Skip to main content

Questions tagged [nfc]

NFC (Near-Field Communication) is a short-range wireless technology, typically requiring a distance of 4cm or less to initiate a connection between two endpoints.

3 votes
1 answer
212 views

I have a number of NFC tags with the following metadata: ‍‍ [usb] pm3 --> hf mfu info [=] --- Tag Information -------------------------- [+] TYPE: NTAG 215 504bytes (NT2H1511G0DU) [+] ...
Lisbeth's user avatar
  • 131
1 vote
1 answer
180 views

If I have access to the physical medium on which information is stored (hard drive, NFC chip, SSD), are there any physical measures possible to stop me from cloning the exact data to a duplicate? ...
Josh's user avatar
  • 121
4 votes
0 answers
5k views

I was not able to add a credit card to Apple Pay on an iPhone. The bank told me that they need the SEID number of the phone to resolve the issue. By a quick search on the Internet, I learned that the ...
Domon's user avatar
  • 141
0 votes
0 answers
2k views

From what I know, Mifare Classic cards are easy to copy/clone using a device such as a flipperzero, and it has to do with authentication using the CSN (card serial number) However, let's say that a ...
Ismail's user avatar
  • 1
0 votes
1 answer
353 views

Paying with credit card's NFC. I know about tokenization and all that, but does that actually protect my card against theft when the terminal is malicious?
iudhfgihdfigh's user avatar
2 votes
0 answers
528 views

What are the risks of using NFC on a YubiKey versus just a hard connector? I imagine it would be possible to sniff some data off of these security keys? How real is the risk of sniffing and what could ...
Adam Thompson's user avatar
1 vote
0 answers
200 views

Firstly, I assume it's possible to passively read the encrypted data from a ePassport NFC chip? All of the NFC scanning apps fail to load anything without the BAC. We are not interested in the ...
SuperJ's user avatar
  • 11
1 vote
1 answer
2k views

The title is pretty self explanatory. The market is pretty secretive about these kinds of matter since companies won't give out vulnerabilities for attackers to abuse and will give out vulnerabilities ...
warpeace's user avatar

15 30 50 per page
1
2 3 4 5
7