proxmark3
mfkey32v2
proxmark3 | mfkey32v2 | |
---|---|---|
60 | 14 | |
3,476 | 698 | |
1.9% | - | |
9.9 | 2.0 | |
5 days ago | 8 months ago | |
C | C | |
GNU General Public License v3.0 only | GNU General Public License v3.0 only |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
proxmark3
-
Flipper Zero: Multi-Tool Device for Geeks
I would check out the Proxmark3 Github repo [0]. They have a cheatsheet [1] with the basics on how to get started. I also did a talk about RFID security last year about the basics [2]
To get started, the basics are: low freq (LF) is usually around 125khz and is rarely encrypted (HID Prox is the most common in the US). The data is often encoded in Wiegand format for access control systems (something to keep in mind when reading the raw data).
High freq (HF) (aka NFC) is ~13Mhz and is readable by most Android phones with NFC. Not all tag data can be read however. HF cards support a lot of different options including data storage (normally in a block layout with permissions to read and write depending on keys) and encryption (iCLASS and SEOS being the HID offerings and very common). Some can be cloned (like hotel cards) while others (like SEOS) require a downgrade attack to work correctly (SEOS -> normal SEOS reader -> Weigand data -> older style card like HID Prox).
[0] https://github.com/RfidResearchGroup/proxmark3
[1] https://github.com/RfidResearchGroup/proxmark3/blob/master/d...
[2] https://www.youtube.com/watch?v=zKOAywZqisc
- Proxmark3 Unleashes 'Faraday': A Leap Forward
-
Announcing 'Raccoon' - The Latest Proxmark3 Release!
đź”— https://github.com/RfidResearchGroup/proxmark3/releases/tag/v4.17140
- vending machine nfc
-
Help with dumping Mifaire Classic 1k (Hilton) on Proxmark3
After pulling and compiling a newer proxmark3 generic firmware from the RfidResearchGroup repo I got farther but now have a new message I've not found much about with static nonces. https://github.com/RfidResearchGroup/proxmark3/
-
Unknown USB Device on Proxmark3 Easy
you could use linux (ubuntu) https://github.com/RfidResearchGroup/proxmark3/blob/master/doc/md/Installation_Instructions/Linux-Installation-Instructions.md
-
Is it possible to copy an iClass card into a MiFare 1k card?
You will have to do the leg word, but this is a starting point: https://github.com/RfidResearchGroup/proxmark3/blob/master/client/luascripts/hf_mf_sim_hid.lua
- Question about sector 0 block 0
-
On-site Encrypted Access Control System?
Grab yourself a Proxmark3, read the instructions here, and you can extract your iClass elite key in a few seconds. You can pick up a PM3 easy for a few bucks.
-
Dangerous Things guide, errors during compile
I cloned whatever the latest commit was at https://github.com/RfidResearchGroup/proxmark3, which is what the guide on dangerous things suggests (where I bought my PM).
mfkey32v2
-
[Flipper Zero] Méthode de fissuration de la clé classique de Mifare
[https://github.com/equipter/mfkey32v2
- What does Manual Attack do?
- Detect Reader
-
Cloning Hotel Room Keys
you can because https://github.com/equipter/mfkey32v2 exists. and i know it exists because i put it there before i put it in unleashed and it’s why this works.
- link 14
-
(New to this!) Read the tag but then didn’t work when emulating? What am I doing wrong? Thanks!
nonces, they are used for cracking the key of a particular tag using a tool called mfkey32. If you'd like to learn more about mfkey32 I would suggest you check out the GitHub https://github.com/equipter/mfkey32v2 on the flipper side its all there for you and you just need to press a few buttons
-
Looking for mifare classic 1k keys collection/dictionaries.
a larger dictionary doesn’t guarantee success you’re just filling the file with bloat. https://github.com/equipter/mfkey32v2 can help you in retrieving the rest of the keys.
- Won’t finish reading :(
-
PSA: Mfkey32 available in the phone app!
That's not this at all. This is about NFC, not what Flipper calls RFID, and this is specific to Mifare Classic. Nothing to do with active vs passive tags. Check out https://github.com/equipter/mfkey32v2 for some details.
-
A simple shell script to automate mfkey32 cracking
if you wanted to open a PR into the https://github.com/equipter/mfkey32v2 repo id happily add this along with credits and instructions in the readme
What are some alternatives?
flipperzero-firmware - Flipper Zero firmware source code
FlipperZero - A Collection of Flipper Zero Scripts / Applications / ETC...
ChameleonMini - The ChameleonMini is a versatile contactless smartcard emulator compliant to NFC. The ChameleonMini was first developed by KAOS. This is NOT the official repo for KAOS's ChameleonMini. For further information see the Getting Started Page
flipperzero - A collection of flipper zero stuff
miLazyCracker - Mifare Classic Plus - Hardnested Attack Implementation for SCL3711 LibNFC USB reader
flipperzero-nfc-tools - Repository contains nfc tools for Flipper companions
ChameleonMini - The ChameleonMini is a versatile contactless smartcard emulator compliant to NFC. The ChameleonMini was developed by https://kasper-oswald.de. The device is available at https://shop.kasper.it. For further information see the Getting Started Page https://rawgit.com/emsec/ChameleonMini/master/Doc/Doxygen/html/_page__getting_started.html or the Wiki tab above.
ClassicConverter - Mifare Classic Binary -> NFC file converter
ProxSpace - Proxmark III develoment environment for Windows
ish - Linux shell for iOS
libnfc - Platform independent Near Field Communication (NFC) library