Learn, hack!

Hacking and security documentation: slides, papers, video and audio recordings. All in high-quality, daily updated, avoiding security crap documents. Spreading hacking knowledge, for free, enjoy. Follow on .

Magnetic Stripe Technology

URL
http://dewy.fem.tu-ilmenau.de/CCC/22C3/video/22C3-765-en-magnetic_stripe_technology.mp4
File name
22C3-765-en-magnetic_stripe_technology.mp4
File size
427.1 MB
MD5
6a0ba27f05cb21edbbb2cd9c5b9f16f7
SHA1
8397772c9ad34f9f2cc25977df190f95d6d9e110

Find out how magnetic stripe technology works, how it can be hacked, how to build a card reader with parts you can find in your 'junk drawer', and how this reader design can be used to reverse engineer proprietary formats. Here in New York, I wanted to investigate the content of the MetroCard's magnetic stripe (the fare control card used in the subway system). Because the card format is completely proprietary, I had to design a reader capable of dumping the content, which lead me to the design described here: http://www.sephail.net/articles/magstripe/ I designed the reader hardware to be as simple as possible while having all of the demodulation of the signals done in software (through a sound card interface). I originally wrote the reader software to conform to the standard track formats (ISO 7811, 7813, 4909, etc.) and tweaked it to become capable of reading the MetroCard format as well. I then proceeded to reverse engineer the content of the MetroCard, and as of last Spring, have published (in 2600 Magazine) the most complete description of the MetroCard system that I know to exist. The lecture will basically describe the theory of magnetic stripes, how the reader design works, how to build one yourself, how the decoding software functions, and how to use it to possibly reverse-engineer other proprietary formats (by using the MetroCard as a recent practical example) -- and of course, read all the standard cards floating around in your wallet ;-).

About us

Secdocs is a project aimed to index high-quality IT security and hacking documents. These are fetched from multiple data sources: events, conferences and generally from interwebs.

Statistics

Serving 8166 documents and 531.0 GB of hacking knowledge, indexed from 2419 authors from 163 security conferences.

Contribute

To support this site and keep it alive, you can click on the buttons below. Any help is really appreciated! This service is provided for free, but real money is needed to pay bills.

Flattr this Click here to lend your support to: Keep live SecDocs for an year and make a donation at www.pledgie.com !