Programmable USB
4:19
4 ай бұрын
AirDrive Forensic Keylogger
1:24
4 ай бұрын
Magic Gen 4 Functions
1:58
4 ай бұрын
Flipper Zero All Magic Cards
4:13
Proxmark3 Binary Dumps
4:16
5 ай бұрын
Chameleon Ultra webapp
4:20
6 ай бұрын
Proxmark3 RDV4.01
4:35
6 ай бұрын
Chameleon Ultra Mifare Classic
3:42
Chameleon Ultra Low Frequency
3:32
Program an RFID Ring
4:39
8 ай бұрын
Understanding Low Frequency
7:52
8 ай бұрын
Ultimate Magic Gen 4 Overview
1:57
Decrypt a Mifare Classic 1K
6:12
9 ай бұрын
Leonardo BADUSB
1:50
10 ай бұрын
Ultimate Magic Gen 4
1:14
10 ай бұрын
Proxmark3 Unboxing & Setup
4:51
10 ай бұрын
Пікірлер
@Ivan-bl8fy
@Ivan-bl8fy 9 күн бұрын
Is it possible to edit the data of the card ? Like lets say it has an experation date and i want to edit it, how could i do that?
@TechSecurityTools
@TechSecurityTools 9 күн бұрын
that's a good question, I never managed to do that but there a video of some kids who did, they made a presentation on DEFCON here's the link: kzbin.info/www/bejne/Z3u3kJ-Km7Bpb7M
@todeilfungo
@todeilfungo 9 күн бұрын
is it possible to use some cheap nfc module or the phone one? also is it possible to access the memory bypassing the logic unit if i have access to it or is it a single internal component?
@TechSecurityTools
@TechSecurityTools 9 күн бұрын
you could use a phone with an app, however I think you are limited with the types of attacks you can do
@todeilfungo
@todeilfungo 9 күн бұрын
​@@TechSecurityTools so there's a difference between nfc readers that goes futher than distance/frequency range?
@TechSecurityTools
@TechSecurityTools 4 күн бұрын
@todeilfungo protocols, I mean types of cards they can support, some readers only read Mifare others read other type of cards
@FrauHaferniehl
@FrauHaferniehl 12 күн бұрын
_Nice Video, good explanation ..._
@pauldunscombe-b9o
@pauldunscombe-b9o 14 күн бұрын
more flipper stuff, plzzzzz, thanks
@beberaki
@beberaki 18 күн бұрын
do you know how can i do it with an acr122u reader?
@TechSecurityTools
@TechSecurityTools 17 күн бұрын
you need to download the driver first then I know there's some commands you can do however you will need to download the package, there was a tutorial on github if I find it I will send it to you
@pauldunscombe-b9o
@pauldunscombe-b9o 24 күн бұрын
hi, been watching many of your videos, but this id the one i been trying to work with, am new to proxmark 3, but seem to be getting used to it , when doing the autopwn command , mine only goes through one check to get dump etc, and it dont seem to program card fully when dumping file, i noticed on your when you do autopwn command yours automatically includes a hard nested attack, any idea why mine does`nt, as i said am pretty new and going through many videoa to try learn more, and not great at entering command etc, thanks
@TechSecurityTools
@TechSecurityTools 23 күн бұрын
could you do a high frequency mifare check keys command (hf mf chk) and it will give a list like in the beginning of the video. Then check if all the sector (Sec first row) have FFFFFFFFFFF or have a red line. It will be useful to know if you have multiple sectors encrypted or only one. In the video we only had one sector encrypted.
@pauldunscombe-b9o
@pauldunscombe-b9o 23 күн бұрын
@@TechSecurityTools hi, thx for reply, yes i can do a hf mf chk and i get sector 1 key A missing, then i do hf mf autopwn and seems to fill in the nessecary, so all green, and saves dump, but when i write the dump to card and i read it it still has red where the key was missing, i`ve done tons of research, and and your videos are very good, i also tried watching icemans but they are awful, lo but i will keep learning, appreciate the reply , many thanks
@TechSecurityTools
@TechSecurityTools 23 күн бұрын
@@pauldunscombe-b9oare you reading the same card again? because once you autopwn you have to write the data on the binary file into a new magic card(magic card gen 1a) the original card will always have that sector encrypted but once you write it to a new magic card the magic card will be an exact duplicate as the original one and "should" have all the sectors visible if not make sure you have a valid magic card and that you are copying the .bin file an not the .json
@pauldunscombe-b9o
@pauldunscombe-b9o 23 күн бұрын
@@TechSecurityTools hi, no i switch cards and seems to write, but upon checking it still has sector 1 key A missing, i do the cload command and copy dump file etc, same as your video, ive watched it loads of times to follow it and the writing to nfc ring video, but still cant get it to open my door in condo,ha,ha
@TechSecurityTools
@TechSecurityTools 23 күн бұрын
@@pauldunscombe-b9o shitt okay mmm interesting I will research I little bit that error and get back to you if I find anything, there might be another layer of security in your card
@WesamAshames
@WesamAshames Ай бұрын
thaks alot, can you confirm if its applicable with chameleon ultra, please?
@TechSecurityTools
@TechSecurityTools Ай бұрын
haven't tried it with the chameleon but since it's low frequency it should work with the chameleon
@FrauHaferniehl
@FrauHaferniehl Ай бұрын
Nice Vid, Thanks !!!
@carman-hu4zt
@carman-hu4zt Ай бұрын
can i crack a mifare classic 1k card with the flipper only? or with an ACR122u?
@TechSecurityTools
@TechSecurityTools Ай бұрын
ACR122u you should be good! flipperzero is limited in capabilities it doesn't have many useful attacks
@gregoryagricole5289
@gregoryagricole5289 Ай бұрын
Le lien ne fonctionne plus afin de télécharger l'executable Windows
@beststorytime4325
@beststorytime4325 Ай бұрын
the ai voice is so intense lol like chill bra
@TechSecurityTools
@TechSecurityTools Ай бұрын
ahaha yeah should have used a more calm voice
@NourWork-lf9bg
@NourWork-lf9bg Ай бұрын
what is name of the reader that he used with laptop
@TechSecurityTools
@TechSecurityTools Ай бұрын
Proxamrk3 Easy
@arremt
@arremt Ай бұрын
If the Mifare classic 1k is encrypted on all 16 sectors, will it work with the proxymark3 Easy? I'm looking into duplicating my dorm rooms keyfob because the ones they sell are 50 bucks each. But not sure if I should make the commitment and get the proximark 3 easy - dont even know if it will work.
@TechSecurityTools
@TechSecurityTools Ай бұрын
how do you know that all 16 sectors are encrypted? normally only one or two sectors but all 16 seems weird.
@edenshalom2138
@edenshalom2138 Ай бұрын
@@TechSecurityTools same with mine did you find a solution ?
@TechSecurityTools
@TechSecurityTools Ай бұрын
@@edenshalom2138 nope
@mufin0076
@mufin0076 Ай бұрын
Do you know how to decrypt seito?
@TechSecurityTools
@TechSecurityTools Ай бұрын
No I don't
@luisvillasenor617
@luisvillasenor617 Ай бұрын
So the recovered keys were from a Mifare classic EV1 4:11 ??? I thought those werent vulnerable to those attacks
@TechSecurityTools
@TechSecurityTools Ай бұрын
They are, If I am not mistaken, the desfire EV3 are the ones that aren't
@bee2y
@bee2y Ай бұрын
want to copy Only the encryption of hotel key card to Another card, not UID will proxmark3 help doing that
@TechSecurityTools
@TechSecurityTools Ай бұрын
you should be able to do it with the Proxmark3 yes
@ernestonesci420
@ernestonesci420 2 ай бұрын
do you have the link to buy on proxmark3 v5? Where can I find the proxmark3 file folder?
@TechSecurityTools
@TechSecurityTools 2 ай бұрын
to buy the proxmark3: techsecuritytools.com/product/proxmark3-rdv4-01/ the files you can find in this page: proxmarkbuilds.org/
@LcpdfrTutorials
@LcpdfrTutorials 2 ай бұрын
hello i have a question where to buy a changeable mifare classic 1k tag thats is changeable
@TechSecurityTools
@TechSecurityTools 2 ай бұрын
techsecuritytools.com/product/magic-tag-gen-1a-uid/ You can buy them from that link if not you can also look up "Mifare gen 1a" thats their name, they allow for duplicating Mifare Clisic 1K cards
@Blackcatproductionz13
@Blackcatproductionz13 2 ай бұрын
Dope🐤
@TechSecurityTools
@TechSecurityTools 2 ай бұрын
Thnak you!!
@Blackcatproductionz13
@Blackcatproductionz13 2 ай бұрын
New sub!!!
@LcpdfrTutorials
@LcpdfrTutorials 3 ай бұрын
hey can you make a video how to know if its rewritable uid card or not have a good day
@LcpdfrTutorials
@LcpdfrTutorials 3 ай бұрын
how to fix waiting for proxmark3 to apprear when its appreaed
@TechSecurityTools
@TechSecurityTools 3 ай бұрын
happend to us once, simply installed in older version of the firmware and it worked
@MuhammetGunalp
@MuhammetGunalp 3 ай бұрын
If I buy a T5577 tag, will I be able to use it instead of a magic card and clone my card ? Or do I need to choose only gen 2-4 cards instead of rewritable cards ?
@TechSecurityTools
@TechSecurityTools 3 ай бұрын
it depends on the frequency of the card, a T5577 card is for low frequency cards(125kHz) however gen2-4 are for high frequency cards(13.56MHz) and depending on the type you will need either a gen2 or a gen4. You can find out if you have a low or high frequency by checking the original card with a flipperzero or a proxmark
@MuhammetGunalp
@MuhammetGunalp 3 ай бұрын
@@TechSecurityTools I already have a card 13.56 mhz (classic 1k) Would a rewritable 13.56 MHz card be suitable instead of gen 2 or gen 4 or is a gen 4 card required
@TechSecurityTools
@TechSecurityTools 3 ай бұрын
@@MuhammetGunalpif you have a mifare classic 1K all you need is a mifare rewritable uid(gen 1a) that's all. The gen 2 or gen 4 isn't required
@MuhammetGunalp
@MuhammetGunalp 3 ай бұрын
@@TechSecurityTools I ordered a CUID card. It is not UID, so will it still work or I don't understand what is the difference between CUID and UID? You said it would work as UID and I already ordered CUID, I hope it works. Thanks for support
@TechSecurityTools
@TechSecurityTools 3 ай бұрын
@@MuhammetGunalp CUID should work. The difference between a CUID and UID is that there are two types of Mifare Classic 1K. The normal one that has a 4-byte UID and a second one that has a 7-byte UID. With the UID magic gen1a card you can only do the normal Mifare Classic 1K (4-byte UID) however the CUID can do both. Since you have a CUID you should be fine.
@LcpdfrTutorials
@LcpdfrTutorials 3 ай бұрын
use chatgpt to help to us out 🤣🤣🤣
@LcpdfrTutorials
@LcpdfrTutorials 3 ай бұрын
badusb ooo interesting
@TechSecurityTools
@TechSecurityTools 3 ай бұрын
so many possibilities!
@marcellomartimucci
@marcellomartimucci 3 ай бұрын
Great. Can I clone an MIFARE Classic 1K NXP on R5 Jackom smart ring?
@TechSecurityTools
@TechSecurityTools 3 ай бұрын
After looking at the specs it seems like they have 2 CUID chips, therefore technically you should be able
@LcpdfrTutorials
@LcpdfrTutorials 3 ай бұрын
what to do if the mfare classic 1k is nfc
@TechSecurityTools
@TechSecurityTools 3 ай бұрын
they are all NFC the mifare classic 1k is considered a NFC card
@LcpdfrTutorials
@LcpdfrTutorials 3 ай бұрын
@@TechSecurityTools so the that machine can decrypt it
@TechSecurityTools
@TechSecurityTools 3 ай бұрын
@@LcpdfrTutorials yes it can
@pullupordie
@pullupordie 3 ай бұрын
Keep m comming!
@YoungForeignAli
@YoungForeignAli 3 ай бұрын
Thank You Bro Learning A Lot From You Keep These Videos Coming ! 🙏🏼💯
@TechSecurityTools
@TechSecurityTools 3 ай бұрын
Thank you!
@HumbertoHacked
@HumbertoHacked 4 ай бұрын
I bought a Yrm500 for UHF RFID on my Flipper and still no luck. I'd love to see more UHF RFID support on the flipper
@TechSecurityTools
@TechSecurityTools 4 ай бұрын
true there isn't much info on UHF maybe we should do a video soon testing the UHF reader and blank stickers
@HumbertoHacked
@HumbertoHacked 4 ай бұрын
I programed an EM-Micro EM4100 access card onto an RFID (T5577) ring I bought on Amazon and it works too good. Also bought T5577 fobs from Aliexpress and they work great.. I even cloned my friends access card for his community
@partha4891
@partha4891 4 ай бұрын
Bro is it possible to clone 'NXP MIFARE Classic MFC1C14_x'. I have found the key, it was successful. But when I copied the key to an empty new card, its still not working.
@wiltonsmith6248
@wiltonsmith6248 4 ай бұрын
After gen 4 card is encoded as mf 1k, how could I change it to another type if I wanted to?
@TechSecurityTools
@TechSecurityTools 4 ай бұрын
you run again the command "script run hf_mf_ultimatecard.lua -t" and after the "-t" instead of 4 you write the number of the card you wish to emulate (the list and the corresponding number is in the docs in github )
@Fnantier
@Fnantier 4 ай бұрын
Does it have similar capabilities as the Proxmark3, or is there something one does better than the other? Thanks!
@TechSecurityTools
@TechSecurityTools 4 ай бұрын
The Proxmark3 does everything better aha. The chameleon is only compatible with low frequency tags and the Mifare Classic (on the high frequency). The Proxmark3 however can do almost all type of cards plus it can do many more attacks.
@Fnantier
@Fnantier 4 ай бұрын
@@TechSecurityTools I thought the Chameleon Ultra also does HF? Are you sure? What I'm most interested in though is the cracking capability compared :) So I can make my multitool of all the card accesses I use in my everyday in one card.
@TechSecurityTools
@TechSecurityTools 4 ай бұрын
@@Fnantier It does have HF but only Mifare Classic, the proxmark3 on the other hand can do pretty much every type of card
@judithsmith9422
@judithsmith9422 5 ай бұрын
can you tell me why i can read my NFC Fob, but i don't have the option to Write after is saves the info? it is a Mifare DESFire EV2 type 4
@TechSecurityTools
@TechSecurityTools 5 ай бұрын
normally in order to write you need a magic gen 4 card and with the nfc magic app after you verify your magic card you can then write to it by choosing a saved card, but after you read the mifare you will just be able to save it or emulate it, you need the magic card to see the write option
@Thadopeera
@Thadopeera 4 ай бұрын
@@TechSecurityToolsaha!! This threw me for a loop a few times. Thanks
@jorgethecoach
@jorgethecoach 5 ай бұрын
Hey can I do this from a Mac?
@TechSecurityTools
@TechSecurityTools 5 ай бұрын
I am not sure if you can run the Proxmark3 on a Mac, you could however just run a VM with Windows on it and it should work fine
@SergiPhone
@SergiPhone 5 ай бұрын
How do I do this with a mifare 4k? I followed the instructions exactly like you but it does not work.
@TechSecurityTools
@TechSecurityTools 5 ай бұрын
After you select write to magic tag and select the card you saved what appears when you try to write to the ring?
@dopeboys2937
@dopeboys2937 5 ай бұрын
Can you read mifare classic 1k card for car wash and change the value of money in the data?
@TechSecurityTools
@TechSecurityTools 5 ай бұрын
check out this conference talk: kzbin.info/www/bejne/Z3u3kJ-Km7Bpb7M .....it should answer your question
@Nigga6282
@Nigga6282 5 ай бұрын
You cant. The money is not stored on the card, but much rather in a database.
@TechSecurityTools
@TechSecurityTools 5 ай бұрын
@@Nigga6282 ok thank you for sharing the info
@MrAA-of3ij
@MrAA-of3ij 5 ай бұрын
do you have a video how to clone a MIFARE Classic 1K CL2 card?
@arshadkhn819
@arshadkhn819 6 ай бұрын
Can device decrypt all 16 sectors RFID card tag iso-14443-A card Please make a video 🙏
@arshadkhn819
@arshadkhn819 6 ай бұрын
Please reply
@TechSecurityTools
@TechSecurityTools 6 ай бұрын
it can do a dictionary attack therefore if the keys are in the dictionary it will find it. Otherwise we have a video showing how to run the auto pwn command with a proxmark3 which should decrypt any key.
@Solid_Lohen
@Solid_Lohen 6 ай бұрын
Can this be done with a Mifare Plus?
@TechSecurityTools
@TechSecurityTools 6 ай бұрын
yes it can, however a Gen1a isn't the card you will need, you will probably need a Gen 4 since the gen1a is only compatible with Mifare Classic, the Gen 4 however can do the job for the Mifare plus.
@vmolinosp
@vmolinosp 6 ай бұрын
Can I rewrite multiple times the gen4 card with the flipper zero? And can I set to delfaut the gen4 card again with the flipper?
@TechSecurityTools
@TechSecurityTools 6 ай бұрын
yes you can rewrite multiple times the gen4 with the flipperzero but we are not aware of how to reset it to default with a flipper, because the option isn't available
@daRock1212
@daRock1212 6 ай бұрын
If you'd like to return to a default state with the F0, you can either read and save the initial card, or create a new default card with NFC > Add Manually > Mifare Classic 1k 4/7 byte UID. Either of these can then be written to the Gen4 with NFC Magic to effectively wipe the card to a default state
@TechSecurityTools
@TechSecurityTools 6 ай бұрын
@@daRock1212 Thank you!🙏
@wiltonsmith6248
@wiltonsmith6248 4 ай бұрын
@@daRock1212thank you!!!
@unboxingPERFUM
@unboxingPERFUM 6 ай бұрын
👍
@MyTube4Utoo
@MyTube4Utoo 6 ай бұрын
Cool. Thank you.
@7_of_9
@7_of_9 6 ай бұрын
What's the Ai voice? Where do get it? I like to use the ring as my key to unlock my cryptography
@TechSecurityTools
@TechSecurityTools 6 ай бұрын
elevenlabs is the website and the voice is called Josh, you can find the ring here: techsecuritytools.com/
@joecizin9357
@joecizin9357 6 ай бұрын
" for now only . . " what is the expected date, for when? this great looking device will be capable of so much more. 😊
@TechSecurityTools
@TechSecurityTools 6 ай бұрын
ahahaha you are right, is just that it takes time and there's always unexpected bugs along the way 😨 the most important thing really should be adding more card capabilities but there hasn't been much movement on that
@yanissibachir6310
@yanissibachir6310 6 ай бұрын
I was looking for a good GUI and the others are not easy to navigate, I just try yours and it very easy ! good work!
@Savage.735
@Savage.735 6 ай бұрын
Yes sir I'm here 👀💯💯👍👍
@TechSecurityTools
@TechSecurityTools 6 ай бұрын
you're the real MVP!
@vmolinosp
@vmolinosp 6 ай бұрын
One question man, the ring can be rewritten all times I want with the flipper?
@TechSecurityTools
@TechSecurityTools 6 ай бұрын
yes but can only hold one card at a time
@vmolinosp
@vmolinosp 6 ай бұрын
@@TechSecurityTools Just what I need!
@MrAA-of3ij
@MrAA-of3ij 6 ай бұрын
Okay Thanks. I will try in the morning. It’s late here in Denmark now. Thanks 🙏🏻🙏🏻🙏🏻🙏🏻🙏🏻
@TechSecurityTools
@TechSecurityTools 6 ай бұрын
Have a good night !💪