Great work! I learned a lot from this video. The proxmark3-easy seems to have its limits, e.g. with hard-nested mifare. The proxmark3 rdv4 can crack these, but is very expensive. Does anyone have experience with whether the Chameleon ultra can also crack hard-nested mifare or mifare plus? Any advice in this topic is apreciated.
The chameleon ultra should be able to crack the mifare, we will be doing a video on the chameleon ultra very soon given the fact that it can read and emulate mifare classic cards
Nice love to see more 👍
Thank you, we are working on the iCLASS and iCODE, iCODE souldn't be a problem but the iCLASS SE is quite difficult but we will find a solution ahaha
Great work! I learned a lot from this video. The proxmark3-easy seems to have its limits, e.g. with hard-nested mifare. The proxmark3 rdv4 can crack these, but is very expensive. Does anyone have experience with whether the Chameleon ultra can also crack hard-nested mifare or mifare plus? Any advice in this topic is apreciated.
The chameleon ultra should be able to crack the mifare, we will be doing a video on the chameleon ultra very soon given the fact that it can read and emulate mifare classic cards
Wow! I need to decrypt my Mifare Classic 1K tag, to proceed with cloning do you think that using the ACR122U NFC device could work for this mission?
hello, yes you should be able with an ACR122U using the linux libnfc library I believe there a command for that