place between devices that either touch or are momentarily held close together. • Frequency 13.56Mhz • Subset of RFID • Range – usually less than 4cm • Narrow Bandwidth (106 to 424 Kbits/s) • Patented in 1983, ISO 14443 and ISO 7816 • First phone to use NFC – Nokia 6131 • Nokia, Sony and Phillips formed the NFC Forum
  • 3. NFC Security – How is NFC Used ? Uses for NFC Technology • Digital Wallet (i.e. Google Wallet) • Expect NFC smartphones to account for about 50 percent of the phone marketplace by 2014 [source: Popular Science] • Info Tags or Smart Tags • A system called Personal Rosetta Stone that lets cemetery visitors pull information from chip-laden headstones to read the life stories and obituaries of the deceased [source: Rosetta Stone]. • Movies Posters embedded with NFC chips will be able to link the user to the movie trailer or coupons that could be used at the theater. • Gentags • Diagnostic skin tags that are affixed directly to the patient. These tags can monitor temperature, glucose levels or ultraviolet light exposure and then send pertinent health information directly to a smartphone.
  • 4. NFC Security – How is NFC Used ? Uses for NFC Technology • NFC in your Car • Car companies are using NFC technology for proximity sensors that allow you to unlock your car • Push button start in cars as long as your NFC device is in the car. • Hotels • NFC chips are embedded into devices that will unlock the door to your hotel room. • At Work • NFC Devices used as access control devices allowing or disallowing access into secure areas.
  • 5. NFC Security – How is NFC Used ? Uses for NFC Technology • Virtual press kits and business cards (http://www.tapmy.biz/) • Smartphones • Information points such as posters • Speakers, Headphones, various music players • Cameras • TV • Appliances • Computers • Smart Meters for Utilities Companies • Digital bubble gum machine • Heart Monitor • Wii U • Public Transportation
  • 6. NFC Security – Advantages of NFC What are the Advantages of NFC? • Augmented Shopping Experience • Many Tech Companies are getting on board • Other companies – McDonalds, Toys-R-Us, CVS, Home Depot, Radio Shack, Office Max, Walgreens, Sports Authority and many other retailers • Quick and Easy access • Improved Customer Service • Real Time Updates • Versatility • Safety
  • 7. NFC Security – Risks What are the Security Risks of NFC? • Sensitive Financial Data • Data confidentiality • Eavesdropping • Data Corruption • Viruses • Man-in-the-middle • Lack of Education • Theft
  • 8. NFC Security – NFCProxy Demonstration NFCProxy Demonstration
  • 9. NFC Security – NFCProxy What is NFCProxy? • Proof of Concept Tool for Pentesters • Demonstrates insecurities in near field communication and contactless credit cards. • Demonstrated by Eddie Lee @ Defcon 20 (Security Researcher @ BlackWing Intelligence) • Software developed by Igor Miladinovic. • Useful in NFC protocol analysis for further NFC security research. • Project was to create a pentest tool that could analyze RFID protocols and proxy transactions using Android phones. • Proxy transactions, Save transactions, Export transactions, PCD relay and Tag relay
  • 10. NFC Security – NFCProxy Architecture Architecture NFCProxy Normal List of Acronyms • APDU - Application Protocol Data Unit • NFC – Near Field Communications • PCD - Proximity Coupling Device • POS - Point of Sale
  • 11. NFC Security – NFCProxy Hardware NFCProxy Hardware • A Proximity Coupling Device (PCD) such as one made by VivioPay • Two Android smartphones with NFC capabilities. For example; Galaxy S3, Nexus S or Galaxy Nexus. • A contactless credit card.
  • 12. NFC Security – NFCProxy Software NFCProxy Software • NFCProxy which can be found at soundforge.net • CyanogenMod – custom ROM found at cyanogenmod.org • Must be installed on smartphone used for Proxy Mode • Android version 2.3 (Gingerbread) or newer running on the smartphones.
  • 13. NFC Security – NFCProxy Setup NFCProxy Setup • Must have a Wi-Fi connection to transport data. • Download and install NFCProxy Software to both smartphones. • Configure Wi-Fi Connection between phones. • Have PCD unit powered on.
  • 14. NFC Security – NFCProxy - Proxy Mode Proxy Mode • Set up the smartphone (not running Cyanogen) in Relay mode near the credit card you want to use for a transaction. • Go to the other smartphone that is running the Cyanogen custom ROM and ensure NFCProxy is running in Proxy mode. • Relay mode opens up a network socket and waits for a network connection from the other device running NFCProxy in proxy mode. • With the Relay Mode smartphone, place it near the contactless credit card until NFCProxy displays the credit card information on the screen. • Now send the information to the smartphone running in Proxy Mode. • With the smartphone running in Proxy Mode swipe the phone in front of the PCD and you should hear an alert and see green light upon a successful transaction.
  • 15. NFC Security – NFCProxy Credit Card Data Credit Card Data Credit Card Data Successful Transaction
  • 16. NFC Security – NFCProxy - Proxy Mode NFC NFCWiFi (IP) Proxy Mode Set to REPLAY Mode Set to PROXY Mode APDU APDU
  • 17. NFC Security – NFCProxy – Relay Mode Relay Mode • Use smartphone running Cyanogen ROM • Open NFCProxy and set it in Replay mode. • Scan RFID credit card and acquire the information on card. • Long click on the credit card information on the screen and then select the “REPLAY TAG” option at the top of the phone • You should then see a letter “T” at the top of the screen. • Place the smartphone in front of the credit card reader. • Credit Card reader should light up and beep if there is a successful transaction
  • 18. NFC Security – NFCProxy - Relay Mode NFC NFC Relay Mode APDU APDU Set to Relay Mode Walk to PCD
  • 19. NFC Security – NFCProxy Discussion Discussion / Lessons Learned • Both phones must be rooted • Need correct tools to complete this process • Install correct version Cyanogen Mod • Most current version is now working • Point of Sale devices like the PCD units are easy to acquire • Able to acquire on EBay (VivioPay 4000 & VivioPay 4500) • Local Wi-Fi connections easy to set up, long distance connection - some advanced networking skills needed (VPN knowledge) • Acquiring an RFID credit Card. • Visa - PayPass • Built in security from credit card companies • Attempts to scan the card out of sequence the card will be deactivated.
  • 20. NFC Security – Vulnerabilities in Detail Vulnerabilities • Credit Card skimming using NFCProxy • Identity Theft • Financial ruin • Malware • Know Malware programs • End of July 2012 – 5,000 • End of September 2012 - 51,500 • End of 2012 - 283,000 • Scanning of malicious NFC tags • Can transfer your data if compromised • 25% or 25,000,000 Android Devices are infected
  • 21. NFC Security – Vulnerabilities in Detail Vulnerabilities Continued • Google Apps • 75% of malware-infected apps downloaded from Google Play [McAfee Mobile Security] • One-in-six chance of downloading a risky app • ¼ of these apps contain both malware and a suspicious URL capable of • Click fraud • Phishing schemes • McAfee Labs - found that 40% of malware misbehaved in a complex way • Hard to detect • Take advantage of specific technology (NFC)
  • 22. NFC Security – Mitigating NFC Security Risks Mitigations • Needs to be a team effort – Proactive not Reactive • NFC Forum Members • Consumers • Application Developers • Manufactures • Turn NFC off • Do not use RFID credit Cards • Virus Protection on Smartphone • Use trusted / certified apps only
  • 23. NFC Security – Questions Questions?
  • 24. NFC Security – Other Resources Other NFC Resources Worth Mention • NFC Videos • NFC Proxy Demo - http://www.youtube.com/watch?v=w_vYuLyfw3E • Defcon 20 video, NFC Hacking: The Easy Way - http://www.youtube.com/watch?v=7ElZBI9PufY • NFC Proxy – University of Texas at Austin - UT ComSoc - http://www.youtube.com/watch?v=Yjfc60LGjik • Shmoocon 2012: Credit Card Fraud: The Contactless Generation Application Developers - http://www.youtube.com/watch?v=HRXb-FZ6WFM • How NFC phones can steal your credit card info - http://www.youtube.com/watch?v=EKks3vfiy6Q