Programmable USB
4:19
Ай бұрын
AirDrive Forensic Keylogger
1:24
Magic Gen 4 Functions
1:58
Ай бұрын
Flipper Zero All Magic Cards
4:13
Proxmark3 Binary Dumps
4:16
2 ай бұрын
Chameleon Ultra webapp
4:20
3 ай бұрын
Proxmark3 RDV4.01
4:35
3 ай бұрын
Chameleon Ultra Mifare Classic
3:42
Chameleon Ultra Low Frequency
3:32
Program an RFID Ring
4:39
5 ай бұрын
Understanding Low Frequency
7:52
5 ай бұрын
Ultimate Magic Gen 4 Overview
1:57
Decrypt a Mifare Classic 1K
6:12
6 ай бұрын
Leonardo BADUSB
1:50
7 ай бұрын
Ultimate Magic Gen 4
1:14
7 ай бұрын
Proxmark3 Unboxing & Setup
4:51
7 ай бұрын
Пікірлер
@LcpdfrTutorials
@LcpdfrTutorials 2 күн бұрын
how to fix waiting for proxmark3 to apprear when its appreaed
@TechSecurityTools
@TechSecurityTools 2 күн бұрын
happend to us once, simply installed in older version of the firmware and it worked
@MuhammetGunalp
@MuhammetGunalp 5 күн бұрын
If I buy a T5577 tag, will I be able to use it instead of a magic card and clone my card ? Or do I need to choose only gen 2-4 cards instead of rewritable cards ?
@TechSecurityTools
@TechSecurityTools 4 күн бұрын
it depends on the frequency of the card, a T5577 card is for low frequency cards(125kHz) however gen2-4 are for high frequency cards(13.56MHz) and depending on the type you will need either a gen2 or a gen4. You can find out if you have a low or high frequency by checking the original card with a flipperzero or a proxmark
@MuhammetGunalp
@MuhammetGunalp 4 күн бұрын
@@TechSecurityTools I already have a card 13.56 mhz (classic 1k) Would a rewritable 13.56 MHz card be suitable instead of gen 2 or gen 4 or is a gen 4 card required
@TechSecurityTools
@TechSecurityTools 4 күн бұрын
@@MuhammetGunalpif you have a mifare classic 1K all you need is a mifare rewritable uid(gen 1a) that's all. The gen 2 or gen 4 isn't required
@MuhammetGunalp
@MuhammetGunalp 4 күн бұрын
@@TechSecurityTools I ordered a CUID card. It is not UID, so will it still work or I don't understand what is the difference between CUID and UID? You said it would work as UID and I already ordered CUID, I hope it works. Thanks for support
@TechSecurityTools
@TechSecurityTools 3 күн бұрын
@@MuhammetGunalp CUID should work. The difference between a CUID and UID is that there are two types of Mifare Classic 1K. The normal one that has a 4-byte UID and a second one that has a 7-byte UID. With the UID magic gen1a card you can only do the normal Mifare Classic 1K (4-byte UID) however the CUID can do both. Since you have a CUID you should be fine.
@LcpdfrTutorials
@LcpdfrTutorials 11 күн бұрын
use chatgpt to help to us out 🤣🤣🤣
@LcpdfrTutorials
@LcpdfrTutorials 11 күн бұрын
badusb ooo interesting
@TechSecurityTools
@TechSecurityTools 11 күн бұрын
so many possibilities!
@marcellomartimucci
@marcellomartimucci 12 күн бұрын
Great. Can I clone an MIFARE Classic 1K NXP on R5 Jackom smart ring?
@TechSecurityTools
@TechSecurityTools 12 күн бұрын
After looking at the specs it seems like they have 2 CUID chips, therefore technically you should be able
@LcpdfrTutorials
@LcpdfrTutorials 13 күн бұрын
what to do if the mfare classic 1k is nfc
@TechSecurityTools
@TechSecurityTools 13 күн бұрын
they are all NFC the mifare classic 1k is considered a NFC card
@LcpdfrTutorials
@LcpdfrTutorials 12 күн бұрын
@@TechSecurityTools so the that machine can decrypt it
@TechSecurityTools
@TechSecurityTools 12 күн бұрын
@@LcpdfrTutorials yes it can
@pullupordie
@pullupordie 24 күн бұрын
Keep m comming!
@YoungForeignAli
@YoungForeignAli 24 күн бұрын
Thank You Bro Learning A Lot From You Keep These Videos Coming ! 🙏🏼💯
@TechSecurityTools
@TechSecurityTools 24 күн бұрын
Thank you!
@HumbertoHacked
@HumbertoHacked Ай бұрын
I bought a Yrm500 for UHF RFID on my Flipper and still no luck. I'd love to see more UHF RFID support on the flipper
@TechSecurityTools
@TechSecurityTools Ай бұрын
true there isn't much info on UHF maybe we should do a video soon testing the UHF reader and blank stickers
@HumbertoHacked
@HumbertoHacked Ай бұрын
I programed an EM-Micro EM4100 access card onto an RFID (T5577) ring I bought on Amazon and it works too good. Also bought T5577 fobs from Aliexpress and they work great.. I even cloned my friends access card for his community
@partha4891
@partha4891 Ай бұрын
Bro is it possible to clone 'NXP MIFARE Classic MFC1C14_x'. I have found the key, it was successful. But when I copied the key to an empty new card, its still not working.
@wiltonsmith6248
@wiltonsmith6248 Ай бұрын
After gen 4 card is encoded as mf 1k, how could I change it to another type if I wanted to?
@TechSecurityTools
@TechSecurityTools Ай бұрын
you run again the command "script run hf_mf_ultimatecard.lua -t" and after the "-t" instead of 4 you write the number of the card you wish to emulate (the list and the corresponding number is in the docs in github )
@Fnantier
@Fnantier Ай бұрын
Does it have similar capabilities as the Proxmark3, or is there something one does better than the other? Thanks!
@TechSecurityTools
@TechSecurityTools Ай бұрын
The Proxmark3 does everything better aha. The chameleon is only compatible with low frequency tags and the Mifare Classic (on the high frequency). The Proxmark3 however can do almost all type of cards plus it can do many more attacks.
@Fnantier
@Fnantier Ай бұрын
@@TechSecurityTools I thought the Chameleon Ultra also does HF? Are you sure? What I'm most interested in though is the cracking capability compared :) So I can make my multitool of all the card accesses I use in my everyday in one card.
@TechSecurityTools
@TechSecurityTools Ай бұрын
@@Fnantier It does have HF but only Mifare Classic, the proxmark3 on the other hand can do pretty much every type of card
@judithsmith9422
@judithsmith9422 2 ай бұрын
can you tell me why i can read my NFC Fob, but i don't have the option to Write after is saves the info? it is a Mifare DESFire EV2 type 4
@TechSecurityTools
@TechSecurityTools 2 ай бұрын
normally in order to write you need a magic gen 4 card and with the nfc magic app after you verify your magic card you can then write to it by choosing a saved card, but after you read the mifare you will just be able to save it or emulate it, you need the magic card to see the write option
@Thadopeera
@Thadopeera Ай бұрын
@@TechSecurityToolsaha!! This threw me for a loop a few times. Thanks
@jorgethecoach
@jorgethecoach 2 ай бұрын
Hey can I do this from a Mac?
@TechSecurityTools
@TechSecurityTools 2 ай бұрын
I am not sure if you can run the Proxmark3 on a Mac, you could however just run a VM with Windows on it and it should work fine
@SergiPhone
@SergiPhone 2 ай бұрын
How do I do this with a mifare 4k? I followed the instructions exactly like you but it does not work.
@TechSecurityTools
@TechSecurityTools 2 ай бұрын
After you select write to magic tag and select the card you saved what appears when you try to write to the ring?
@dopeboys2937
@dopeboys2937 2 ай бұрын
Can you read mifare classic 1k card for car wash and change the value of money in the data?
@TechSecurityTools
@TechSecurityTools 2 ай бұрын
check out this conference talk: kzbin.info/www/bejne/Z3u3kJ-Km7Bpb7M .....it should answer your question
@Nigga6282
@Nigga6282 2 ай бұрын
You cant. The money is not stored on the card, but much rather in a database.
@TechSecurityTools
@TechSecurityTools 2 ай бұрын
@@Nigga6282 ok thank you for sharing the info
@MrAA-of3ij
@MrAA-of3ij 2 ай бұрын
do you have a video how to clone a MIFARE Classic 1K CL2 card?
@arshadkhn819
@arshadkhn819 3 ай бұрын
Can device decrypt all 16 sectors RFID card tag iso-14443-A card Please make a video 🙏
@arshadkhn819
@arshadkhn819 3 ай бұрын
Please reply
@TechSecurityTools
@TechSecurityTools 3 ай бұрын
it can do a dictionary attack therefore if the keys are in the dictionary it will find it. Otherwise we have a video showing how to run the auto pwn command with a proxmark3 which should decrypt any key.
@Solid_Lohen
@Solid_Lohen 3 ай бұрын
Can this be done with a Mifare Plus?
@TechSecurityTools
@TechSecurityTools 3 ай бұрын
yes it can, however a Gen1a isn't the card you will need, you will probably need a Gen 4 since the gen1a is only compatible with Mifare Classic, the Gen 4 however can do the job for the Mifare plus.
@vmolinosp
@vmolinosp 3 ай бұрын
Can I rewrite multiple times the gen4 card with the flipper zero? And can I set to delfaut the gen4 card again with the flipper?
@TechSecurityTools
@TechSecurityTools 3 ай бұрын
yes you can rewrite multiple times the gen4 with the flipperzero but we are not aware of how to reset it to default with a flipper, because the option isn't available
@daRock1212
@daRock1212 3 ай бұрын
If you'd like to return to a default state with the F0, you can either read and save the initial card, or create a new default card with NFC > Add Manually > Mifare Classic 1k 4/7 byte UID. Either of these can then be written to the Gen4 with NFC Magic to effectively wipe the card to a default state
@TechSecurityTools
@TechSecurityTools 3 ай бұрын
@@daRock1212 Thank you!🙏
@wiltonsmith6248
@wiltonsmith6248 Ай бұрын
@@daRock1212thank you!!!
@unboxingPERFUM
@unboxingPERFUM 3 ай бұрын
👍
@MyTube4Utoo
@MyTube4Utoo 3 ай бұрын
Cool. Thank you.
@7_of_9
@7_of_9 3 ай бұрын
What's the Ai voice? Where do get it? I like to use the ring as my key to unlock my cryptography
@TechSecurityTools
@TechSecurityTools 3 ай бұрын
elevenlabs is the website and the voice is called Josh, you can find the ring here: techsecuritytools.com/
@joecizin9357
@joecizin9357 3 ай бұрын
" for now only . . " what is the expected date, for when? this great looking device will be capable of so much more. 😊
@TechSecurityTools
@TechSecurityTools 3 ай бұрын
ahahaha you are right, is just that it takes time and there's always unexpected bugs along the way 😨 the most important thing really should be adding more card capabilities but there hasn't been much movement on that
@yanissibachir6310
@yanissibachir6310 3 ай бұрын
I was looking for a good GUI and the others are not easy to navigate, I just try yours and it very easy ! good work!
@Savage.735
@Savage.735 3 ай бұрын
Yes sir I'm here 👀💯💯👍👍
@TechSecurityTools
@TechSecurityTools 3 ай бұрын
you're the real MVP!
@vmolinosp
@vmolinosp 3 ай бұрын
One question man, the ring can be rewritten all times I want with the flipper?
@TechSecurityTools
@TechSecurityTools 3 ай бұрын
yes but can only hold one card at a time
@vmolinosp
@vmolinosp 3 ай бұрын
@@TechSecurityTools Just what I need!
@MrAA-of3ij
@MrAA-of3ij 3 ай бұрын
Okay Thanks. I will try in the morning. It’s late here in Denmark now. Thanks 🙏🏻🙏🏻🙏🏻🙏🏻🙏🏻
@TechSecurityTools
@TechSecurityTools 3 ай бұрын
Have a good night !💪
@MrAA-of3ij
@MrAA-of3ij 3 ай бұрын
Yes i have
@TechSecurityTools
@TechSecurityTools 3 ай бұрын
do you have a proxmark3?
@MrAA-of3ij
@MrAA-of3ij 3 ай бұрын
No only a flipper zero and a chameleon ultra
@TechSecurityTools
@TechSecurityTools 3 ай бұрын
@@MrAA-of3ij ok using chrome go to chameleon-ultra.com and connect your chameleon then HF scan and then try a dictionary attack to find the keys (the button should appear after you've scanned the card)
@daRock1212
@daRock1212 3 ай бұрын
Thanks for covering Gen2 writing! Especially since UI doesn't yet explicitly say Gen2, I've had to back verify with a Proxmark just to make sure it was copying over the UID. I'll be curious on the next video on writing to the data blocks as well. It seems that while the F0 says it writes, even with a card with all keys and sectors read, you can spot differences in data from the original card. Thanks again for being a great resource, I got my Gen4 Ultimate and RF ring from you, and they're working great
@TechSecurityTools
@TechSecurityTools 2 ай бұрын
Thank you for your comment! Sorry about the delay for some reason the comment didn't appear on our notifications. To add a note to the F0 I don't know if we are the only ones but we sometimes also have some difficulties emulating the mifare, maybe it's because like you said, the data might not be all the same.
@degok13
@degok13 Ай бұрын
Hey! A gen4 card can be cloned as well as the gen2 card in this video?
@TechSecurityTools
@TechSecurityTools Ай бұрын
@@degok13 yes yes it can
@MrAA-of3ij
@MrAA-of3ij 3 ай бұрын
What to do if it says: key recovery from this card doesn’t yet support? After pres: recover keys
@TechSecurityTools
@TechSecurityTools 3 ай бұрын
You can try importing a custom dictionary there are many you can find on the internet. You could also try at the webapp chameleon-ultra.com If all of that doesn't work you will have to use a proxmark3 and autopwn it
@MrAA-of3ij
@MrAA-of3ij 3 ай бұрын
Do you have a video how it’s done or a small description 🙏🏻
@TechSecurityTools
@TechSecurityTools 3 ай бұрын
@@MrAA-of3ij Do you have a Mifare Classic or another type of card?
@Index-o1234
@Index-o1234 3 ай бұрын
Brilliant just the tech we need to keep the flipper viable and evolving for pentesters.
@Wildlink123
@Wildlink123 3 ай бұрын
If you think using an AI voice over is a good substitute for real V.O's, then you're sadly mistaken. Also, it doesnt add any anonymity when you're video taping your hands or face
@TechSecurityTools
@TechSecurityTools 3 ай бұрын
the AI voice is for better clarity our English isn't the best therefore an AI voice is clearer
@thepoolteam9339
@thepoolteam9339 3 ай бұрын
Would this be able to copy a Hitag2 tag?
@TechSecurityTools
@TechSecurityTools 3 ай бұрын
It technically should since hitag operates at 125kHz but we haven't tried it yet with a hitag.
@BacuaToro
@BacuaToro 3 ай бұрын
this device can encrypt some NFC have ENCRYPTED almost 16 SECTOR. My elevator of my building NFC CARD have ENCRYPTED like this.
@Damemandanguita
@Damemandanguita 3 ай бұрын
cool, thanks for your value !
@yet3373
@yet3373 3 ай бұрын
Hi i am computer engineering student. I'm trying to improve myself on cyber security, but I feel inadequate. Is there any training or etc you recommend?
@TechSecurityTools
@TechSecurityTools 3 ай бұрын
Do the compTIA certificates. Although they are more geared towards technicians, they are really good for understanding the basics
@daRock1212
@daRock1212 3 ай бұрын
Could you cover writing MF1k to Gen2 with the F0? Flipper has recently added Gen2 to NFC Magic, and it's a bit unclear how to copy both the UID and the data to a Gen2 card. Thanks!
@TechSecurityTools
@TechSecurityTools 3 ай бұрын
ok sure we will try to make a video on it
@giovannizaccaria5030
@giovannizaccaria5030 3 ай бұрын
Hi! Can I ask you where you buy those uid writable NFC cards?
@TechSecurityTools
@TechSecurityTools 3 ай бұрын
techsecuritytools.com/
@Erks89
@Erks89 3 ай бұрын
How is it possible to hack it without having the key fob?
@TechSecurityTools
@TechSecurityTools 3 ай бұрын
A number of attacks on the reader do exist
@miguelmendoza3334
@miguelmendoza3334 3 ай бұрын
So flipper z can't decript the mf card?
@TechSecurityTools
@TechSecurityTools 3 ай бұрын
Apparently now they have developed some attacks for the mifare keys on the flipper zero but we haven't tried them
@MrAA-of3ij
@MrAA-of3ij 3 ай бұрын
Can you make a video when you try with flipper zero
@MrAA-of3ij
@MrAA-of3ij 3 ай бұрын
@@TechSecurityTools Can you make a video when you have testet it with flipper zero 🙏🏻
@TechSecurityTools
@TechSecurityTools 3 ай бұрын
@@MrAA-of3ij Yes we will take a look at it and keep you updated
@MrAA-of3ij
@MrAA-of3ij 3 ай бұрын
Thanks ❤🙏🏻
@joecizin9357
@joecizin9357 3 ай бұрын
Does the RDV4.01 do things that the 3 Easy can't ???
@TechSecurityTools
@TechSecurityTools 3 ай бұрын
That's a really good question, the rdv4.01 is more performant as in for now in terms of capabilities the rdv4.01 can perform some attacks on a couple of specific tags that the easy can't. But for now the easy can still do almost all of the things the rdv4.01 can.
@dumbmoneyape
@dumbmoneyape 3 ай бұрын
Wow I was looking at doing this on my own and I mind my business on KZbin looking for nothing then BOOM. The AI stalking is real bro.
@smaail_aiso
@smaail_aiso 4 ай бұрын
How can you emulate NFC-card, ISO 14443-4A (unknown)? How can i fix the unkown?
@TechSecurityTools
@TechSecurityTools 4 ай бұрын
the proxmark3 gives you unknown? Try the h14 info command
@scan4find462
@scan4find462 4 ай бұрын
Wow! I need to decrypt my Mifare Classic 1K tag, to proceed with cloning do you think that using the ACR122U NFC device could work for this mission?
@TechSecurityTools
@TechSecurityTools 4 ай бұрын
hello, yes you should be able with an ACR122U using the linux libnfc library I believe there a command for that
@Thadopeera
@Thadopeera 4 ай бұрын
This channel reads minds. I was looking at Magic 4k cards to buy right now
@TechSecurityTools
@TechSecurityTools 4 ай бұрын
We have psychic powers aha
@LarryTheRoleplayerTM
@LarryTheRoleplayerTM 4 ай бұрын
This video is shit.
@AlexAlfarii
@AlexAlfarii 4 ай бұрын
TRY THE MOMENTUM FIRMEARE HAS MORE OPTIONS TO MODIFY THE MAGIC CARDS
@TechSecurityTools
@TechSecurityTools 4 ай бұрын
I will give it a try, it looks really nice!
@AlexAlfarii
@AlexAlfarii 4 ай бұрын
you can change the UID successfully with flipper zero, But what is more striking is that the SAK remains the same and does not change it and neither does the ATQ?