Location:
Search - mifare
Search list
Description: mifare s50 classic dll tool mf1
Platform: |
Size: 323584 |
Author: thewolf82
|
Hits:
Description: Arduino IDE C++ 开发环境,需要RC522通用库支持,读取MIFARE 非接触卡(Arduino IDE C++ ,RC522,MIFARE)
Platform: |
Size: 3072 |
Author: 沧海一针
|
Hits:
Description: Mifare__copy__tool__
Platform: |
Size: 996352 |
Author: LexaSkorik
|
Hits:
Description: mifare direct clone cart
Platform: |
Size: 856064 |
Author: andreyu87
|
Hits:
Description: in clone card mifare direct sdk
Platform: |
Size: 31773696 |
Author: andreyu87
|
Hits:
Description: clone nfc mifare direct disk
Platform: |
Size: 997376 |
Author: andreyu87
|
Hits:
Description: ntc mifare clones disc
Platform: |
Size: 8129536 |
Author: andreyu87
|
Hits:
Description: NXP Mifare Classic Document
Platform: |
Size: 356352 |
Author: narendc |
Hits:
Description: Documentation for NXP's Mifare DESFire Chip EV1
Platform: |
Size: 104448 |
Author: Fefes2 |
Hits:
Description: Attached file is a template for 010Editor (an hex editor) for quick visualization of data inside a mifare ultralight dump
Platform: |
Size: 992 |
Author: bugmenotpls |
Hits:
Description: Mifare Demo HID USB modem, allow to read, write, authenticate and generate Access Bits
Platform: |
Size: 552960 |
Author: vibanez |
Hits:
Description: Mifare Demo HID USB modem, allow to read, write, authenticate and generate Access Bits, Visual C++
Platform: |
Size: 323584 |
Author: vibanez |
Hits:
Description: Fixdumper for Mifare Cards on Windows
Platform: |
Size: 19456 |
Author: AlfonsSauder |
Hits:
Description: Mifare 卡破解所有资料,请大神们娱乐(All Mifare Card hacking info, please enjoy.)
Platform: |
Size: 2425856 |
Author: vetedou |
Hits:
Description: Read MIFARE Classic tags Save, edit and share the tag data you read Write to MIFARE Classic tags (block-wise) Clone MIFARE Classic tags (Write dump of a tag to another tag; write 'dump-wise') Key management based on dictionary-attack (Write the keys you know in a file (dictionary). MCT will try to authenticate with these keys against all sectors and read as much as possible. See chapter Getting Started.) Format a tag back to the factory/delivery state Write the manufacturer block of special MIFARE Classic tags Use external NFC readers like ACR 122U (See the Help & Info section for more information.) Create, edit, save and share key files (dictionaries) Decode & Encode MIFARE Classic Value Blocks Decode & Encode MIFARE Classic Access Conditions Compare dumps (Diff Tool) Display generic tag information Display the tag data as highlighted hex Display the tag data as 7-Bit US-ASCII Display the MIFARE Classic Access Conditions as a table Display MIFARE Classic Value Blocks as integer In-App (offline) help and information
Platform: |
Size: 1495916 |
Author: unpopz |
Hits:
Description: Documento con ficha tecnica de MIFARE SAM AV2
Platform: |
Size: 1385474 |
Author: hcajiao@gmail.com |
Hits:
Description: The mifare Classic is a contactless smart card that is used extensively in access control for office buildings, payment systems for public transport, and other applications. We reverse engineered the security mechanisms of this chip: the authentication protocol, the symmetric cipher, and the initialization mechanism. We describe several security vulnerabilities in these mechanisms and exploit these vulnerabilities with two attacks; both are capable of retrieving the secret key from a genuine reader. The most serious one recovers the secret key from just one or two authentication attempts with a genuine reader in less than a second on ordinary hardware and without any pre-computation. Using the same methods, an attacker can also eavesdrop the communication between a tag and a reader, and decrypt the whole trace, even if it involves multiple authentications. This enables an attacker to clone a card or to restore a real card to a previous state.
Platform: |
Size: 510586 |
Author: AlipayLogin_2088002498429280 |
Hits:
Description: The MIFARE Classic is the most widely used contactless smart card chip in the world. Its communication is based on the open ISO-14443-A standard, but the entire authentication and encryption protocols are proprietary. Several academic researchers have cracked the encryption, and even proposed attacks to recover the secret keys. However, none of their attacks have been released so far. In this project, we analyse their attack descriptions and implement three attacks on the MIFARE Classic chip. The most critical attack recovers ANY secret key requiring wireless access to just the card only in less than five minutes on inexpensive commercial off-the-shelf hardware and without any pre-computation. Using our attacks, we expose the vulnerabilities of the Imperial College's access control system and show our ability to masquerade as any valid Imperial College personnel.
Platform: |
Size: 3252486 |
Author: AlipayLogin_2088002498429280 |
Hits:
Description: MIFARE DESFire EV1 contactless multi-application IC
Rev. 3.1 — 21 December 2010
Product short data sheet
Platform: |
Size: 85144 |
Author: george123@mt2015.com |
Hits:
Description: P5DF081
MIFARE secure access module SAM AV2
Rev. 3.2 — 17 December 2013
Product short data sheet
Platform: |
Size: 227054 |
Author: george123@mt2015.com |
Hits:
«
1
2
...
6
7
8
9
10
1112
13
14
15
16
...
27
»