Welcome![Sign In][Sign Up]
Location:
Search - MiFare one

Search list

[SCMVITTO

Description: Legic卡是比目前MIFARE更安全的智能卡。有关LEGIC门禁的资料目前比较少,本次上传的是其中一个产品的资料,对于进行门禁二次开发者来说应该有帮助-Legic MIFARE card is more secure than current smart cards. LEGIC access information about the relatively small, this is one of the uploaded product information, access to the secondary should help developers
Platform: | Size: 123904 | Author: Weiyq | Hits:

[OtherSK_288_K001_DllTest(VB6)

Description: Provide Windows32 DLL on windows environment platform, files’ names as following: 1. SK-288-K001.H 32 digit dynamic library header file 2. SK-288-K001.LIB 32 digit input dynamic library 3. SK-288-K001.DLL Windows32 DLL file ·Applicable Card Type 1. RF Card: ISO/IEC 14443 TYPE A / B, MIFARE one (S50, S70, UL) 2. Contact IC Card: SLE4428, SLE4442 24C01A, 24C02, 24C04, 24C08, 24C16, 24C32, 24C64 Contact CPU Card (T=0/T=1) SAM/SIM Card(T=0/T=1) 3. Magnetic card (Read only)
Platform: | Size: 64512 | Author: zuhri | Hits:

[Other卡匠工具包不用加密狗

Description: 目 录 版本修订记录 1 锁具修配行业专用IC卡读写器 2 IC卡读写器操作 3 软件操作 4 软件安装 4 Mifare密钥分析器操作 4 Mifare卡复制克隆工具 5 技术参考内部资料附件1: 8 Mifare One非接触式IC卡(M1)基础知识 8(Catalog Revision record 1 Special IC card reader for lock repair industry 2 IC card reader operation 3 Software operation 4 Software installation 4 Mifare key analyzer operation 4 Mifare card replication clone tool 5 Technical reference internal data annex 1: 8 Basic knowledge of Mifare One contactless IC card (M1) 8)
Platform: | Size: 1594368 | Author: 小薛2 | Hits:

[Linux-Unixmfoc-master

Description: 破解全加密的key 支持PN532 这个程序允许从Mifare Classic卡恢复认证密钥。 请注意mfoc能够恢复密钥的目标只有有一个已知的关键:默认(硬编码在mfoc)或自定义(用户使用命令行)。(This program allow to recover authentication keys from MIFARE Classic card. Please note MFOC is able to recover keys from target only if it have a known key: default one (hardcoded in MFOC) or custom one (user provided using command line).)
Platform: | Size: 50176 | Author: Zyajac | Hits:

[Program docDismantling.Mifare

Description: The mifare Classic is a contactless smart card that is used extensively in access control for office buildings, payment systems for public transport, and other applications. We reverse engineered the security mechanisms of this chip: the authentication protocol, the symmetric cipher, and the initialization mechanism. We describe several security vulnerabilities in these mechanisms and exploit these vulnerabilities with two attacks; both are capable of retrieving the secret key from a genuine reader. The most serious one recovers the secret key from just one or two authentication attempts with a genuine reader in less than a second on ordinary hardware and without any pre-computation. Using the same methods, an attacker can also eavesdrop the communication between a tag and a reader, and decrypt the whole trace, even if it involves multiple authentications. This enables an attacker to clone a card or to restore a real card to a previous state.
Platform: | Size: 510586 | Author: AlipayLogin_2088002498429280 | Hits:
« 1 2 3 4»

CodeBus www.codebus.net