Research, development and trades concerning the powerful Proxmark3 device.
Remember; sharing is caring. Bring something back to the community.
"Learn the tools of the trade the hard way." +Fravia
You are not logged in.
Time changes and with it the technology
Proxmark3 @ discord
Users of this forum, please be aware that information stored on this site is not private.
Hi,
I can clone a mifare card with a trace between a valid reader and a Tag. Now, I want to clone a mifare without a valid reader.
I want to use the shown opportunities at Pickpocket.pdf.
What are your experiences with the shown opportunities? Is one faster/easier
I think I'll use a standart key to get access to a sector and than I use attack "4.4" to get access to the other sectors. If I don't get access with a standart key I must use attack "4.2" or "4.3"
Is this right or even someone can give me some advice?
Mi_Crack
Offline
Has anybody managed to make SDK software changes for some commercial portable Card reader/writer?
check out libnfc.
Offline
Hey there,
I've a new, old problem..
I want to calculate the key with my own reader( the reader is not authorized ).
I can receive:
- UID
- nT ( could be fixed )
what is the fastest/easiest way to get the right key?
In this paper at section 6 is an way explanied, but I don't know how to implement.
I hope anybody could solve my problems with some code snippets and/or some explanations.
Thanks
Offline