Skip to content
Proxmark Basics: Cloning MIFARE

Proxmark Basics: Cloning MIFARE

This video comes from Lab401 contributor Dominic Villeneuve of DHack Security, and is part of the Proxmark Basics series.

Episode 4 in the Proxmark Basics series introduces the MIFARE Classic® 1K : introduced in 1994, there are over 10 billion cards in circulation.

The MIFARE Classic® uses a custom cryptographic algorithm, CRYPTO-1 to protect the card's data. Over the years, there has been a cat-and-mouse game between security researchers and the card's manufacturer.

Today, there are multiple variations of the MIFARE Classic® card in circulation, some of which use updated techniques to thwart unauthorised reading.

The Proxmark 3 RDV4.01 main firmware branches integrate all known MIFARE Classic® cracking techniques, and this episode deep dives into each one.

At the end of the video, you'll be familiar with the MIFARE Classic® family of cards, and how to identify, crack and clone each type.

Tools Used:

Episode Resources:

Previous article Proxmark Basics: Going Standalone with the BlueShark
Next article Proxmark Basics: Updating Firmware on Windows & Linux

Leave a comment

Comments must be approved before appearing

* Required fields