Navigating Membership Cards with Proxmark3: A Step-by-Step Guide
HTML-код
- Опубликовано: 24 июн 2023
- Welcome to my new video: "Navigating Membership Cards with Proxmark3: A Step-by-Step Guide"
In this informative video, we dive deep into the realm of membership cards for gyms. It's MIFARE Classic based cards, a common contactless technology used in fitness facilities worldwide. Using the powerful RFID device, Proxmark3, we will dissect the technology behind these cards, giving you a firsthand understanding of their operation.
This video is made purely for educational purposes, aimed at raising awareness about the functioning and security of RFID systems, like those used in membership cards. Any attempts to duplicate, misuse, or exploit this information could lead to serious legal consequences. We encourage ethical, responsible, and lawful behavior.
Join us as we explore this facet of contactless card technology. Understand the complexities, appreciate the convenience.
If you find our content beneficial and want more updates on RFID technology and ethical hacking, do give us a thumbs up, share, and subscribe. Remember to hit the bell icon to get notifications about our newest videos.
Smash that like button! Destroy that subscribe button!
Get your Iceman Swag store.streamelements.com/icem...
Get 5% discount on LAB401.COM by using the code ICEMAN at checkout.
Works on all but the flipper zero category.
Follow me on Twitter / herrmann1001
The community discord server
RFID Hacking by Iceman / discord
RRG/Iceman repository for Proxmark3
github.com/rfidresearchgroup/...
#Proxmark3 #MifareClassic #GymCard #RFIDTechnology #EthicalHacking #TechGuide Хобби
Thanks Iceman you are such a great staple of this community!
Thank you for your kind words!
Good video , THANKS
Happy to hear it!
Thanks Iceman, you literally opened this door for the community,
wish you can do a second video on MIFARE Classic EV1, with more details about signatures and the additional two encryption keys 16&17, how to clone, and the possibility of emulation via Chameleon tiny/Ultra!
Thanks for the idea!
let me see what I can come up with
@@iceman1001 Looking forward :)
Very nice to see these videos of comparing cards.
Glad you like them!
Hope so videos will keep coming. 🤞
That's the plan!
Alguém sabe qual software, e usado para conseguir, chave de acesso de cartão rfid,mifaire
For MIFARE Classic there is many of them. It depends on your rfid device you are using to read the cards.
Android, use MCT app
Flipper, use flipper
Chameleon, use chameleon app
Proxmark, use native client
arduino / any pcsc reader, use libnfc
this may be a very dumb question but what is the rg tool you are using?
Good question,
its called "ripgrep". I find it quite fast and easy to work with.
@@iceman1001 cheers really appreciate that
hello! CUID magic card in nessesary to clone this one?
A Gen2 / CUID might work.
As always when making a duplicate you must verify with the system if it accepts it.
Will this work using iCopy XS CLI? I see proxmark3 is under the hood..
that is the problem. the icopy-x uses an proxmark3 w firmware and client from 2020. Its not maintained.
Can static encrypted nonce can be cracked with proxmark3 ?
That is a good question.
The short answer is no. No key recovery is possible yet.
@@iceman1001 and I was thinking to buy a proxmark3 just for that : encrypted static nonce . It is strange how this can't be cracked as I saw that the mifare card that have this encrypted static nonce , I got 4 keys from it . I know that if you find at least one key , you can do nested attacks .
Hello How to erase mfiare ?thanks
You will need to have access to all keys for that particular card.
And then you will need a Reader/Writer device, either android phone, flipper, proxmark3 or other ones.
Then you would use the methods available for the particular device you choose.
@@iceman1001 do you know where I could get the proxdroid Android application the link is dead in the repository github thanks in advance
Sorry, I don't know. How about you search some more? Most likely on one of the github, gitlab sites
hello I need help to clone a 14443-a tag with the iceman version when I run hf mf chk --1k --dump everything goes correctly the files are saved in the root folder but when restoring with hf mf restore --k --uid xxxxxxxxxx -k hf-mf-xxxxxxxxx-key.bin it is indicated error-can't find hf-mf yet the file is present thank you for your help
you seem to have wrong syntax for your restore command. Take a look at it.