Research, development and trades concerning the powerful Proxmark3 device.
Remember; sharing is caring. Bring something back to the community.
"Learn the tools of the trade the hard way." +Fravia
You are not logged in.
Time changes and with it the technology
Proxmark3 @ discord
Users of this forum, please be aware that information stored on this site is not private.
I have a Chameleon Mini Rev.G RDV2.0 and PM3 RDV4.01
I bought the Chaemelon as people say it is easier to use in the field. After having tried it I cannot agree to that.
I actually found it to be of no use in the field, but I hope I overlooked some docuemntation or video and please point me in the right direction.
What I found that the Chameleon device with the Chamaeleon app can do:
-copy emulate mifare classic / ultralight UID and some header data, no payload data! if you dump the memory you will get an empty card.
-extract a few keys from a mifare classic reader
What it cannot do:
-write to blank cards
-crack mifare classic /ultralight keys
What it could only do in a cumbersome way by using extra tools, but I have not tested it. I would consider this bad field experience and it would only be acceptable if it possible to do it on an Android phone without additional hardware (except for the Chameleon device).
-copy and emulate full mifare classic / ultralight card with UID and payload data
Is anyone using the Chameleon in the field nowadays? are there systems that would only use the mifare classic 7 ultralight UID?
What other attacks have I overlooked that are worth bringing the Chameleon to the field?
Is the PM3 able to run the reader attack to extract a few kes from a reader? I have not found the relevant commands. If it is not able to do it, why? Would I just have to keep a Chameleon around for just that attack vector?
Offline
What i think too..?
Best Regards
AtharWulf
Offline