查看NFC Research的源代码
←
NFC Research
跳转到:
导航
,
搜索
因为以下原因,你没有权限编辑本页:
您刚才请求的操作只有这个用户组中的用户才能使用:
用户
您可以查看并复制此页面的源代码:
== XS Notes == '''20190130:''' * IC-UID / IC Garfield card can work * ICID haimiaobaobao * UID blank card, sec 0 can be erased, M1 * ic uid m1 s50 can work 1. dump blank card key: <source lang=bash> comcat@jackslab:/work/nfc$ sudo mfoc -P 500 -O /tmp/blank.key Found Mifare Classic 1k tag ISO/IEC 14443A (106 kbps) target: ATQA (SENS_RES): 00 04 * UID size: single * bit frame anticollision supported UID (NFCID1): 7d 26 46 3f SAK (SEL_RES): 08 * Not compliant with ISO/IEC 14443-4 * Not compliant with ISO/IEC 18092 Fingerprinting based on MIFARE type Identification Procedure: * MIFARE Classic 1K * MIFARE Plus (4 Byte UID or 4 Byte RID) 2K, Security level 1 * SmartMX with MIFARE 1K emulation Other possible matches based on ATQA & SAK values: Try to authenticate to all sectors with default keys... Symbols: '.' no key found, '/' A key found, '\' B key found, 'x' both keys found [Key: ffffffffffff] -> [xxxxxxxxxxxxxxxx] ...... ...... </source> 2. Write back the dumped id with the dumped blank card key: <source lang=bash> comcat@jackslab:/work/nfc$ sudo nfc-mfclassic W a xiangso.card.x /tmp/blank.key f NFC reader: ACS / ACR122U PICC Interface opened Found MIFARE Classic card: ISO/IEC 14443A (106 kbps) target: ATQA (SENS_RES): 00 04 UID (NFCID1): be a0 93 3c SAK (SEL_RES): 08 Guessing size: seems to be a 1024-byte card Sent bits: 50 00 57 cd Sent bits: 40 (7 bits) Received bits: a (4 bits) Sent bits: 43 Received bits: 0a Writing 64 blocks |................................................................| Done, 64 of 64 blocks written. </source> 3. check the sector 0 of the new card: <source lang=bash> $ sudo mfoc -P 500 -O /dev/null </source> '''20191116''' <br><br> <br><br>
返回到
NFC Research
。
个人工具
登录
名字空间
页面
讨论
变换
查看
阅读
查看源代码
查看历史
操作
搜索
导航
首页
社区专页
新闻动态
最近更改
随机页面
帮助
工具箱
链入页面
相关更改
特殊页面