Decrypt a Mifare Classic 1K

Поділитися
Вставка
  • Опубліковано 19 лют 2024
  • The commands used to decrypt the Mifare Classic 1K:
    hf mf autopwn
    For rewritable UID cards visit techsecuritytools.com

КОМЕНТАРІ • 8

  • @Savage.735
    @Savage.735 2 місяці тому +4

    Nice love to see more 👍

    • @TechSecurityTools
      @TechSecurityTools  2 місяці тому +3

      Thank you, we are working on the iCLASS and iCODE, iCODE souldn't be a problem but the iCLASS SE is quite difficult but we will find a solution ahaha

  • @scan4find462
    @scan4find462 6 днів тому +1

    Wow! I need to decrypt my Mifare Classic 1K tag, to proceed with cloning do you think that using the ACR122U NFC device could work for this mission?

    • @TechSecurityTools
      @TechSecurityTools  6 днів тому

      hello, yes you should be able with an ACR122U using the linux libnfc library I believe there a command for that

  • @t.n.a.1703
    @t.n.a.1703 Місяць тому +2

    Great work! I learned a lot from this video. The proxmark3-easy seems to have its limits, e.g. with hard-nested mifare. The proxmark3 rdv4 can crack these, but is very expensive. Does anyone have experience with whether the Chameleon ultra can also crack hard-nested mifare or mifare plus? Any advice in this topic is apreciated.

    • @TechSecurityTools
      @TechSecurityTools  Місяць тому +2

      The chameleon ultra should be able to crack the mifare, we will be doing a video on the chameleon ultra very soon given the fact that it can read and emulate mifare classic cards