Academy — mifare crack

Proxmark Basics: Cloning MIFARE

Posted by Lab401 Steve on

Proxmark Basics: Cloning MIFARE
Episode 4 of Proxmark 3 Basics: Learn how to identify, crack, read and clone MIFARE Classic® cards.

Read more →

#pentestips - Loading a Custom SAK with the ChameleonTiny

Posted by Lab401 Lee on

#pentestips - Loading a Custom SAK with the ChameleonTiny
In today's #pentestips we learn how to Load a Custom SAK with the ChameleonTiny.

Read more →

#Pentestips : Chameleon Mini: Standalone Mifare Cloning

Posted by Lab401 Steve on

#Pentestips : Chameleon Mini: Standalone Mifare Cloning

This week's pentestip demonstrates using the ChameleonMini to perform a standalone clone of a Mifare 1K tag. The ChameleonMini, and the ChameleonTiny are high-frequency RFID emulation devices - capable of emulating multiple chipsets, including Mifare 1K / 4K tags (with 4 & 7 byte UIDs), Ultralight & NTAG. Beyond their emulation functionality, they can also perform MF32Key sniffing and cracking, which allows them to perform standalone cloning in certain circumstances. In this video, we show you how to perform a standalone Mifare 1K clone with the Chameleon Mini. Check back every Friday for a new video. If you've got a...

Read more →

Chameleon Mini: Mifare Cracking via the Reader Attack

Posted by Lab401 Lee on

Chameleon Mini: Mifare Cracking via the Reader Attack
Learn how to crack a MIFARE card via the Reader Attack with our Chameleon Mini, Proxmark 3 and SCL-3711. Discount code for these tools also available!

Read more →