Fixme.ch:OldWiki/Rfid
From Fixme.ch
Contents
Liens
- Documentation généraliste
- Projets
- Présenté à HES2012: https://code.google.com/p/readnfccc/
- http://www.openpcd.org/OpenPCD_2_RFID_Reader_for_13.56MHz Hardware libre pour lire/écrire/émuler du 13.56MHz
- http://learn.adafruit.com/adafruit-pn532-rfid-nfc/ndef
- BasicCard: NFC/RFID programable http://www.basiccard.com/
- Mifare crack
- Brute force key http://code.google.com/p/mfcuk/
- Nested Attack http://code.google.com/p/mfoc/
- Devices
- PCL3711 Reader at HS, use PC/SC and the official driver: http://blog.moumout.com/?p=33
- Normes
- Distance
http://www.bishopfox.com/resources/tools/rfid-hacking/attack-tools/
PC/SC
- Needed to use NFC/RFID reader on Linux
- Installation/Configuration, http://doc.ubuntu-fr.org/smartcards#pcsc_personal_computersmart_card
sudo apt-get install pcscd libpcsclite1 apt-cache search "PC/SC driver"
- Test and use
sudo apt-get install pcsc-tools pcsc_scan
Basic Cards
- http://www.basiccard.com/
- Documentation: File:BasicCardDev.pdf
- Tutorial:
- The UID is fixed, but can be set to Random
Proxmark
- http://code.google.com/p/proxmark3/wiki/Compiling
- Using the proxmark:
sudo apt-get install build-essential libreadline5 libreadline-dev libusb-0.1-4 libusb-dev libqt4-dev perl pkg-config
#wget http://garr.dl.sourceforge.net/project/devkitpro/devkitARM/devkitARM_r39-x86_64-linux.tar.bz2 #tar xjvf devkitARM_r39-x86_64-linux.tar.bz2 #sudo mv devkitARM /opt/devkitARM #export PATH=${PATH}:/opt/devkitARM/bin/ cd /tmp wget http://sourceforge.net/p/devkitpro/perlupdaters/ci/master/tree/devkitARMupdate.pl?format=raw -o devkit.pl chmod devkit.pl ./devkit.pl export DEVKITPRO=~/devkitPro export DEVKITARM=${DEVKITPRO}/devkitARM export PATH=$DEVKITARM/bin/:${PATH}
svn co http://proxmark3.googlecode.com/svn/trunk proxmark3-read-only cd proxmark3-read-only # Editer: common/Makefile.common ligne 68 # Remplacer par: CFLAGS = -c $(INCLUDE) -Wall -pedantic -std=gnu99 $(APP_CFLAGS) make
- Branche la Proxmark
./client/proxmark3
- Use it as Mifare emulator, https://code.google.com/p/proxmark3/wiki/Mifare
Divers
- tool: mfcuk_keyrecovery_darkside
- libnfs: libnfc-1.4.2.tar.gz
vim fcuk_keyrecovery_darkside.c +198 vi src/crapto1.h +69
- pcsc_scan
Erreurs
si erreur:
WARN: cannot open template file './data/tmpls_fingerprints/mfcuk_tmpl_skgt.mfd' WARN: cannot open template file './data/tmpls_fingerprints/mfcuk_tmpl_ratb.mfd' WARN: cannot open template file './data/tmpls_fingerprints/mfcuk_tmpl_oyster.mfd'
- run dans le dossier: /home/fixme/Downloads/mfcuk-read-only/src/bin