Decrypt a Mifare Classic 1K

Поделиться
HTML-код

Комментарии • 8

  • @Savage.735
    @Savage.735 2 месяца назад +4

    Nice love to see more 👍

    • @TechSecurityTools
      @TechSecurityTools  2 месяца назад +3

      Thank you, we are working on the iCLASS and iCODE, iCODE souldn't be a problem but the iCLASS SE is quite difficult but we will find a solution ahaha

  • @t.n.a.1703
    @t.n.a.1703 Месяц назад +2

    Great work! I learned a lot from this video. The proxmark3-easy seems to have its limits, e.g. with hard-nested mifare. The proxmark3 rdv4 can crack these, but is very expensive. Does anyone have experience with whether the Chameleon ultra can also crack hard-nested mifare or mifare plus? Any advice in this topic is apreciated.

    • @TechSecurityTools
      @TechSecurityTools  Месяц назад +2

      The chameleon ultra should be able to crack the mifare, we will be doing a video on the chameleon ultra very soon given the fact that it can read and emulate mifare classic cards

  • @scan4find462
    @scan4find462 День назад +1

    Wow! I need to decrypt my Mifare Classic 1K tag, to proceed with cloning do you think that using the ACR122U NFC device could work for this mission?

    • @TechSecurityTools
      @TechSecurityTools  День назад

      hello, yes you should be able with an ACR122U using the linux libnfc library I believe there a command for that