{"id":9585,"date":"2022-11-02T06:35:44","date_gmt":"2022-11-02T06:35:44","guid":{"rendered":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/product\/in-person-hands-on-hacking-for-nfc-rfid-hitb2023ams\/"},"modified":"2023-04-18T06:25:58","modified_gmt":"2023-04-18T06:25:58","slug":"hands-on-hacking-for-nfc-rfid-hitb2023ams","status":"publish","type":"product","link":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/product\/hands-on-hacking-for-nfc-rfid-hitb2023ams\/","title":{"rendered":"Hands-On Hacking for NFC\/RFID [2-Day]"},"content":{"rendered":"<p>&nbsp;<\/p>\n<hr \/>\n<div class=\"page\" title=\"Page 3\">\n<div class=\"layoutArea\">\n<h4 style=\"text-align: left\"><span style=\"color: #993300\"><em><strong>This 2-day NFC\/RFID course is part of a 4-day BLE &amp; NFC\/RFID course.<\/strong><\/em><\/span><\/h4>\n<h5 style=\"text-align: left\"><span style=\"color: #993300\"><em><br \/>\n&#8211; To join the 2-day BLE course instead, <a href=\"https:\/\/sectrain.hitb.org\/courses\/in-person-hands-on-hacking-for-ble-hitb2023ams\/\"><strong>click here<\/strong>.<\/a><br \/>\n&#8211; To join both BLE and NFC\/RFID with a combo discount for 4 days, <a href=\"https:\/\/sectrain.hitb.org\/courses\/in-person-hands-on-hacking-for-ble-nfc-rfid-4-day-combo-hitb2023ams\/\"><strong>click here<\/strong>.<\/a><br \/>\n&#8211; To join only this 2-day NFC\/RFID class, read further below.<br \/>\n<\/em><\/span><\/h5>\n<div>\n<hr \/>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"page\" title=\"Page 3\">\n<div class=\"layoutArea\">\n<h4><strong style=\"font-size: 16px\"><span style=\"color: #993300\">\u00a0<\/span><\/strong><\/h4>\n<\/div>\n<\/div>\n<div class=\"page\" title=\"Page 3\">\n<div class=\"layoutArea\">\n<h2><strong><span style=\"color: #993300\">REGISTRATION CLOSED<\/span><\/strong><\/h2>\n<h4><strong>DATE: 19-20 April 2023<\/strong><\/h4>\n<h4><strong>TIME: 09:00 to 17:00 CEST\/GMT+2<\/strong><\/h4>\n<\/div>\n<\/div>\n<table style=\"height: 126px\" width=\"669\">\n<tbody>\n<tr>\n<td><strong>Date<\/strong><\/td>\n<td><strong>Day<\/strong><\/td>\n<td style=\"text-align: left\"><strong>Time<\/strong><\/td>\n<td><strong>Duration<\/strong><\/td>\n<\/tr>\n<tr>\n<td>19 Apr<\/td>\n<td>Wednesday<\/td>\n<td>09:00 to 17:00 CEST\/GMT+2<\/td>\n<td>8 Hours<\/td>\n<\/tr>\n<tr>\n<td>20 Apr<\/td>\n<td>Thursday<\/td>\n<td>09:00 to 17:00 CEST\/GMT+2<\/td>\n<td>8 Hours<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<div class=\"page\" title=\"Page 3\">\n<div class=\"layoutArea\">\n<h5>It is still surprisingly easy to clone so many access control tags used today.<\/h5>\n<h5>RFID\/NFC has been around us for quite some time now. However, many of its vulnerabilities pointed out since years ago probably won\u2019t yet be resolved in the near future.<\/h5>\n<p>During this training\u2019s practical hands-on exercises, we will clone, crack, simulate and brute-force both \u00a0\u201cLow Frequency\u201d 125kHz RFID (EM, HID Prox, \u2026) as well as \u201cHigh Frequency\u201d 13.56MHz (Mifare, iClass, DESFire, ISO15693, \u2026) &#8211; using dedicated hardware (trainees get to keep these!), or in some cases with just a typical smartphone. We will examine and attack communication between the reader and access controller.\u00a0 We will also exploit reader vulnerabilities allowing to unlock without the need to have a valid card, and reverse-engineer a sample hotel system and create an \u201cemergency\u201d card that will unlock unconditionally all the doors in the facility \u2013 having nothing more than just a guest card and a phone.<\/p>\n<p>The training aims not only to raise awareness about the weaknesses of legacy systems, but also provide a solid insight of current technologies which are regarded as more secure. We will abuse implementation flaws and perform remote relay and downgrade attacks on both latest HID SEOS as well as DESFire access control installations. Attendees will also learn how to approach modern contactless smart cards and analyse currently trending mobile access control systems (phone acting as an NFC tag) \u2013 based among others on real vulnerabilities of a sample system.<\/p>\n<\/div>\n<\/div>\n<p>&nbsp;<\/p>\n<h5><strong>Key Learning Objectives<\/strong><\/h5>\n<ul>\n<li>Solid understanding of NFC\/RFID.<\/li>\n<li>Ability to perform in practice typical attacks: cloning, cracking, remote relays<\/li>\n<li>Point out common implementation pitfalls in both legacy and modern systems.<\/li>\n<li>Analyse security of mobile access solutions.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<div class=\"page\" title=\"Page 3\">\n<div class=\"layoutArea\">\n<h5><strong>Each student will receive<\/strong><\/h5>\n<ul>\n<li>Course materials \u2013 about 1000 pages, step by step instructions for hands-on exercies.<\/li>\n<li>All required additional files: source code, documentation, installation binaries, virtual machine images.<\/li>\n<li><strong><span style=\"color: #993300\">Included hardware pack <\/span><\/strong>for hands-on exercises, consisting of Proxmark 3 with latest firmware, various sample tags (including \u201cmagic\u201d ones), NFC PN532 board.<\/li>\n<li>Don&#8217;t have an Android phone? Sign up for both 2-day trainings (<a href=\"https:\/\/sectrain.hitb.org\/courses\/hands-on-hacking-for-ble-nfc-rfid-4-day-combo-hitb2022ams\/\"><strong>click here<\/strong><\/a>), and we&#8217;ll hook you up with an Android phone with Bluetooth 4 and NFC support!<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><iframe title=\"#HITB2022AMS TRAINING - Hands-On Hacking for BLE &amp; NFC\/RFID (4-Day Combo)\" width=\"800\" height=\"450\" src=\"https:\/\/www.youtube.com\/embed\/pRoZciw3vc4?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" allowfullscreen><\/iframe><\/p>\n<p>&nbsp;<\/p>\n<h5><strong>Agenda<br \/>\n<\/strong><\/h5>\n<h5><strong>Day 1<\/strong><\/h5>\n<hr \/>\n<p><strong>1. Short introduction<\/strong><br \/>\na) RFID\/NFC \u2013 where do I start?<br \/>\nb) Frequencies, card types, usage scenarios.<br \/>\nc) How to recognize card type \u2013 quick walkthrough.<br \/>\nd) Equipment, and what can you do with it \u2013 mobile phone, card reader, simple boards, Chameleon Mini, Proxmark, other hardware.<\/p>\n<p><strong>2. UID-based access control<\/strong><br \/>\na) Introduction &#8211; simple, still surprisingly common technologies<br \/>\nb) Communication between a reader and tag.<br \/>\nc) What is stored on the tag?<br \/>\nd) Low Frequency EM410X (\u201cunique\u201d), HID Prox, \u2026, High Frequecy Mifare UID<br \/>\ne) Cloning card\u2019s UID \u2013 cloners, Proxmark, Chameleon, mobile phone, &#8230;<br \/>\nf) Simulating (Proxmark, Chameleon, mobile phone,&#8230;), brute-forcing.<br \/>\ng) Interpreting markings on the tag, decoding UID from the picture.<br \/>\nh) Sample vulnerability of simple access control reader that allows to unlock it without the need to have a valid card.<br \/>\ni) Countermeasures against attacks<\/p>\n<p><strong>3. Wiegand \u2013 typical transmission between the reader and access controller<\/strong><br \/>\na) Theory introduction, signal DATA0, DATA1<br \/>\nb) Wiegand sniffers, implants, transmitters \u2013 hardware, open source software<br \/>\nc) Decoding card UID from sniffed bytes, clone the card<br \/>\nd) Replay card data on the wire to open lock<\/p>\n<p><strong>4. Mifare Ultralight, NTAG<\/strong><br \/>\na) Data structure.<br \/>\nb) Reading, cloning, emulating.<br \/>\nc) Example data stored on a hotel guest card.<br \/>\nd) Ultralight EV1, C.<\/p>\n<p><strong>5. Mifare Classic &amp; its weaknesses \u2013 practical exercises based on hotel door lock system, ski lift card, bus ticket<\/strong><br \/>\na) Mifare Classic \u2013 data structure, access control, keys, encryption.<br \/>\nb) Default, leaked keys.<br \/>\nc) Reading and cloning card data using just a mobile phone.<br \/>\nd) Cracking keys using various attacks and tools (Proxmark, libnfc, Chameleon).<br \/>\ne) Attacks on EV1 \u201chardened\u201d Mifare Classic.<br \/>\nf) Online attacks against the reader.<\/p>\n<p>&nbsp;<\/p>\n<h5><strong>Day 2<\/strong><\/h5>\n<hr \/>\n<p><strong>6. Reverse-engineering data stored on a sample hotel system guest card<\/strong><br \/>\na) Decoding access control data (room number, date) stored on the hotel guest card.<br \/>\nb) Creating hotel \u201cemergency card\u201d to open all the hotel doors unconditionally, having only sample guest card.<\/p>\n<p><strong>7. Mifare DESFire<\/strong><br \/>\na) Introduction, data format, access modes.<br \/>\nb) Creating sample tag for DESFire access control system.<br \/>\nc) Publicly known attacks (misconfiguration, implementation issues) in smart locks, access control, ticketing systems.<\/p>\n<p><strong>8. ISO15693\/iCode<\/strong><br \/>\na) Cloning ISO15693 UID on a \u201cmagic UID\u201d card, unlocking smart lock.<br \/>\nb) Data of several example ski passes.<\/p>\n<p><strong>9. HID iClass<\/strong><br \/>\na) Cloning \u201clegacy\u201d \/ \u201cstandard security\u201d iClass.<br \/>\nb) Attacks on iClass Elite.<br \/>\nc) Downgrade attacks.<\/p>\n<p><strong>10. Remote relay attacks against NFC\/ISO1443<\/strong><br \/>\na) Introduction: research, tools, possibilities and limitations.<br \/>\nb) Practical remote relay of iClass SEOS and DESFire access control.<\/p>\n<p><strong>11. Sample Hitag2 access contol \u2013 sniffing password mode, simulating tags<\/strong><\/p>\n<p><strong>12. Host Card Emulation \u2013 smartphone as NFC tag<\/strong><br \/>\na) Hardware Secure Element vs software Host Card Emulation<br \/>\nb) Protocols, commands, applications \u2013 ISO14443-4, 7816-4, APDU, AID, \u2026<br \/>\nc) Example vulnerable HCE access control system (unlocking door using your NFC phone) \u2013 sample vulnerabilities.<br \/>\nd) NFC communication analysis: sniffing using Proxmark, dumping on the phone.<\/p>\n<p><strong>13. Intercepting card data from distance \u2013 antennas, possibilities and limits.<\/strong><\/p>\n<p>&nbsp;<\/p>\n<hr \/>\n<div class=\"page\" title=\"Page 3\">\n<div class=\"layoutArea\">\n<h4 style=\"text-align: left\"><span style=\"color: #993300\"><em><strong>This 2-day NFC\/RFID course is part of a 4-day BLE &amp; NFC\/RFID course.<\/strong><\/em><\/span><\/h4>\n<h5 style=\"text-align: left\"><span style=\"color: #993300\"><em><br \/>\n&#8211; To join the 2-day BLE course instead, <a href=\"https:\/\/sectrain.hitb.org\/courses\/in-person-hands-on-hacking-for-ble-hitb2023ams\/\"><strong>click here<\/strong>.<\/a><br \/>\n&#8211; To join both BLE and NFC\/RFID with a combo discount for 4 days, <a href=\"https:\/\/sectrain.hitb.org\/courses\/in-person-hands-on-hacking-for-ble-nfc-rfid-4-day-combo-hitb2023ams\/\"><strong>click here<\/strong>.<\/a><br \/>\n<\/em><\/span><\/h5>\n<div>\n<hr \/>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"page\" title=\"Page 3\">\n<div class=\"layoutArea\">\n<h4><\/h4>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; This 2-day NFC\/RFID course is part of a 4-day BLE &amp; NFC\/RFID course. &#8211; To join the 2-day BLE course instead, click here. &#8211; To join both BLE and NFC\/RFID with a combo discount for 4 days, click here. &#8211; To join only this 2-day NFC\/RFID class, read further below. \u00a0 REGISTRATION CLOSED DATE: [&hellip;]<\/p>\n","protected":false},"featured_media":9582,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false},"product_cat":[58,55,56],"product_tag":[],"class_list":{"0":"post-9585","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-2-day-training","7":"product_cat-hitb2023ams","8":"product_cat-in-person","10":"first","11":"instock","12":"featured","13":"shipping-taxable","14":"purchasable","15":"product-type-simple"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Hands-On Hacking for NFC\/RFID [2-Day] - HITBSecConf2023 - Amsterdam<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/product\/hands-on-hacking-for-nfc-rfid-hitb2023ams\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hands-On Hacking for NFC\/RFID [2-Day] - HITBSecConf2023 - Amsterdam\" \/>\n<meta property=\"og:description\" content=\"&nbsp; This 2-day NFC\/RFID course is part of a 4-day BLE &amp; NFC\/RFID course. &#8211; To join the 2-day BLE course instead, click here. &#8211; To join both BLE and NFC\/RFID with a combo discount for 4 days, click here. &#8211; To join only this 2-day NFC\/RFID class, read further below. \u00a0 REGISTRATION CLOSED DATE: [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/product\/hands-on-hacking-for-nfc-rfid-hitb2023ams\/\" \/>\n<meta property=\"og:site_name\" content=\"HITBSecConf2023 - Amsterdam\" \/>\n<meta property=\"article:modified_time\" content=\"2023-04-18T06:25:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/wp-content\/uploads\/sites\/18\/2022\/11\/Slawomir-Jasek.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/product\/hands-on-hacking-for-nfc-rfid-hitb2023ams\/\",\"url\":\"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/product\/hands-on-hacking-for-nfc-rfid-hitb2023ams\/\",\"name\":\"Hands-On Hacking for NFC\/RFID [2-Day] - HITBSecConf2023 - Amsterdam\",\"isPartOf\":{\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/product\/hands-on-hacking-for-nfc-rfid-hitb2023ams\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/product\/hands-on-hacking-for-nfc-rfid-hitb2023ams\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/wp-content\/uploads\/sites\/18\/2022\/11\/Slawomir-Jasek.jpg\",\"datePublished\":\"2022-11-02T06:35:44+00:00\",\"dateModified\":\"2023-04-18T06:25:58+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/product\/hands-on-hacking-for-nfc-rfid-hitb2023ams\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/product\/hands-on-hacking-for-nfc-rfid-hitb2023ams\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/product\/hands-on-hacking-for-nfc-rfid-hitb2023ams\/#primaryimage\",\"url\":\"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/wp-content\/uploads\/sites\/18\/2022\/11\/Slawomir-Jasek.jpg\",\"contentUrl\":\"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/wp-content\/uploads\/sites\/18\/2022\/11\/Slawomir-Jasek.jpg\",\"width\":1200,\"height\":900},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/product\/hands-on-hacking-for-nfc-rfid-hitb2023ams\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Products\",\"item\":\"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/shop\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Hands-On Hacking for NFC\/RFID [2-Day]\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/#website\",\"url\":\"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/\",\"name\":\"HITBSecConf2023 - Amsterdam\",\"description\":\"#HITB2021AMS\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hands-On Hacking for NFC\/RFID [2-Day] - HITBSecConf2023 - Amsterdam","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/product\/hands-on-hacking-for-nfc-rfid-hitb2023ams\/","og_locale":"en_US","og_type":"article","og_title":"Hands-On Hacking for NFC\/RFID [2-Day] - HITBSecConf2023 - Amsterdam","og_description":"&nbsp; This 2-day NFC\/RFID course is part of a 4-day BLE &amp; NFC\/RFID course. &#8211; To join the 2-day BLE course instead, click here. &#8211; To join both BLE and NFC\/RFID with a combo discount for 4 days, click here. &#8211; To join only this 2-day NFC\/RFID class, read further below. \u00a0 REGISTRATION CLOSED DATE: [&hellip;]","og_url":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/product\/hands-on-hacking-for-nfc-rfid-hitb2023ams\/","og_site_name":"HITBSecConf2023 - Amsterdam","article_modified_time":"2023-04-18T06:25:58+00:00","og_image":[{"width":1200,"height":900,"url":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/wp-content\/uploads\/sites\/18\/2022\/11\/Slawomir-Jasek.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/product\/hands-on-hacking-for-nfc-rfid-hitb2023ams\/","url":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/product\/hands-on-hacking-for-nfc-rfid-hitb2023ams\/","name":"Hands-On Hacking for NFC\/RFID [2-Day] - HITBSecConf2023 - Amsterdam","isPartOf":{"@id":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/#website"},"primaryImageOfPage":{"@id":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/product\/hands-on-hacking-for-nfc-rfid-hitb2023ams\/#primaryimage"},"image":{"@id":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/product\/hands-on-hacking-for-nfc-rfid-hitb2023ams\/#primaryimage"},"thumbnailUrl":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/wp-content\/uploads\/sites\/18\/2022\/11\/Slawomir-Jasek.jpg","datePublished":"2022-11-02T06:35:44+00:00","dateModified":"2023-04-18T06:25:58+00:00","breadcrumb":{"@id":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/product\/hands-on-hacking-for-nfc-rfid-hitb2023ams\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/conference.hitb.org\/hitbsecconf2023ams\/product\/hands-on-hacking-for-nfc-rfid-hitb2023ams\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/product\/hands-on-hacking-for-nfc-rfid-hitb2023ams\/#primaryimage","url":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/wp-content\/uploads\/sites\/18\/2022\/11\/Slawomir-Jasek.jpg","contentUrl":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/wp-content\/uploads\/sites\/18\/2022\/11\/Slawomir-Jasek.jpg","width":1200,"height":900},{"@type":"BreadcrumbList","@id":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/product\/hands-on-hacking-for-nfc-rfid-hitb2023ams\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/"},{"@type":"ListItem","position":2,"name":"Products","item":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/shop\/"},{"@type":"ListItem","position":3,"name":"Hands-On Hacking for NFC\/RFID [2-Day]"}]},{"@type":"WebSite","@id":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/#website","url":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/","name":"HITBSecConf2023 - Amsterdam","description":"#HITB2021AMS","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/wp-json\/wp\/v2\/product\/9585"}],"collection":[{"href":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/wp-json\/wp\/v2\/types\/product"}],"replies":[{"embeddable":true,"href":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/wp-json\/wp\/v2\/comments?post=9585"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/wp-json\/wp\/v2\/media\/9582"}],"wp:attachment":[{"href":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/wp-json\/wp\/v2\/media?parent=9585"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/wp-json\/wp\/v2\/product_cat?post=9585"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/conference.hitb.org\/hitbsecconf2023ams\/wp-json\/wp\/v2\/product_tag?post=9585"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}