![]() Preliminariesīefore you get started, you will need to install the following packages, which are used to build the programs below. I’ve not been able to make this work, but I think I have genuine NXP cards which could explain things. This is usually set by the manufacturer, but on some cheap Chinese cards it can be over-written by modifying the libnfc library. The only thing I couldn’t manage to do (yet) is write the UID (the card’s ID number) which resides in block 0 sector 0. I have been able to clone several cards across all sectors without initial knowledge of the keys. In my very limited experience with these tools, they work very well. The first, libnfc, provides a library upon which the others are built. The last two, ‘mfcuk and mfoc, are used for getting the keys which enable you to access the data. mfcuk – MiFare Classic Universal toolKit.libnfc – Public platform independent Near Field Communication (NFC) library.The version I use here is the ACR122U-A2. Most of the literature for hacking and experimenting with these cards seem to suggest 3 or 4 different readers, and of these, the ACS ACR122. Recently I have been playing with NFC and RFID. This exercise had no malicious intent and was carried out as purely a technical exercise. It should be stressed here that none of my personal cards used here were abused, mistreated, cloned or otherwise tampered with in any way.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |