Akademie — chameleon mini
#Pentestips : Chameleon Mini: Standalone Mifare Cloning
Geposted von Lab401 Steve am

This week's pentestip demonstrates using the ChameleonMini to perform a standalone clone of a Mifare 1K tag. The ChameleonMini, and the ChameleonTiny are high-frequency RFID emulation devices - capable of emulating multiple chipsets, including Mifare 1K / 4K tags (with 4 & 7 byte UIDs), Ultralight & NTAG. Beyond their emulation functionality, they can also perform MF32Key sniffing and cracking, which allows them to perform standalone cloning in certain circumstances. In this video, we show you how to perform a standalone Mifare 1K clone with the Chameleon Mini. Check back every Friday for a new video. If you've got a...
- 0 Kommentare
- Tags: chameleon, chameleon mini, chameleon mini tutotrial, chameleontiny, mifare crack, Mifare reader attack, pentestips
Chameleon Mini RevE Rebooted: Flashing to latest firmware
Geposted von Lab401 Steve am

The firmware for the Chameleon Mini Rev E Rebooted is open source. However, compiling the latest binaries is somewhat complicated, and requires access to an ARM compiler.
There have been several improvements recently in the firmware, so Lab401 has compiled the latest commits into a downloadable firmware bundle.
Flashing the Chameleon Mini on a Windows machine (or emulated environment) is simple - read on for a step by step guide.
- 0 Kommentare
- Tags: chameleon mini, flashing
Proxmark 3 & Project Walrus: Easier Pentesting
Geposted von Lab401 Steve am

Project Walrus is an an open-source Android-based tool that aims to provide a unified interface over multiple RFID devices.
Designed as a pentesting / red-teaming accessory, it also provides a centralised system for bulk-reading cards, card management, reading, writing and emulation.
Learn how to easily sniff, emulate and write LF and HF cards with Project Walrus.
- 0 Kommentare
- Tags: android, chameleon mini, proxmark 3
Chameleon Mini: Mifare Cracking via the Reader Attack
Geposted von Lab401 Lee am