Тёмный

Mifare Reader Attack: Sniffing, Cracking, Emulation, Open! LAB401 Academy - CHAMELEON MINI Tutorial 

Lab 401
Подписаться 12 тыс.
Просмотров 38 тыс.
50% 1

Опубликовано:

 

24 сен 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 35   
@dtardis
@dtardis 4 года назад
Great video! I look forward to the other attacks.
@RicardoSynaps
@RicardoSynaps 7 месяцев назад
You r the man 🎉
@lkosz
@lkosz 3 года назад
Can I use chameleon tiny instead mini ? If yes why I get message : “110: waiting for xmodem “ where I press crack button ?
@olym3r
@olym3r 2 года назад
If you google it you will find detailed documentation in the code. Looks like the message is intended to pop up as the xmodem connection to the device may take some time to get established
@redoumohito7129
@redoumohito7129 4 года назад
*Hi thanks for the vidéo i have a question Can we hack the reader with the chameleon without a tag?* *and How to update the chameleon* *thank you* 👍
@zinobi
@zinobi 3 года назад
Generally it is hard to attack without a target tag. In some cases (rare in my experience) it is possible to guess other keys in a building if you have access to one key.
@amezianesadi
@amezianesadi 3 года назад
Je serais prochainement serrurier, est t’il possible d’ouvrir sans avoir de badge ? Il y a un mode snif , peut-on capturer le signal sans avoir un badge
@akuuka666
@akuuka666 3 года назад
In fact, if I just read the badge with mct tools- I get a full read then upload it to the tiny , and the door opens- what is the point of all this if you have a badge???
@vapourkl5324
@vapourkl5324 2 года назад
Maybe he thinks the chameleon can open a door without the badge.
@RobCrawford23
@RobCrawford23 2 года назад
Because some systems are set up to read the credentials from encrypted blocks on the card and don't simply rely upon the UID or default keys. It's much quicker to break the encryption if you have some keys to start off with (hence grabbing the key keys sent by the reader) You can break the keys on a 1K Classic without grabbing some from the reader but I have had cards where they have taken quite some time (even with a Proxmark 3 and a chunky laptop) and it's quicker if you can sniff a couple of keys in advance.
@megalaugh
@megalaugh 2 года назад
Would this work with a MiFare Ultralight EV1?
@lkosz
@lkosz 3 года назад
I can’t get keys ? Any advice?
@svenmaesalu6917
@svenmaesalu6917 3 года назад
Does the app work currently? .. Mine does not work, and I have seen comments that it's not working on android 10 at the moment? Is that true or am I missing something (I couldn't get the mini to work on my laptop either, even with the cable)
@akuuka666
@akuuka666 3 года назад
Can anyone answer this question please because I'm really confused- what is the point of cracking any key if you have a badge that opens the door already? Am i missing some concept here, I would assume that the goal is to defeat the reader without a badge
@Kedton
@Kedton 2 года назад
Not a pentester* but as I understand it the reason is as follows. People aren’t overly concerned or protective of their badges. So if you the pentester can have less then 10 seconds of uninterrupted time with the badge you can copy it, then come back and gain access. For example I know one tester was able to get a badge with unfettered access during the day, however would have to return the badge prior to leaving. But needed to access the building at night he just used a tool like this to clone the badge and then return. Not to mention, devices exist that can read a badge from a distance, think, 5-10 feet. So if you’re able to covertly sniff out several badges. You can program each into this card depending on the access level you need. If you haven’t already go watch Deviant Ollams videos. Fascinating mix of technical knowledge, social engineering, and dude is super down to earth. Hope that helps.
@OBGuy
@OBGuy Год назад
Replication perhaps? In Russia houses use 3 (7) methods of authentication: TM: DS1990, Metakom TM200X and Cyfral DC2000; EM-marin (RFID 125kHz) and Mifare: unencrypted and encrypted: one or all encrypted keys. Copying everything except all encrypted is easy. One encrypted is likely hackable with darkside, etc. If a person comes to a workshop and asks for a copy of an all encrypted, the staff is likely to use the "SMKey" - commercial Mifare sniffer+copier. It costs $570 though with sanctions. But you have to go to the reader. I suppose you see the point now, perhaps
@eugenevillademosa7425
@eugenevillademosa7425 3 года назад
Is it possible to crack or hack mifare desfie
@aloha4708
@aloha4708 3 года назад
How would you decode and change room info on a hotel key card?
@zinobi
@zinobi 3 года назад
It might be possible, depending on the exact system used by the hotel. But it is a bit of a creepy question to ask.
@JasperTielen
@JasperTielen 2 года назад
What app do you use when doing this with a proxmark3 easy?
@godjhaka7376
@godjhaka7376 6 месяцев назад
The proxmark app lol
@AymenAymen-cd4uh
@AymenAymen-cd4uh 3 года назад
bonjour, j'ai eu du mal avec l'anglais si on copy un badge basic avec l'application mifare et le cloner sur une carte vierge c'est la même chose non ? perso j'aimerais émuler mon badge d'accès du taf avec mon tel est ce possible ? sans avoir besoin de badge merci ,
@youssefvideotube
@youssefvideotube 3 года назад
Va falloir casquer un peu, c'est pas possible de cloner une carte RFID sur un téléphone ou y'a pas le RFID (rfid≠nfc).
@godjhaka7376
@godjhaka7376 6 месяцев назад
Letnme see this socalled famous hacker crack 2 different Ultralight-C cards. Then ill be impressed
@gee766
@gee766 3 года назад
Is this doable with 7-byte UIDs? I can't see to get detection to work with UIDs of that length.
@artineogda
@artineogda 3 года назад
Me too. MF_DETECTION only 4 byte :/
@akuuka666
@akuuka666 3 года назад
Yes u can, in conjunction with mct tools
@akuuka666
@akuuka666 3 года назад
U read the tag with mct tools and dump it over to the chameleon tiny
@iWhacko
@iWhacko 2 года назад
Why read the tag with the phone, to dump it. Can't you read it with the Chameleon?
@vagonordigian8445
@vagonordigian8445 2 года назад
Hi we have a system with Myfair 1K cards that is full we have a card but can I create other cards with different UID by simply changing the UID number or will the card require other modifications. Are you saying I can use the Chameleon to read existing cards from a reader?
@godjhaka7376
@godjhaka7376 6 месяцев назад
Google is your friend
@ph2hi359
@ph2hi359 3 года назад
Can this clone rfid card for public parking.?
@godjhaka7376
@godjhaka7376 6 месяцев назад
Ya mamma sure can
Далее
БЕЛКА РОДИЛА КОТЯТ#cat
00:20
Просмотров 1,1 млн
Сняли домик блин🏠
23:19
Просмотров 651 тыс.
Top 5 Best Hacking Hardware
11:41
Просмотров 343 тыс.
A Smart Card Reader With Hacked Drivers
12:36
Просмотров 320 тыс.
Cracking Enigma in 2021 - Computerphile
21:20
Просмотров 2,5 млн
Hack RFID fast with ICopy-X during Red Team engagments
1:03:02
When you Accidentally Compromise every CPU on Earth
15:59
The Truth About SIM Card Cloning
13:04
Просмотров 1,1 млн