ahahaha you are right, is just that it takes time and there's always unexpected bugs along the way 😨 the most important thing really should be adding more card capabilities but there hasn't been much movement on that
@@MrAA-of3ij ok using chrome go to chameleon-ultra.com and connect your chameleon then HF scan and then try a dictionary attack to find the keys (the button should appear after you've scanned the card)
Thanks for covering Gen2 writing! Especially since UI doesn't yet explicitly say Gen2, I've had to back verify with a Proxmark just to make sure it was copying over the UID. I'll be curious on the next video on writing to the data blocks as well. It seems that while the F0 says it writes, even with a card with all keys and sectors read, you can spot differences in data from the original card. Thanks again for being a great resource, I got my Gen4 Ultimate and RF ring from you, and they're working great
You can try importing a custom dictionary there are many you can find on the internet. You could also try at the webapp chameleon-ultra.com If all of that doesn't work you will have to use a proxmark3 and autopwn it
If you think using an AI voice over is a good substitute for real V.O's, then you're sadly mistaken. Also, it doesnt add any anonymity when you're video taping your hands or face
Hi i am computer engineering student. I'm trying to improve myself on cyber security, but I feel inadequate. Is there any training or etc you recommend?
Could you cover writing MF1k to Gen2 with the F0? Flipper has recently added Gen2 to NFC Magic, and it's a bit unclear how to copy both the UID and the data to a Gen2 card. Thanks!
That's a really good question, the rdv4.01 is more performant as in for now in terms of capabilities the rdv4.01 can perform some attacks on a couple of specific tags that the easy can't. But for now the easy can still do almost all of the things the rdv4.01 can.
you can change the UID successfully with flipper zero, But what is more striking is that the SAK remains the same and does not change it and neither does the ATQ?
Great work! I learned a lot from this video. The proxmark3-easy seems to have its limits, e.g. with hard-nested mifare. The proxmark3 rdv4 can crack these, but is very expensive. Does anyone have experience with whether the Chameleon ultra can also crack hard-nested mifare or mifare plus? Any advice in this topic is apreciated.
The chameleon ultra should be able to crack the mifare, we will be doing a video on the chameleon ultra very soon given the fact that it can read and emulate mifare classic cards
any task that is done repetitively can be automated, it is also used in penetration testing environment, we can write a script to open powershell and run commands on the target computer.
Hello, I hope all is well by you. I saw these on your website earlier today and came across this video doing research. Is there any chance you will sell these as a fob? I’d really like to get it as one. Cheers
hello, given the functionality we don't have any as a fob, do you have a particular tag that you want to duplicate, maybe theirs a fob for the particular tag you need, thank you