Mifare-Windows-Tool
proxmark3
Mifare-Windows-Tool | proxmark3 | |
---|---|---|
3 | 60 | |
223 | 3,834 | |
- | 4.2% | |
5.6 | 9.9 | |
over 1 year ago | 4 days ago | |
C# | C | |
MIT License | GNU General Public License v3.0 only |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Mifare-Windows-Tool
-
Convert Flipper NFC file to Proxmark3 dump?
Hi, my new beta release of Mifare windows tools can make conversion from/to Android (MCT) / Libnfc (MWT) / flipper Zero --> https://github.com/xavave/Mifare-Windows-Tool/releases/tag/beta1.5.8370.41492
-
Mifare card not properly cloned
nfc-mfclassic W b cardtocopy.dmp blank.dmp (after dumping both cards with mfoc). I use MWT (https://github.com/xavave/Mifare-Windows-Tool, which uses mfdread to read the dumps and display the next to each other) to read both cards and compare them, and as far as I can see they're identical.
-
Read Mifare Commons Area Key
Now that you have your card itโs time to write to it. Different operating systems does things a little bit differently. On windows theres some different tools that you can use but i recommend https://github.com/xavave/Mifare-Windows-Tool which has a simple setup process and nice buttons
proxmark3
-
Flipper Zero: Multi-Tool Device for Geeks
I would check out the Proxmark3 Github repo [0]. They have a cheatsheet [1] with the basics on how to get started. I also did a talk about RFID security last year about the basics [2]
To get started, the basics are: low freq (LF) is usually around 125khz and is rarely encrypted (HID Prox is the most common in the US). The data is often encoded in Wiegand format for access control systems (something to keep in mind when reading the raw data).
High freq (HF) (aka NFC) is ~13Mhz and is readable by most Android phones with NFC. Not all tag data can be read however. HF cards support a lot of different options including data storage (normally in a block layout with permissions to read and write depending on keys) and encryption (iCLASS and SEOS being the HID offerings and very common). Some can be cloned (like hotel cards) while others (like SEOS) require a downgrade attack to work correctly (SEOS -> normal SEOS reader -> Weigand data -> older style card like HID Prox).
[0] https://github.com/RfidResearchGroup/proxmark3
[1] https://github.com/RfidResearchGroup/proxmark3/blob/master/d...
[2] https://www.youtube.com/watch?v=zKOAywZqisc
- Proxmark3 Unleashes 'Faraday': A Leap Forward
-
Announcing 'Raccoon' - The Latest Proxmark3 Release!
๐ https://github.com/RfidResearchGroup/proxmark3/releases/tag/v4.17140
- vending machine nfc
-
Help with dumping Mifaire Classic 1k (Hilton) on Proxmark3
After pulling and compiling a newer proxmark3 generic firmware from the RfidResearchGroup repo I got farther but now have a new message I've not found much about with static nonces. https://github.com/RfidResearchGroup/proxmark3/
-
Unknown USB Device on Proxmark3 Easy
you could use linux (ubuntu) https://github.com/RfidResearchGroup/proxmark3/blob/master/doc/md/Installation_Instructions/Linux-Installation-Instructions.md
-
Is it possible to copy an iClass card into a MiFare 1k card?
You will have to do the leg word, but this is a starting point: https://github.com/RfidResearchGroup/proxmark3/blob/master/client/luascripts/hf_mf_sim_hid.lua
- Question about sector 0 block 0
-
On-site Encrypted Access Control System?
Grab yourself a Proxmark3, read the instructions here, and you can extract your iClass elite key in a few seconds. You can pick up a PM3 easy for a few bucks.
-
Dangerous Things guide, errors during compile
I cloned whatever the latest commit was at https://github.com/RfidResearchGroup/proxmark3, which is what the guide on dangerous things suggests (where I bought my PM).
What are some alternatives?
MifareClassicTool - An Android NFC app for reading, writing, analyzing, etc. MIFARE Classic RFID tags.
flipperzero-firmware - Flipper Zero firmware source code
PresentMon - Capture and analyze the high-level performance characteristics of graphics applications on Windows.
miLazyCracker - Mifare Classic Plus - Hardnested Attack Implementation for SCL3711 LibNFC USB reader
CsharpVoxReader - A generic C# reader for MagicaVoxel's vox file format
ChameleonMini - The ChameleonMini is a versatile contactless smartcard emulator compliant to NFC. The ChameleonMini was first developed by KAOS. This is NOT the official repo for KAOS's ChameleonMini. For further information see the Getting Started Page
etchash - The modified Dagger Hashimoto used by Ethereum Classic.
ChameleonMini - The ChameleonMini is a versatile contactless smartcard emulator compliant to NFC. The ChameleonMini was developed by https://kasper-oswald.de. The device is available at https://shop.kasper.it. For further information see the Getting Started Page https://rawgit.com/emsec/ChameleonMini/master/Doc/Doxygen/html/_page__getting_started.html or the Wiki tab above.
freeserf.net - Settlers 1 clone written in C#
ProxSpace - Proxmark III develoment environment for Windows
flipper_toolbox - Random scripts for generating Flipper data files.
libnfc - Platform independent Near Field Communication (NFC) library