Physical Access Control Systems
_

All About HID

Published: January 4, 2026
Warning: This is a security research article. Always obtain proper authorization before testing any access control systems. Unauthorized testing of physical security systems is illegal and unethical.

HID Global is one of the most prominent manufacturers of access control credentials and readers. Their technologies span both low frequency (125 kHz) and high frequency (13.56 MHz) systems, with varying levels of security. Here in the UK, HID alongside EM410X and MIFARE are among the most common PAC vendors used.

Introduction

HID Global (originally Hughes Identification Devices) produces a wide range of RFID and NFC credentials used in access control systems worldwide. HID offers both low-frequency and high-frequency solutions, each with distinct characteristics and security properties.

Types of HID Technologies

HID technologies can be broadly categorized by frequency and security level:

Low Frequency (125 kHz) Technologies

HID Prox

High Frequency (13.56 MHz) Technologies

HID iCLASS

HID Seos

Identification Through the Reader

HID seems to love the look of their own logo, so it's often very easy to identify a reader as HID due to stickers or branding. Specific readers either have markings or telltale unit design.

Note: You can identify a reader, but this is not to say that a given reader does not also support other card technologies. Investigative practice should draw information from all observable avenues, not solely readers.

iCLASS SE

In this particular case the sticker gives it away, but SE readers tend to have a distinct LED strip on the top.


iCLASS SE

Seos

Similar to the iCLASS SE, but with a different profile and dual tone design. Still features the LED strip on the top.

Seos

ProxCard

Usually have those aesthetic ridges in the reader face, with the HID branding engraved.

ProxCard II

Indala

Very distinctive rdiged design with the Indala logo and four red dot array as an LED indicator.

Indala

AWID

A minimalist design with a single LED indicator on the top left, with the AWID logo engraved.

AWID

A Word on Frequency Detection

As previously mentioned in other articles, a really useful tool for your arsenal is an RFID field detector. They have an LF and RF coil hooked up to separate LED indicators, which shows you what frequency the reader you present it to operates on.

HID Technology Comparison

Technology Frequency Clonable? Emulatable? Notes
ProxCard / ProxCard II 125 kHz (LF) Clonable Emulatable No encryption, easily cloned.
Indala 125 kHz (LF) Clonable Emulatable Similar to Prox, no encryption.
AWID 125 kHz (LF) Clonable Emulatable Plaintext format, clonable.
iCLASS 13.56 MHz (HF) Deployment-dependent Partially Emulatable Vulnerable if default keys used; secure if properly configured. Uses DES encryption.
iCLASS SE 13.56 MHz (HF) Deployment-dependent Partially Emulatable Improved key management, but still potentially exploitable. Uses enhanced DES encryption.
iCLASS Elite 13.56 MHz (HF) Not clonable Partially Emulatable Stronger cryptographic features, more secure. Uses DES or AES encryption.
Seos 13.56 MHz (HF) Not clonable Not emulatable Modern, secure credential with key diversification. Uses AES-128 encryption.

Cloning HID Technologies

Low Frequency (Prox, Indala)

Low-frequency HID technologies are the easiest to clone due to their lack of encryption and full reliance on UID authentication. For this reason, it is no more complicated than cloning any other low frequency RFID tag. You can use a T5577 to emulate pretty much any low frequency RFID credential.

[usb] pm3 --> lf hid read [+] Reading HID Prox tag... [+] Tag ID: 2006fc0d (26 bits) [+] Format: H10301 [+] Facility Code: 200 [+] Card Number: 1797 [usb] pm3 --> lf hid clone 2006fc0d [+] Cloning HID tag with ID: 2006fc0d [+] Writing to T55x7 tag... [+] Done!

High Frequency (iCLASS)

iCLASS credentials are more challenging due to DES encryption. Cloning success depends on the specific implementation of the credential and reader, alongside whether default keys are in use.

Note: iCLASS cloning typically requires either default keys, a compromised key database, or sophisticated cryptanalysis. Many iCLASS implementations use default keys, making them vulnerable. Tools such as the iCopy-X ICS Decoder claim to be able to decode and clone legacy portions of iClass cards if they are configured as such.
[usb] pm3 --> hf iclass read [+] Reading iCLASS tag... [+] UID: 04 12 34 56 78 90 12 [+] Attempting authentication with default keys... [+] Authentication successful with default key!

Conclusion

HID technologies span a wide range of security levels, from easily clonable low-frequency Prox cards to highly secure Seos credentials. Low-frequency technologies (125 kHz) are generally insecure and easily cloned, while high-frequency technologies (13.56 MHz) vary significantly in security depending on the specific implementation and encryption used. When encountering HID credentials, identifying the frequency and specific technology is the first step in assessing exploitability. Always remember that proper authorization is required before testing any access control system.

← Back to Home