Learn, hack!

Hacking and security documentation: slides, papers, video and audio recordings. All in high-quality, daily updated, avoiding security crap documents. Spreading hacking knowledge, for free, enjoy. Follow on .

Magnetic Stripe Technology

URL
http://events.ccc.de/congress/2005/fahrplan/attachments/697-slides_magnetic_stripe_technology.pdf
File name
697-slides_magnetic_stripe_technology.pdf
File size
326.3 KB
MD5
5055c06d68e50d415b593829c916defd
SHA1
adf9072b305746c05107b36575ec1314486e1bd4

Find out how magnetic stripe technology works, how it can be hacked, how to build a card reader with parts you can find in your 'junk drawer', and how this reader design can be used to reverse engineer proprietary formats. Here in New York, I wanted to investigate the content of the MetroCard's magnetic stripe (the fare control card used in the subway system). Because the card format is completely proprietary, I had to design a reader capable of dumping the content, which lead me to the design described here: http://www.sephail.net/articles/magstripe/ I designed the reader hardware to be as simple as possible while having all of the demodulation of the signals done in software (through a sound card interface). I originally wrote the reader software to conform to the standard track formats (ISO 7811, 7813, 4909, etc.) and tweaked it to become capable of reading the MetroCard format as well. I then proceeded to reverse engineer the content of the MetroCard, and as of last Spring, have published (in 2600 Magazine) the most complete description of the MetroCard system that I know to exist. The lecture will basically describe the theory of magnetic stripes, how the reader design works, how to build one yourself, how the decoding software functions, and how to use it to possibly reverse-engineer other proprietary formats (by using the MetroCard as a recent practical example) -- and of course, read all the standard cards floating around in your wallet ;-).

About us

Secdocs is a project aimed to index high-quality IT security and hacking documents. These are fetched from multiple data sources: events, conferences and generally from interwebs.

Statistics

Serving 8166 documents and 531.0 GB of hacking knowledge, indexed from 2419 authors from 163 security conferences.

Contribute

To support this site and keep it alive, you can click on the buttons below. Any help is really appreciated! This service is provided for free, but real money is needed to pay bills.

Flattr this Click here to lend your support to: Keep live SecDocs for an year and make a donation at www.pledgie.com !