The SAM Saga with Proxmark3 RDV4

Поделиться
HTML-код
  • Опубликовано: 14 окт 2023
  • Embark on a captivating journey as we delve into the intricacies of implementing a Secure Access Module (SAM) with the renowned Proxmark3 RDV4. Throughout this episode, we shed light on the myriad challenges faced, from firmware nuances to the technicalities of ISO7816.
    But it's not all smooth sailing! Dive deep into the world of Physical Access Control Systems (PACS) and witness firsthand the complexities associated with preventing downgrade attacks. This journey is a testament to the tenacity and resilience required in the realm of security research.
    Whether you're a seasoned RFID hacker or just venturing into the domain, this video provides invaluable insights into the nuances of secure implementations. Join us, as we traverse the highs and lows, successes and setbacks, in our quest for robust RFID security with Proxmark3 RDV4.
    🔗 Useful Links:
    github.com/bettse/seader
    github.com/killergeek/nard
    github.com/rfidresearchgroup/...
    If you found this video insightful, please give it a thumbs up, share, and don't forget to subscribe for more tech deep-dives. Drop any questions or thoughts in the comments below, and I'll do my best to respond!
    Get your Iceman Swag store.streamelements.com/icem...
    Get 5% discount on LAB401.COM by using the code ICEMAN at checkout.
    Works on all but the flipper zero category.
    Follow me on Twitter / herrmann1001
    The community discord server
    RFID Hacking by Iceman / discord
  • ХоббиХобби

Комментарии • 19

  • @WangLees
    @WangLees 8 месяцев назад +5

    Thanks for sharing with the world mate!

  • @john.o
    @john.o 8 месяцев назад +3

    This is indeed very cool! I have a NARD+SAM on order and it would be exciting to use the SAM with the pm3. Appreciate your work and contributions! Hope that we can see this in the mainline branch before too long!

    • @iceman1001
      @iceman1001  8 месяцев назад +1

      Thanks for watching!

    • @iceman1001
      @iceman1001  8 месяцев назад +1

      its been merged now

  • @CHABBO
    @CHABBO 6 месяцев назад +1

    This is very impressive but I'm getting a error message on mine when running the 'hf iclass sam' command
    [+] SAM (Grace) detected
    [!] ⚠ SAM select failed
    (Version - v4.42 )

    • @iceman1001
      @iceman1001  6 месяцев назад

      try unplugging the pm3 and plug in again.
      try `smart info` to see if that works properly.
      and join the discord server , you find it a great place to ask questions

    • @CHABBO
      @CHABBO 6 месяцев назад +1

      Thanks for the quick reply! @@iceman1001 - Yes, I'll save troubleshooting questions for the discord. Just signed up now :)

    • @iceman1001
      @iceman1001  6 месяцев назад

      @@CHABBO Good choice!

  • @iWhacko
    @iWhacko 8 месяцев назад +2

    would this work with Mifare SAM's? And could you extract keys during the communication process?

    • @iceman1001
      @iceman1001  8 месяцев назад +1

      Great questions!
      A SAM is just a secure element for key material or other data you deem important.
      Its designed to be secure and they are. Your SAM need to have keys/application stored on them in order to be useful with a system and not to mention know how to communicate with it.
      There are no key material send over the wire.

    • @iWhacko
      @iWhacko 8 месяцев назад +1

      @@iceman1001 Ok, just to be clear. You mentioned you had to write code to communicate with both the card, and the SAM at the same time, in order for it to work. I thought that meant you had to get data from the sam to unlock the card. but I guess it communicates directly with the card? or are the commands encrypted by the sam, and then sent to the card?
      Also, is there no authentication needed to connect to the SAM? I'm tried looking it up because I looked into MiFare a lot, but I thought they were locked with a key, but can't find it. Or can you just put the correct SAM in any system to make it work with the corresponding cards?

    • @iceman1001
      @iceman1001  8 месяцев назад +1

      @@iWhacko yes, how the HID SAM operates is fun. I didn't mention the details on purpose.
      For readers that accepts a HID SAM, their firmware is programmed to operate it.
      And that is more or less what the Seader project has reversed.

  • @user-or9ir7dp5v
    @user-or9ir7dp5v 7 месяцев назад +1

    Hello, Can I just copy the bin file from the iClass legacy card to a blank iClass legacy card?

    • @iceman1001
      @iceman1001  7 месяцев назад +1

      More or less.
      `hf iclass restore`

  • @TheTatramaco
    @TheTatramaco 8 месяцев назад +1

    So if I have an EV1 SAM this code base doesn't exist in hf mfdes commands right ?

    • @iceman1001
      @iceman1001  8 месяцев назад +1

      That is correct, if you feel to contribute to the code, by all means go ahead.
      And I am not sure what a EV1 SAM is so I can not say if it will work with the flipper zero and seader app.

  • @babyface.tweezy
    @babyface.tweezy 7 месяцев назад +1

    Any way we can converse one on one? If so please lmk how and when I can

    • @iceman1001
      @iceman1001  7 месяцев назад

      You can always find me on the discord server