Vulnerability Hunting in Access Control Systems

Bobby Kuzma

Join the presenter as he recounts the process of reverse engineering a common access control system to hunt for vulnerabilities both on the hardware itself, the communications protocol, and the client software. He’ll go into the methodology, both hardware and software, the techniques, and the design of the device and its countermeasures, trips to the ER, and the impact of the vulnerabilities discovered. The talk with a discussion of more effective controls that could be implemented to make a reverse engineer’s job more frustrating.