

The use of RFID always implies three things: They are capable of operating hundreds of meters from the closest RFID reader. Some tags are active and require a local power source, such as a battery. Some tags are passive, therefore they are activated by the electromagnetic fields generated by nearby readers.

Radio Frequency Identification (RFID), is a technology that uses electromagnetic fields to automatically identify and/or track “tags” that contain electronically stored information. So, before we jump in let’s learn some basics. This is not intended to teach you all about RFID, NFC, and MIFARE hacking. MIFARE Classic ones especially, which are still widely used nowadays despite the many hacks found throughout the last few years. The goal here is to cover the process of cloning and editing RFID tags. Other Proof of Concepts (PoCs) I’ve read were not so thorough, this is my attempt at being more thorough so others have a better understanding. This is not a new topic, but rather my own vision of the many different things that’ve been done concerning RFID. As we start this series, you won’t find anything that hasn’t already been discussed before.
