This video comes from Lab401 contributor Dominic Villeneuve of DHack Security, and is part of the Proxmark Basics series.
Episode 4 in the Proxmark Basics series introduces the MIFARE Classic® 1K : introduced in 1994, there are over 10 billion cards in circulation.
The MIFARE Classic® uses a custom cryptographic algorithm, CRYPTO-1 to protect the card's data. Over the years, there has been a cat-and-mouse game between security researchers and the card's manufacturer.
Today, there are multiple variations of the MIFARE Classic® card in circulation, some of which use updated techniques to thwart unauthorised reading.
The Proxmark 3 RDV4.01 main firmware branches integrate all known MIFARE Classic® cracking techniques, and this episode deep dives into each one.
At the end of the video, you'll be familiar with the MIFARE Classic® family of cards, and how to identify, crack and clone each type.
Seduce sensors into spilling secrets, with the DigiLab by Lab401 and the FlipperZero. Within minutes, you can peek and poke directly into the memory of millions of modules. In this hands on tutorial, we pull temperature data directly from a LM75A temperature sensor - without anything but the DigiLab and Flipper. No Arduinos, no code, no fuss!
With Lab401's DigiLab and the FlipperZero you can interact directly with millions of modules that use I2C. What took hours now takes minutes! In this in-depth tutorial, we target a BMP280 barometric sensor: detection, identification, communication and data interpretation!
Looking to boost your Flipper Zero’s wireless detection game? Our latest deep-dive shows how the FEBERIS Pro — exclusively at LAB401 — now supports two new firmware features: PineScan and MultiSSID, purpose-built to detect spoofed networks like the WiFi Pineapple. These lightweight detection tools run directly on the ESP32 inside the FEBERIS Pro and identify suspicious access points by analyzing vendor OUIs, tagged parameters, and multi-SSID behaviors — all without needing a full WIDS setup. ✅ Works with Unleashed and Momentum firmware✅ Detects spoofed AP pools used by WiFi Pineapple MK7✅ Fully open-source, ready to flash✅ 5% off with discount code: AMEC0E
@MrDerekJamison deep-dives debugging the LightMessenger. It's a fascinating, detailed foray into the challenges of debugging hardware, lessons learned along the way and tips for open-source project maintainers.