Proxmark3 community

Research, development and trades concerning the powerful Proxmark3 device.

Remember; sharing is caring. Bring something back to the community.


"Learn the tools of the trade the hard way." +Fravia

You are not logged in.

Announcement

Time changes and with it the technology
Proxmark3 @ discord

Users of this forum, please be aware that information stored on this site is not private.

#1 2015-07-10 23:32:49

steve
Contributor
Registered: 2014-09-15
Posts: 17

Phone automatically reads sector 1

After I developed an android app to extract the keys from the chinese sniffer/super card, I found something interesting that caused the app to always retrieve the same (wrong) key.

When a tag is approached to a phone (in this case SGS3 with CM11m12 (Android 4.4.4)), before resolving an intent, the phone tries to authenticate two times with key a0a1a2a3a4a5. This caused problems with the sniffer card, which of course captured this communication.

*edit* After some research, this seems to be an access of the MIFARE Application Directory (MAD) http://www.nxp.com/documents/application_note/AN10787.pdf

So, not really proxmark related, but does anyone know if this discovery can be disabled easily in android?

Last edited by steve (2015-07-10 23:42:08)

Offline

Board footer

Powered by FluxBB