You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
It would be great to be able to set keys to use when dumping or cloning a card. I can see a few applications
1 - Key detection with reader. You can get the first key from the reader but you may need some data readable to convince the reader to try and read a second sector. Being able to clone more of a real card would help without a Proxmark to run a nested attack.
2 - Dictionary Attack. Try common keys against all the slots when cloning or dumping. This could be a key you already know tested against each slot or a set of keys downloaded from an app.
3 - Saved keys. Let's say you know all the keys from a card issued to you but you want to quickly clone another card from the same facility. Loading keys would enable this.
The text was updated successfully, but these errors were encountered:
If I'm understanding this correctly, Question 1 describes a mifare reader attack? There are youtube videos on how to do this with the official android app. I've never tried it though, as I have yet to encounter a standard mifare classic system that I can play with 😉
2 and 3 can be solved (better yet, are pretty much solved) with Proxmark3 Standalone Modules - I'm not sure if the chameleon is the right hardware for this. From what I read here the chameleon mini/tiny/tiny pro is pretty much newly
designed 'light' version of the proxmark3 - so there might not be enough memory and/or computing power to achieve those things.
It would be great to be able to set keys to use when dumping or cloning a card. I can see a few applications
1 - Key detection with reader. You can get the first key from the reader but you may need some data readable to convince the reader to try and read a second sector. Being able to clone more of a real card would help without a Proxmark to run a nested attack.
2 - Dictionary Attack. Try common keys against all the slots when cloning or dumping. This could be a key you already know tested against each slot or a set of keys downloaded from an app.
3 - Saved keys. Let's say you know all the keys from a card issued to you but you want to quickly clone another card from the same facility. Loading keys would enable this.
The text was updated successfully, but these errors were encountered: