My problem is to emulate a classic 1k Mifare card with an Android phone equipped with NFC. The reader system has already been developed and is now working correctly with mifare Classic cards and can not be changed. I wanted to know if it was possible to develop an app like this. The ubiquitous MiFare Classic RFID chip - used daily by millions worldwide in access control keys, subway passes and other applications - is even easier to crack than previously thought, according to security researchers who announced the development Tuesday at EuroCrypt, an international cryptography conference in Istanbul.
APK Version History
About Radio FM 90s
This is an Android NFC-App for reading, writing, analyzing, etc. MIFARE® Classic RFID-Tags.
GENERAL INFORMATION This tool provides several features to interact with (and only with) MIFARE Classic RFID-Tags. It is designed for users who have at least basic familiarity with the MIFARE Classic technology. ┏━┫ PLEASE READ ┣━ ┃Please read the whole page and make sure you got everything right before rating. Thank you! ┃If you rate with less then 4 stars, please leave a comment why. This way I can improve this app. ┃If you like MCT please consider to buy the donate version. ┗━ FEATURES • Read MIFARE Classic tags • Save and edit the tag data you read • Write to MIFARE Classic tags (block-wise) • Clone MIFARE Classic tags (Write dump of a tag to another tag; write 'dump-wise') • Key management based on dictionary-attack (Write the keys you know in a file (dictionary). MCT will try to authenticate with these keys against all sectors and read as much as possible.) • Format a tag back to the factory/delivery state • Write the manufacturer block of special MIFARE Classic tags • Create, edit and save key files (dictionaries) • Decode & Encode MIFARE Classic Value Blocks • Decode & Encode MIFARE Classic Access Conditions • Compare dumps (Diff Tool) • Display generic tag information • Display the tag data as highlighted hex • Display the tag data as 7-Bit US-ASCII • Display the MIFARE Classic Access Conditions as a table • Display MIFARE Classic Value Blocks as integer • In-App (offline) help and information • It's open source (GPLv3) ;) IMPORTANT NOTES Some important things are: • The features this tool provides are very basic. There are no such fancy things like saving a URL to an RFID-Tag with a nice looking graphical user interface. If you want so save things on a tag, you have to input the raw hexadecimal data. • This App can NOT crack/hack any MIFARE Classic keys. If you want to read/write an RFID-Tag, you need keys for this specific tag first. For additional information please read/see Getting Started from the links section. • There will be no 'brute-force' attack capability in this application. It is way too slow due to the protocol. • The first block of the first sector of an original MIFARE Classic tag is read-only i.e. not writable. But there are special MIFARE Classic tags that support writing to the manufacturer block with a simple write command. This App is able to write to such tags and can therefore create fully correct clones. However, some special tags require a special command sequence to put them into the state where writing to the manufacturer block is possible. These tags will not work. Remember this when you are shopping for special tags! • This app will NOT work on some devices because their hardware (NFC-controller) does not support MIFARE Classic ( https://github.com/ikarus23/MifareClassicTool/issues/1 ). You can find a list of unsupported devices here: https://github.com/ikarus23/MifareClassicTool#general-information LINKS • Project Page on github: https://github.com/ikarus23/MifareClassicTool • MIFARE Classic Tool on F-Droid: https://f-droid.org/repository/browse/?fdid=de.syss.MifareClassicTool • Getting started & other help: https://github.com/ikarus23/MifareClassicTool#getting-started • Bug tracker: IF YOU ENCOUNTER A PROBLEM PLEASE REPORT IT HERE https://github.com/ikarus23/MifareClassicTool/issues • Additional stuff: http://publications.icaria.de/mct/ • Thread at the Proxmark3 Forum: http://www.proxmark.org/forum/viewtopic.php?id=1535 MIFARE® is a registered trademark of NXP Semiconductors. What's New in this version
Version 2.3.1:
• Bugfix: Do not crash if there is only one key in the key file.
Version 2.3.0:
• New Feature: Clone UID tool makes cloning the UID easy.
Thanks to Slawomir Jasek from smartlockpicking.com.
Version 2.2.6:
• Autorun on tag detection can be deactivated now. Thanks to 'aerizzo'.
• Removed PayPal links to be compliant to Google's payment policies.
![]()
• Some fixed to the all-0-keys bug.
Comments are closed.
|
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |