Academy

Chameleon Mini RevE Rebooted: Flashing to latest firmware

Posted by Lab401 Steve on

Chameleon Mini RevE Rebooted: Flashing to latest firmware

The firmware for the Chameleon Mini Rev E Rebooted is open source. However, compiling the latest binaries is somewhat complicated, and requires access to an ARM compiler. 

There have been several improvements recently in the firmware, so Lab401 has compiled the latest commits into a downloadable firmware bundle.

Flashing the Chameleon Mini on a Windows machine (or emulated environment) is simple - read on for a step by step guide.

Read more →

Proxmark 3 & Project Walrus: Easier Pentesting

Posted by Lab401 Steve on

Proxmark 3 & Project Walrus: Easier Pentesting

Project Walrus is an an open-source Android-based tool that aims to provide a unified interface over multiple RFID devices.

Designed as a pentesting / red-teaming accessory, it also provides a centralised system for bulk-reading cards, card management, reading, writing and emulation.

Learn how to easily sniff, emulate and write LF and HF cards with Project Walrus.

Read more →

Proxmark 3 & Low Frequency: Decoding unknown tags

Posted by Lab401 Steve on

Proxmark 3 & Low Frequency: Decoding unknown tags

LAB401 ACADEMY: Proxmark 3 and Unknown Low Frequency Tags INTRODUCTION: Second in a series by renowned RFID & Proxmark expert, iceman.  This tutorial dives deeper into low frequency tags. At the end of the tutorial, you'll leverage the Proxmark 3's Data Plot windows to determine a tag's bitstream and modulation, allowing to quickly and easily decode unknown LF tags. Subjects covered:Working with Low Frequency Tags- Data Plot in Depth- Determining tag bitstreams- Determine tag modulation / demodulation Interested in getting started with these tools? We've made the Pentester Pack that contains all the tools from this tutorial - and some extra Magic Mifare cards. Buying in...

Read more →

Getting Started: Proxmark 3 & Low Frequency

Posted by Lab401 Steve on

Getting Started: Proxmark 3 & Low Frequency

First tutorial in a series by renowned RFID & Proxmark expert, iceman.
Dive into Low Frequency tags with your Proxmark 3 - learn about how to plot, export and import data scans, demodulate unknown cards, and more.

Read more →

Chameleon Mini: Mifare Cracking via the Reader Attack

Posted by Lab401 Lee on

Chameleon Mini: Mifare Cracking via the Reader Attack
Learn how to crack a MIFARE card via the Reader Attack with our Chameleon Mini, Proxmark 3 and SCL-3711. Discount code for these tools also available!

Read more →