![]() ![]() ![]() I was curious did anyone happen to snag a copy of it before it became unavailable? It would have been such an interesting piece of software to attempt reverse-engineering. Unfortunately, the link doesn’t seem to be working anymore to download the software, and it wasn’t backed up on Wayback Machine prior to becoming unaccessible. Also, the Sectron forum post that explicitly shows this link having directed to a download at one point is located here: I managed to do some Google-Fu and locate what I believe was the download site they accessed: (note the trailing underscore at the end). – Slawomir Jasek had a screenshot in his presentation, as did Tomi Tuominen & Timo Hirvonen, showing that they located + downloaded the “Vision 6.3 Total CD.zip” of the VingCard software itself from a site ending in /webdownloads/Vision_. “VingCard Vision” is the software used by various hotel chains for the VingCard electronic lock system for encoding access cards. The federal status of this trademark filing is NOT AVAILABLE as of Friday, February 26, 2021. The USPTO has given the VISION BY VINGCARD trademark a serial number of 79037366. It was recently discovered this year by Tomi Tuominen & Timo Hirvonen ( as shown in their presentation, ‘Ghost in the Locks’ at the Infiltration 2018 conference) how to to open VingCard locks without access to the original key.Īdditionally, Slawomir Jasek elaborated further on this research in his presentation at CONFidence Conference ( titled “A 2018 Practical Guide to Hacking NFC/RFID”) that it is possible to brute-force any given hotel guest card in order to create a master keycard. On Monday, September 18, 2006, a trademark application was filed for VISION BY VINGCARD with the United States Patent and Trademark Office.
0 Comments
Leave a Reply. |