The commands used to decrypt the Mifare Classic 1K: hf mf autopwn For rewritable UID cards visit techsecuritytools.com
Пікірлер: 8
@Savage.7352 ай бұрын
Nice love to see more 👍
@TechSecurityTools2 ай бұрын
Thank you, we are working on the iCLASS and iCODE, iCODE souldn't be a problem but the iCLASS SE is quite difficult but we will find a solution ahaha
@t.n.a.1703Ай бұрын
Great work! I learned a lot from this video. The proxmark3-easy seems to have its limits, e.g. with hard-nested mifare. The proxmark3 rdv4 can crack these, but is very expensive. Does anyone have experience with whether the Chameleon ultra can also crack hard-nested mifare or mifare plus? Any advice in this topic is apreciated.
@TechSecurityToolsАй бұрын
The chameleon ultra should be able to crack the mifare, we will be doing a video on the chameleon ultra very soon given the fact that it can read and emulate mifare classic cards
@scan4find462Күн бұрын
Wow! I need to decrypt my Mifare Classic 1K tag, to proceed with cloning do you think that using the ACR122U NFC device could work for this mission?
@TechSecurityToolsКүн бұрын
hello, yes you should be able with an ACR122U using the linux libnfc library I believe there a command for that