Exploit of Keri Key Card System 2010

This was an exploit we found while working on a gate where the back-end controller was compromised to open the gate, not using the card cloning method. All we needed was an IP address which can be geolocated for physical location and the gateway has a unique signature on the internet.