Proxmark Basics: Cloning MIFARE
Publicado por Lab401 Steve en
This video comes from Lab401 contributor Dominic Villeneuve of DHack Security, and is part of the Proxmark Basics series.
Episode 4 in the Proxmark Basics series introduces the MIFARE Classic® 1K : introduced in 1994, there are over 10 billion cards in circulation.
The MIFARE Classic® uses a custom cryptographic algorithm, CRYPTO-1 to protect the card's data. Over the years, there has been a cat-and-mouse game between security researchers and the card's manufacturer.
Today, there are multiple variations of the MIFARE Classic® card in circulation, some of which use updated techniques to thwart unauthorised reading.
The Proxmark 3 RDV4.01 main firmware branches integrate all known MIFARE Classic® cracking techniques, and this episode deep dives into each one.
At the end of the video, you'll be familiar with the MIFARE Classic® family of cards, and how to identify, crack and clone each type.
Compartir esta publicación
- 0 comentarios
- Etiquetas: Dominic Villeneuve, mifare crack, proxmark 3, Proxmark Basics
← Publicación más antigua Publicación más reciente →