There were quite few people who wanted to partake in the contest, but those, who still took the risk, did not regret it for sure.
They were to open stationary boxes (at least one of two) under locks controlled by RFID readers. The corresponding RFID tags were attached at a distance from the readers so that it was impossible to unlock the boxes directly with these tags.
Both low-frequency (125 kHz) and high-frequency (13.56 MHz) RFID tags were used in the course of the competition.
The participants were not allowed:
- to perform any actions aimed at disabling the locks controlled by RFID readers;
- to attempt destroying the boxes;
- prevent other competitors from solving the task.
The participants used their own software and hardware.
To work with the low-frequency tags, the participants used very popular USB reader ACR-122U, duplicator KeyMaster PRO 4 RF [RU], and T5557-based rewritable tags.
High-frequency identification was based on comparison of the zero sector of the card Mifare Classic 1K, containing a unique factory-programmed RFID tag unavailable for writing by an end user. Not so long ago vendors from China developed and released specific tags, identical to Mifare, but allowing rewriting UID cards. Such a tag was used by one of the participants allowing him to open the lock with the high-frequency reader.
Finally, both boxes were opened. Nikoly Chernykh and Victor Alyushin were the winners. Our congratulations!
P.S. For sure Hack the RFID will be further developed at Positive Hack Days next year.