Mifare Classic Plus - Hardnested Attack Implementation for LibNFC USB readers (SCL3711, ASK LoGO, etc)
![]()
Installation:
MIFARE Classic 1K MIFARE Plus (4 Byte UID or 4 Byte RID) 2K, Security level 1. SmartMX with MIFARE 1K emulation. And very soon, it results: We have all sectors encrypted with the default keys. Auth with all sectors succeeded, dumping keys to a file! The card wasn't encrypted at all! 15 rows Jul 24, 2018 Mifare Classic Offline Cracker. Contribute to nfc-tools/mfoc development.
Usage example: place a tag and enjoy
This tool is comprised of work from:
![]() ![]()
![]() Comments are closed.
|
AuthorWrite something about yourself. No need to be fancy, just an overview. Archives
December 2022
Categories |