🔓 Part 3 of my Hardware Hacking Series: Building the Complete Test System, Flashing Firmware & Adding Users 🚀
![]() |
Part 3 of my series on hacking cheap NFC access control systems is now online! This time, we finally bring everything together: the reader from Part 1 and the open-source controller from Part 2 are assembled into a fully working test system. From there, we flash the firmware, configure the system, and even add a test user with an NFC token. 🔧 What’s covered in this episode: • Building the complete reader + controller test setup • Relay connections explained – including NO vs. NC and different types of magnetic locks • Flashing the firmware (incl. Wiegand-NG fork) using ESP Web Serial • Logging into the web frontend and exploring hardware settings • Configuring custom Wiegand bit lengths (e.g., Wiegand 35 instead of standard Wiegand 34) • Adding a test user and enrolling a token • Testing user administration and verifying that everything works 💡 Why this matters: By the end of Part 3, we have a fully functional, self-built access control system. This will be the foundation for the next step: hacking and analyzing its weaknesses. 📺 Watch Part 3 here: 👉 https://youtu.be/o-UJBnzyWBc 🗣️ Note: The video is in German, but just like the previous parts it includes English subtitles. 👀 Missed the earlier parts? • Part 1 – First look at the NFC reader, setup & initial tests 👉 https://youtu.be/Y_j83VBhsoY • Part 2 – Building the open-source controller on breadboard & perfboard 👉 https://youtu.be/6hrlLVSxcps [link] [comments] |
from hacking: security in practice https://ift.tt/UKEY16x
Comments
Post a Comment