Research, development and trades concerning the powerful Proxmark3 device.
Remember; sharing is caring. Bring something back to the community.
"Learn the tools of the trade the hard way." +Fravia
You are not logged in.
Time changes and with it the technology
Proxmark3 @ discord
Users of this forum, please be aware that information stored on this site is not private.
Hi
I would like to know if whit proxmark you can sniff the speak between a mifare desfire and the reader.
could you decode the information to get the key as you do with mifare classic??
in my country for public tarsnport they used this desfire card, and i would like to play a little.
thanks
Offline
You are able to eavesdrop the information communicated between a reader and a DESFire card. The DESFire uses, just like the MIFARE Classic, the ISO14443-A standard for frame modulation.
I'm not aware of a similar bug in DESFire cards. If there is more information available, let me know.
Offline
DESFire adopt DES algorithm, can use (1) FPGA-based brute-force attack or (2)Side-Channel attack (SPA/DPA is the usual choice) to get the DES-key!
Offline
not quite, if wikipedia is to be believed.
DESFIRE usesss triple des. And although it's never a really good idea to take a poor crypto algorithm a few times... Triple DES is not as broken as you suggest. Although given NXP willingness to fubar up crypto chances are there are some weaknesses that can be exploited.
Besides the triple DES "desfire" cards there are also 'desfire' cards that use aes.
There are however things you can still do without being able to understand what the reader and tags are saying. For example a relay attack.
Last edited by joker (2009-04-03 07:58:09)
Offline
thanks.
if a buy proxmark i will try
Offline