Mifare Reader Attack: Sniffing, Cracking, Emulation, Open! LAB401 Academy - CHAMELEON MINI Tutorial

Поділитися
Вставка
  • Опубліковано 5 вер 2024

КОМЕНТАРІ • 35

  • @RicardoSynaps
    @RicardoSynaps 6 місяців тому +1

    You r the man 🎉

  • @dtardis
    @dtardis 4 роки тому

    Great video! I look forward to the other attacks.

  • @lkosz
    @lkosz 3 роки тому +4

    Can I use chameleon tiny instead mini ? If yes why I get message : “110: waiting for xmodem “ where I press crack button ?

    • @olym3r
      @olym3r 2 роки тому

      If you google it you will find detailed documentation in the code. Looks like the message is intended to pop up as the xmodem connection to the device may take some time to get established

  • @akuuka666
    @akuuka666 2 роки тому +2

    In fact, if I just read the badge with mct tools- I get a full read then upload it to the tiny , and the door opens- what is the point of all this if you have a badge???

    • @vapourkl5324
      @vapourkl5324 2 роки тому

      Maybe he thinks the chameleon can open a door without the badge.

    • @RobCrawford23
      @RobCrawford23 2 роки тому

      Because some systems are set up to read the credentials from encrypted blocks on the card and don't simply rely upon the UID or default keys.
      It's much quicker to break the encryption if you have some keys to start off with (hence grabbing the key keys sent by the reader)
      You can break the keys on a 1K Classic without grabbing some from the reader but I have had cards where they have taken quite some time (even with a Proxmark 3 and a chunky laptop) and it's quicker if you can sniff a couple of keys in advance.

  • @redoumohito7129
    @redoumohito7129 4 роки тому +4

    *Hi thanks for the vidéo i have a question Can we hack the reader with the chameleon without a tag?*
    *and How to update the chameleon*
    *thank you* 👍

    • @zinobi
      @zinobi 3 роки тому +1

      Generally it is hard to attack without a target tag. In some cases (rare in my experience) it is possible to guess other keys in a building if you have access to one key.

  • @amezianesadi
    @amezianesadi 3 роки тому +1

    Je serais prochainement serrurier, est t’il possible d’ouvrir sans avoir de badge ? Il y a un mode snif , peut-on capturer le signal sans avoir un badge

  • @megalaugh
    @megalaugh 2 роки тому

    Would this work with a MiFare Ultralight EV1?

  • @lkosz
    @lkosz 3 роки тому

    I can’t get keys ? Any advice?

  • @eugenevillademosa7425
    @eugenevillademosa7425 3 роки тому

    Is it possible to crack or hack mifare desfie

  • @akuuka666
    @akuuka666 2 роки тому +3

    Can anyone answer this question please because I'm really confused- what is the point of cracking any key if you have a badge that opens the door already? Am i missing some concept here, I would assume that the goal is to defeat the reader without a badge

    • @Kedton
      @Kedton 2 роки тому +3

      Not a pentester* but as I understand it the reason is as follows.
      People aren’t overly concerned or protective of their badges. So if you the pentester can have less then 10 seconds of uninterrupted time with the badge you can copy it, then come back and gain access.
      For example I know one tester was able to get a badge with unfettered access during the day, however would have to return the badge prior to leaving. But needed to access the building at night he just used a tool like this to clone the badge and then return.
      Not to mention, devices exist that can read a badge from a distance, think, 5-10 feet. So if you’re able to covertly sniff out several badges. You can program each into this card depending on the access level you need.
      If you haven’t already go watch Deviant Ollams videos. Fascinating mix of technical knowledge, social engineering, and dude is super down to earth.
      Hope that helps.

    • @OBGuy
      @OBGuy Рік тому

      Replication perhaps?
      In Russia houses use 3 (7) methods of authentication: TM: DS1990, Metakom TM200X and Cyfral DC2000; EM-marin (RFID 125kHz) and Mifare: unencrypted and encrypted: one or all encrypted keys.
      Copying everything except all encrypted is easy. One encrypted is likely hackable with darkside, etc.
      If a person comes to a workshop and asks for a copy of an all encrypted, the staff is likely to use the "SMKey" - commercial Mifare sniffer+copier. It costs $570 though with sanctions. But you have to go to the reader.
      I suppose you see the point now, perhaps

  • @aloha4708
    @aloha4708 3 роки тому

    How would you decode and change room info on a hotel key card?

    • @zinobi
      @zinobi 3 роки тому +7

      It might be possible, depending on the exact system used by the hotel. But it is a bit of a creepy question to ask.

  • @svenmaesalu6917
    @svenmaesalu6917 3 роки тому

    Does the app work currently? .. Mine does not work, and I have seen comments that it's not working on android 10 at the moment? Is that true or am I missing something (I couldn't get the mini to work on my laptop either, even with the cable)

  • @AymenAymen-cd4uh
    @AymenAymen-cd4uh 3 роки тому

    bonjour, j'ai eu du mal avec l'anglais
    si on copy un badge basic avec l'application mifare et le cloner sur une carte vierge c'est la même chose non ?
    perso j'aimerais émuler mon badge d'accès du taf avec mon tel est ce possible ? sans avoir besoin de badge
    merci ,

    • @youssefvideotube
      @youssefvideotube 3 роки тому

      Va falloir casquer un peu, c'est pas possible de cloner une carte RFID sur un téléphone ou y'a pas le RFID (rfid≠nfc).

  • @JasperTielen
    @JasperTielen 2 роки тому

    What app do you use when doing this with a proxmark3 easy?

  • @godjhaka7376
    @godjhaka7376 5 місяців тому

    Letnme see this socalled famous hacker crack 2 different Ultralight-C cards. Then ill be impressed

  • @gee766
    @gee766 3 роки тому +1

    Is this doable with 7-byte UIDs? I can't see to get detection to work with UIDs of that length.

    • @artineogda
      @artineogda 3 роки тому

      Me too. MF_DETECTION only 4 byte :/

    • @akuuka666
      @akuuka666 2 роки тому

      Yes u can, in conjunction with mct tools

    • @akuuka666
      @akuuka666 2 роки тому +1

      U read the tag with mct tools and dump it over to the chameleon tiny

  • @vagonordigian8445
    @vagonordigian8445 2 роки тому

    Hi we have a system with Myfair 1K cards that is full we have a card but can I create other cards with different UID by simply changing the UID number or will the card require other modifications. Are you saying I can use the Chameleon to read existing cards from a reader?

  • @iWhacko
    @iWhacko 2 роки тому

    Why read the tag with the phone, to dump it. Can't you read it with the Chameleon?

  • @ph2hi359
    @ph2hi359 3 роки тому

    Can this clone rfid card for public parking.?