2024-09-22, 15:10–16:10 (Europe/Belgrade), Tesla
I'm going to talk about theory for solutions of quest steps and using well-known & new tools for RFID pentest
There's some intro with basics & theory
After that we disclosure how is possible to pass the quest
And which tools are helpful in this kind of security
Level: from basics to medium
I'm crazy about IT and smth around it
So, for about 10 years I'm taking part in several communities (like DCG, 2600, CTF) in different roles (org/ambassador/member/speaker) and made speech & stands on big confs on post-Soviet space