Welcome![Sign In][Sign Up]
Location:
Search - mifare

Search list

[RFIDmsvcr100

Description: mifare s50 classic dll tool mf1
Platform: | Size: 323584 | Author: thewolf82 | Hits:

[SCMMFRC522_ReadAndWriteV1.00-170831a

Description: Arduino IDE C++ 开发环境,需要RC522通用库支持,读取MIFARE 非接触卡(Arduino IDE C++ ,RC522,MIFARE)
Platform: | Size: 3072 | Author: 沧海一针 | Hits:

[OtherMifare copy

Description: Mifare__copy__tool__
Platform: | Size: 996352 | Author: LexaSkorik | Hits:

[Othermifclass_tools

Description: mifare direct clone cart
Platform: | Size: 856064 | Author: andreyu87 | Hits:

[OtherSDK

Description: in clone card mifare direct sdk
Platform: | Size: 31773696 | Author: andreyu87 | Hits:

[CommunicationACSMIClone

Description: clone nfc mifare direct disk
Platform: | Size: 997376 | Author: andreyu87 | Hits:

[Embeded-SCM Developmfcpy

Description: ntc mifare clones disc
Platform: | Size: 8129536 | Author: andreyu87 | Hits:

[OtherMF1S50YYX_V1

Description: NXP Mifare Classic Document
Platform: | Size: 356352 | Author: narendc | Hits:

[RFIDMF3ICDX21_41_81_SDS.pdf

Description: Documentation for NXP's Mifare DESFire Chip EV1
Platform: | Size: 104448 | Author: Fefes2 | Hits:

[Other010Editor Mifare Ultralight Template

Description: Attached file is a template for 010Editor (an hex editor) for quick visualization of data inside a mifare ultralight dump
Platform: | Size: 992 | Author: bugmenotpls | Hits:

[OtherMifareHID java_sample_for_mifare_cards

Description: Mifare Demo HID USB modem, allow to read, write, authenticate and generate Access Bits
Platform: | Size: 552960 | Author: vibanez | Hits:

[OtherMifareHID C-Cpp-Sample

Description: Mifare Demo HID USB modem, allow to read, write, authenticate and generate Access Bits, Visual C++
Platform: | Size: 323584 | Author: vibanez | Hits:

[Otherfixdump

Description: Fixdumper for Mifare Cards on Windows
Platform: | Size: 19456 | Author: AlfonsSauder | Hits:

[RFIDMifareHack

Description: Mifare 卡破解所有资料,请大神们娱乐(All Mifare Card hacking info, please enjoy.)
Platform: | Size: 2425856 | Author: vetedou | Hits:

[SourceCodeMifareClassicTool

Description: Read MIFARE Classic tags Save, edit and share the tag data you read Write to MIFARE Classic tags (block-wise) Clone MIFARE Classic tags (Write dump of a tag to another tag; write 'dump-wise') Key management based on dictionary-attack (Write the keys you know in a file (dictionary). MCT will try to authenticate with these keys against all sectors and read as much as possible. See chapter Getting Started.) Format a tag back to the factory/delivery state Write the manufacturer block of special MIFARE Classic tags Use external NFC readers like ACR 122U (See the Help & Info section for more information.) Create, edit, save and share key files (dictionaries) Decode & Encode MIFARE Classic Value Blocks Decode & Encode MIFARE Classic Access Conditions Compare dumps (Diff Tool) Display generic tag information Display the tag data as highlighted hex Display the tag data as 7-Bit US-ASCII Display the MIFARE Classic Access Conditions as a table Display MIFARE Classic Value Blocks as integer In-App (offline) help and information
Platform: | Size: 1495916 | Author: unpopz | Hits:

[Technology ManagementMIFARE SAM AV2

Description: Documento con ficha tecnica de MIFARE SAM AV2
Platform: | Size: 1385474 | Author: hcajiao@gmail.com | Hits:

[Program docDismantling.Mifare

Description: The mifare Classic is a contactless smart card that is used extensively in access control for office buildings, payment systems for public transport, and other applications. We reverse engineered the security mechanisms of this chip: the authentication protocol, the symmetric cipher, and the initialization mechanism. We describe several security vulnerabilities in these mechanisms and exploit these vulnerabilities with two attacks; both are capable of retrieving the secret key from a genuine reader. The most serious one recovers the secret key from just one or two authentication attempts with a genuine reader in less than a second on ordinary hardware and without any pre-computation. Using the same methods, an attacker can also eavesdrop the communication between a tag and a reader, and decrypt the whole trace, even if it involves multiple authentications. This enables an attacker to clone a card or to restore a real card to a previous state.
Platform: | Size: 510586 | Author: AlipayLogin_2088002498429280 | Hits:

[Program docPractical Attacks on the MIFARE Classic

Description: The MIFARE Classic is the most widely used contactless smart card chip in the world. Its communication is based on the open ISO-14443-A standard, but the entire authentication and encryption protocols are proprietary. Several academic researchers have cracked the encryption, and even proposed attacks to recover the secret keys. However, none of their attacks have been released so far. In this project, we analyse their attack descriptions and implement three attacks on the MIFARE Classic chip. The most critical attack recovers ANY secret key requiring wireless access to just the card only in less than five minutes on inexpensive commercial off-the-shelf hardware and without any pre-computation. Using our attacks, we expose the vulnerabilities of the Imperial College's access control system and show our ability to masquerade as any valid Imperial College personnel.
Platform: | Size: 3252486 | Author: AlipayLogin_2088002498429280 | Hits:

[Software EngineeringMIFARE DESFire EV1 contactless multi-application IC

Description: MIFARE DESFire EV1 contactless multi-application IC Rev. 3.1 — 21 December 2010 Product short data sheet
Platform: | Size: 85144 | Author: george123@mt2015.com | Hits:

[Software EngineeringMIFARE secure access module SAM AV2

Description: P5DF081 MIFARE secure access module SAM AV2 Rev. 3.2 — 17 December 2013 Product short data sheet
Platform: | Size: 227054 | Author: george123@mt2015.com | Hits:
« 1 2 ... 6 7 8 9 10 1112 13 14 15 16 ... 27 »

CodeBus www.codebus.net