
Read/write F2F magstripe handheld thing for transportation tickets.
How's this related to furries ? Well, I can go see some of them for free now !
(Note the wording, I wrote "can").
33063 + L293D + TL082 + LM339 + ATTiny2313
How's this related to furries ? Well, I can go see some of them for free now !
(Note the wording, I wrote "can").
33063 + L293D + TL082 + LM339 + ATTiny2313
Category Photography / Miscellaneous
Species Unspecified / Any
Size 317 x 512px
File Size 93 kB
Listed in Folders
It's a know fact that all the checking hardware, and people checking, selling the tickets, and the printing of said tickets, cost more money than the ticket price, or the RFID cards too.
In other words, the RATP would lose less money if the Parisian subways, busses and tramways were free. (note : as you can guess, it's a public company, not a private one).
This may not apply to the sub-Parisian transportation network which is mixed with the national railway grid and depending of the SNCF.
In other words, the RATP would lose less money if the Parisian subways, busses and tramways were free. (note : as you can guess, it's a public company, not a private one).
This may not apply to the sub-Parisian transportation network which is mixed with the national railway grid and depending of the SNCF.
about 2 years ago we made an RFID reader/writer/spoofer using an LPC1768 and only a few fets and passives and one quad opamp ... it worked very well and we were able to use it to crack many security keys for all RFID ranges from 100khz to 15mhz
funny enough we got in trouble (deep trouble) for using it on the metro as a brute force example ... luckily it was for university research so the school paid all the fines!
BUT it put a stop to our research in sploofing magnetic strips BUT we were able to get our rig to work that took mag data from a dirt cheap cell phone magnetic stripe reader ($2.50) and sploof it out to a simple strip of metal with some wire coiled around it with a simple cheap CLPD
just keep in mind that in MOST places its a SERIOUS crime to get caught stealing public transportation using an exploit ... when we used it on a metro we used tags that we had LEGAL ownership of and payed for the trip and still got slapped with a $100,000 fine
we know its illegal in the US, canada, europe, france, germany, spain and south africa for a fact but thats all the research we did at the time (not that much)
funny enough we got in trouble (deep trouble) for using it on the metro as a brute force example ... luckily it was for university research so the school paid all the fines!
BUT it put a stop to our research in sploofing magnetic strips BUT we were able to get our rig to work that took mag data from a dirt cheap cell phone magnetic stripe reader ($2.50) and sploof it out to a simple strip of metal with some wire coiled around it with a simple cheap CLPD
just keep in mind that in MOST places its a SERIOUS crime to get caught stealing public transportation using an exploit ... when we used it on a metro we used tags that we had LEGAL ownership of and payed for the trip and still got slapped with a $100,000 fine
we know its illegal in the US, canada, europe, france, germany, spain and south africa for a fact but thats all the research we did at the time (not that much)
its a failed method of trying to contain such exploits ... same goes for breaking in to cars using keyfob sploofing and cellphone auth exploitation ... you slap a huge fine on anyone trying to do research in to the subject and hope the criminals dont do there own studying
it never works ... but it alllll started not too long ago at defcon 14 with this kinkos attack http://www.youtube.com/watch?v=NCCap1Rqv9s that after someone made a PCB card and started selling them put kinkos out of millions ... it soon spread to other price-on-card devices and anything private they sue and anything public they ban to try and cover it up but like i said it never works its still happening today
we made an exploit as a (failed) bid for a defcon talk that uses a TI Chronos wristwatch that uses a CC430F6137 processor thats MSP430 based with a built in 1ghz transceiver running at 433 MHz we were able to both monitor and playback car lock and unlock commands and brute force (some of) themall on this $50 watch ... these exploits are too easy to do and using tools and materials that are increasingly easy to get your hands on ... there needs to be newer standardizations and an "ok you got us we will fix it" approach to hackers not a "oh you figured us out? we will remove it from the internet and sue the shit out of you!"
it never works ... but it alllll started not too long ago at defcon 14 with this kinkos attack http://www.youtube.com/watch?v=NCCap1Rqv9s that after someone made a PCB card and started selling them put kinkos out of millions ... it soon spread to other price-on-card devices and anything private they sue and anything public they ban to try and cover it up but like i said it never works its still happening today
we made an exploit as a (failed) bid for a defcon talk that uses a TI Chronos wristwatch that uses a CC430F6137 processor thats MSP430 based with a built in 1ghz transceiver running at 433 MHz we were able to both monitor and playback car lock and unlock commands and brute force (some of) themall on this $50 watch ... these exploits are too easy to do and using tools and materials that are increasingly easy to get your hands on ... there needs to be newer standardizations and an "ok you got us we will fix it" approach to hackers not a "oh you figured us out? we will remove it from the internet and sue the shit out of you!"
Comments