<?xml version='1.0'?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:georss="http://www.georss.org/georss" xmlns:atom="http://www.w3.org/2005/Atom" >
<channel>
	<title><![CDATA[PublMe - Space: Posted Reaction by PublMe bot in PublMe]]></title>
	<link>https://publme.space/reactions/v/51153</link>
	<atom:link href="https://publme.space/reactions/v/51153" rel="self" type="application/rss+xml" />
	<description><![CDATA[]]></description>
	
	<item>
	<guid isPermaLink="true">https://publme.space/reactions/v/51153</guid>
	<pubDate>Mon, 03 Mar 2025 22:00:08 +0100</pubDate>
	<link>https://publme.space/reactions/v/51153</link>
	<title><![CDATA[Posted Reaction by PublMe bot in PublMe]]></title>
	<description><![CDATA[
<p>Here’s A Spy Movie-Grade Access Card Sniffing Implant</p>
<div><img width="800" height="450" src="https://hackaday.com/wp-content/uploads/2025/02/hadimg_wiegand_tick_feat.png?w=800" alt="" srcset="https://hackaday.com/wp-content/uploads/2025/02/hadimg_wiegand_tick_feat.png 1280w, https://hackaday.com/wp-content/uploads/2025/02/hadimg_wiegand_tick_feat.png?resize=250, 141 250w, https://hackaday.com/wp-content/uploads/2025/02/hadimg_wiegand_tick_feat.png?resize=400, 225 400w, https://hackaday.com/wp-content/uploads/2025/02/hadimg_wiegand_tick_feat.png?resize=800, 450 800w" data-attachment-id="766183" data-permalink="https://hackaday.com/2025/03/01/this-gesture-sensor-is-precise-cheap-well-hidden/hadimg_wiegand_tick_feat/" data-orig-file="https://hackaday.com/wp-content/uploads/2025/02/hadimg_wiegand_tick_feat.png" data-orig-size="1280,720" data-comments-opened="1" data-image-meta="{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}" data-image-title="hadimg_wiegand_tick_feat" data-image-description="" data-image-caption="" data-medium-file="https://hackaday.com/wp-content/uploads/2025/02/hadimg_wiegand_tick_feat.png?w=400" data-large-file="https://hackaday.com/wp-content/uploads/2025/02/hadimg_wiegand_tick_feat.png?w=800"></div><p>Some of our devices look like they’re straight out of hacker movies. For instance, how about a small board you plant behind an RFID reader, collecting access card data and then replaying it when you next walk up the door? [Jakub Kramarz] brings us <a rel="nofollow" href="https://github.com/jkramarz/TheTick?tab=readme-ov-file#comparison-to-other-projects" target="_blank">perhaps the best design on the DIY market</a>, called <a rel="nofollow" href="https://github.com/jkramarz/TheTick" target="_blank">The Tick</a> – simple, flexible, cheap, tiny, and fully open-source.</p><p>Take off the reader, tap into the relevant wires and power pins (up to 25V input), and just leave the board there. It can do BLE or WiFi – over WiFi, you get a nice web UI showing you the data collected so far, and letting you send arbitrary data. It can do Wiegand like quite a few open-source projects, but it can also do arbitrary clock+data protocols, plus you can just wire it up quickly, and it will figure out the encoding.</p><p>We could imagine such a board inside a Cyberpunk DnD rulebook or used in Mr Robot as a plot point, except that this one is real and you can use it today for red teaming and security purposes. Not to say all applications <a rel="nofollow" href="https://hackaday.com/2014/08/01/building-the-nsas-tools/">would be</a> <a rel="nofollow" href="https://hackaday.com/2014/07/10/homebrew-nsa-bugs/">NSA-catalog-adjacent</a> pentesting – you could use such a bug to <a rel="nofollow" href="https://hackaday.com/2014/01/18/sniffing-wired-garage-door-opener-signals/">reverse-engineer your own garage door opener</a>, for one.</p>]]></description>
	<dc:creator>PublMe bot</dc:creator>
</item>

</channel>
</rss>