Navigating Membership Cards with Proxmark3: A Step-by-Step Guide

Поделиться
HTML-код
  • Опубликовано: 24 июн 2023
  • Welcome to my new video: "Navigating Membership Cards with Proxmark3: A Step-by-Step Guide"
    In this informative video, we dive deep into the realm of membership cards for gyms. It's MIFARE Classic based cards, a common contactless technology used in fitness facilities worldwide. Using the powerful RFID device, Proxmark3, we will dissect the technology behind these cards, giving you a firsthand understanding of their operation.
    This video is made purely for educational purposes, aimed at raising awareness about the functioning and security of RFID systems, like those used in membership cards. Any attempts to duplicate, misuse, or exploit this information could lead to serious legal consequences. We encourage ethical, responsible, and lawful behavior.
    Join us as we explore this facet of contactless card technology. Understand the complexities, appreciate the convenience.
    If you find our content beneficial and want more updates on RFID technology and ethical hacking, do give us a thumbs up, share, and subscribe. Remember to hit the bell icon to get notifications about our newest videos.
    Smash that like button! Destroy that subscribe button!
    Get your Iceman Swag store.streamelements.com/icem...
    Get 5% discount on LAB401.COM by using the code ICEMAN at checkout.
    Works on all but the flipper zero category.
    Follow me on Twitter / herrmann1001
    The community discord server
    RFID Hacking by Iceman / discord
    RRG/Iceman repository for Proxmark3
    github.com/rfidresearchgroup/...
    #Proxmark3 #MifareClassic #GymCard #RFIDTechnology #EthicalHacking #TechGuide
  • ХоббиХобби

Комментарии • 29

  • @hogan029
    @hogan029 Год назад +11

    Thanks Iceman you are such a great staple of this community!

    • @iceman1001
      @iceman1001  Год назад +2

      Thank you for your kind words!

  • @Diegolopez-lt5yt
    @Diegolopez-lt5yt Месяц назад +1

    Good video , THANKS

  • @ziwarlahsh
    @ziwarlahsh Год назад +1

    Thanks Iceman, you literally opened this door for the community,
    wish you can do a second video on MIFARE Classic EV1, with more details about signatures and the additional two encryption keys 16&17, how to clone, and the possibility of emulation via Chameleon tiny/Ultra!

    • @iceman1001
      @iceman1001  Год назад +2

      Thanks for the idea!
      let me see what I can come up with

    • @ziwarlahsh
      @ziwarlahsh Год назад

      @@iceman1001 Looking forward :)

  • @JasperTielen
    @JasperTielen Год назад +2

    Very nice to see these videos of comparing cards.

  • @kamrankhattak9733
    @kamrankhattak9733 Год назад +3

    Hope so videos will keep coming. 🤞

  • @Didizz341
    @Didizz341 Месяц назад +1

    Alguém sabe qual software, e usado para conseguir, chave de acesso de cartão rfid,mifaire

    • @iceman1001
      @iceman1001  Месяц назад

      For MIFARE Classic there is many of them. It depends on your rfid device you are using to read the cards.
      Android, use MCT app
      Flipper, use flipper
      Chameleon, use chameleon app
      Proxmark, use native client
      arduino / any pcsc reader, use libnfc

  • @TsiolkovskySportingLocks
    @TsiolkovskySportingLocks Год назад +2

    this may be a very dumb question but what is the rg tool you are using?

    • @iceman1001
      @iceman1001  Год назад +2

      Good question,
      its called "ripgrep". I find it quite fast and easy to work with.

    • @TsiolkovskySportingLocks
      @TsiolkovskySportingLocks Год назад

      @@iceman1001 cheers really appreciate that

  • @elshowdepiti5521
    @elshowdepiti5521 6 месяцев назад +1

    hello! CUID magic card in nessesary to clone this one?

    • @iceman1001
      @iceman1001  6 месяцев назад

      A Gen2 / CUID might work.
      As always when making a duplicate you must verify with the system if it accepts it.

  • @Thadopeera
    @Thadopeera 10 месяцев назад

    Will this work using iCopy XS CLI? I see proxmark3 is under the hood..

    • @iceman1001
      @iceman1001  10 месяцев назад +1

      that is the problem. the icopy-x uses an proxmark3 w firmware and client from 2020. Its not maintained.

  • @sshroot5565
    @sshroot5565 11 месяцев назад +1

    Can static encrypted nonce can be cracked with proxmark3 ?

    • @iceman1001
      @iceman1001  11 месяцев назад

      That is a good question.
      The short answer is no. No key recovery is possible yet.

    • @sshroot5565
      @sshroot5565 11 месяцев назад +1

      @@iceman1001 and I was thinking to buy a proxmark3 just for that : encrypted static nonce . It is strange how this can't be cracked as I saw that the mifare card that have this encrypted static nonce , I got 4 keys from it . I know that if you find at least one key , you can do nested attacks .

  • @mohammedelamin9656
    @mohammedelamin9656 6 месяцев назад +1

    Hello How to erase mfiare ?thanks

    • @iceman1001
      @iceman1001  6 месяцев назад +1

      You will need to have access to all keys for that particular card.
      And then you will need a Reader/Writer device, either android phone, flipper, proxmark3 or other ones.
      Then you would use the methods available for the particular device you choose.

    • @mohammedelamin9656
      @mohammedelamin9656 6 месяцев назад +1

      @@iceman1001 do you know where I could get the proxdroid Android application the link is dead in the repository github thanks in advance

    • @iceman1001
      @iceman1001  2 месяца назад

      Sorry, I don't know. How about you search some more? Most likely on one of the github, gitlab sites

  • @mohammedelamin9656
    @mohammedelamin9656 6 месяцев назад +1

    hello I need help to clone a 14443-a tag with the iceman version when I run hf mf chk --1k --dump everything goes correctly the files are saved in the root folder but when restoring with hf mf restore --k --uid xxxxxxxxxx -k hf-mf-xxxxxxxxx-key.bin it is indicated error-can't find hf-mf yet the file is present thank you for your help

    • @iceman1001
      @iceman1001  6 месяцев назад

      you seem to have wrong syntax for your restore command. Take a look at it.