Key Recovery for Elite Systems

Поделиться
HTML-код
  • Опубликовано: 19 окт 2023
  • Welcome back to our RFID hacking series. Today, we're delving into the intricate world of HID iClass legacy Elite, challenging the very essence of its name: "Elite." Is it truly as secure as touted?
    Join us as we explore the nuances of key recovery for both reader-only and card-only vectors using the Proxmark3. Understand the strengths, the potential vulnerabilities, and the behind-the-scenes mechanics that make this system tick.
    Whether you're a seasoned RFID hacker or just diving into the iClass legacy systems, this video promises insights that might just reshape your understanding of what "Elite" in security truly means.
    Remember to subscribe for more deep dives into RFID technology and its vulnerabilities. Comments, thoughts, or questions? Drop them below. Your engagement fuels our quest for knowledge.
    Remember this is for educational and awareness purposes only!
    🔗 Useful Links:
    github.com/rfidresearchgroup/...
    Get your Iceman Swag
    store.streamelements.com/icem...
    Get 5% discount on LAB401.COM by using the code ICEMAN at checkout.
    Works on all but the flipper zero category.
    Follow me on Twitter / herrmann1001
    The community discord server
    RFID Hacking by Iceman / discord
  • ХоббиХобби

Комментарии • 18

  • @user-or9ir7dp5v
    @user-or9ir7dp5v 7 месяцев назад +2

    But why don"t we choose hf iclass sim -t 4, the reader attack to gather the key?

    • @iceman1001
      @iceman1001  7 месяцев назад +1

      -t 4 would be for readers in key rolling mode.
      you would get two files.
      -t 2 is for readers in normal mode

  • @rlynotabot
    @rlynotabot 4 месяца назад +1

    Great video as always . What do you recommand for companies still using those ? upgrade ?

    • @iceman1001
      @iceman1001  4 месяца назад +1

      I recommend they migrate to a more modern high security system if they can. There are more decision grounds to consider at the business level.

  • @RanaKshitij
    @RanaKshitij 7 месяцев назад +3

    Can you please make a video with card having ISO 14443-B tag.

    • @iceman1001
      @iceman1001  7 месяцев назад +2

      A ISO 144443-B video? Sure, why not?

    • @RanaKshitij
      @RanaKshitij 7 месяцев назад +3

      @@iceman1001 thanks 👍

  • @jeffmorrison9905
    @jeffmorrison9905 9 месяцев назад +2

    where can I go to buy you a cup of coffee

    • @iceman1001
      @iceman1001  9 месяцев назад

      I have a Patreon.
      patreon.com/iceman1001

  • @tyukjll
    @tyukjll 9 месяцев назад +1

    But how many keys can you put in that dictionary? ALL the possible combinations would take years?

    • @iceman1001
      @iceman1001  9 месяцев назад

      That is a very good question. The command doesn't take all possible keys.
      But then you don't have to. You need a select few.

    • @tyukjll
      @tyukjll 9 месяцев назад

      @iceman1001 i have this reader running on legacy iclass. The key recovery won't work. The key is a custom elite key from the cp1000. It is definitely not in my dictionary of 1024 keys.
      I cannot think of anything else than using a bruteforce going through all the combinations.

    • @iceman1001
      @iceman1001  9 месяцев назад

      @@tyukjll 1024 keys? interesting. Where did you find that list?
      If its a elite key, you can use loclass.

    • @tyukjll
      @tyukjll 9 месяцев назад

      @@iceman1001 we probably should take this in private...

    • @iceman1001
      @iceman1001  9 месяцев назад

      @@tyukjll probably should