This week's pentestip demonstrates using the ChameleonMini to perform a standalone clone of a Mifare 1K tag. The ChameleonMini, and the ChameleonTiny are high-frequency RFID emulation devices - capable of emulating multiple chipsets, including Mifare 1K / 4K tags (with 4 & 7 byte UIDs), Ultralight & NTAG.
Beyond their emulation functionality, they can also perform MF32Key sniffing and cracking, which allows them to perform standalone cloning in certain circumstances. In this video, we show you how to perform a standalone Mifare 1K clone with the Chameleon Mini.
Check back every Friday for a new video. If you've got a tip that you'd like to see featured, just send us a tweet.
How to deauthenticate some Wi-Fi-connected cameras using the flipper ESP32-S2 developers board, how to sniff for deauthentication frames and how you can protect yourself against deauthentication attacks.
The latest iCopy-X firmware updates finally unleash the device as a complete standalone solution for pentesters and security professionals by adding two new killer features: Writing previously saved / uploaded dumps, and running custom LUA scripts directly from the menu.