nfc-tools / Milazycracker
Mifare Classic Plus - Hardnested Attack Implementation for SCL3711 LibNFC USB reader
Stars: ✭ 145
Programming Languages
shell
77523 projects
miLazyCracker
Mifare Classic Plus - Hardnested Attack Implementation for LibNFC USB readers (SCL3711, ASK LoGO, etc)
Installation:
./miLazyCrackerFreshInstall.sh
Usage example: place a tag and enjoy
mkdir mydumps
cd mydumps
miLazyCracker
Possible issue:
error libnfc.driver.pn53x_usb Unable to set USB configuration (Device or resource busy)
Fix:
sudo modprobe -r pn533_usb
This tool is comprised of work from:
-
Aram Verstegen (https://github.com/aczid/crypto1_bs)
-
Carlo Meijer and Roel Verdult: (http://www.cs.ru.nl/~rverdult/Ciphertext-only_Cryptanalysis_on_Hardened_Mifare_Classic_Cards-CCS_2015.pdf)
-
Iceman Proxmark Branch: https://github.com/iceman1001/proxmark
-
Piwi Proxmark Branch - https://github.com/pwpiwi/proxmark3/tree/hard_nested
-
Blapost Solver
Note that the project description data, including the texts, logos, images, and/or trademarks,
for each open source project belongs to its rightful owner.
If you wish to add or remove any projects, please contact us at [email protected].