Is it possible to edit the data of the card ? Like lets say it has an experation date and i want to edit it, how could i do that?
@TechSecurityTools9 күн бұрын
that's a good question, I never managed to do that but there a video of some kids who did, they made a presentation on DEFCON here's the link: kzbin.info/www/bejne/Z3u3kJ-Km7Bpb7M
@todeilfungo9 күн бұрын
is it possible to use some cheap nfc module or the phone one? also is it possible to access the memory bypassing the logic unit if i have access to it or is it a single internal component?
@TechSecurityTools9 күн бұрын
you could use a phone with an app, however I think you are limited with the types of attacks you can do
@todeilfungo9 күн бұрын
@@TechSecurityTools so there's a difference between nfc readers that goes futher than distance/frequency range?
@TechSecurityTools4 күн бұрын
@todeilfungo protocols, I mean types of cards they can support, some readers only read Mifare others read other type of cards
@FrauHaferniehl12 күн бұрын
_Nice Video, good explanation ..._
@pauldunscombe-b9o14 күн бұрын
more flipper stuff, plzzzzz, thanks
@beberaki18 күн бұрын
do you know how can i do it with an acr122u reader?
@TechSecurityTools17 күн бұрын
you need to download the driver first then I know there's some commands you can do however you will need to download the package, there was a tutorial on github if I find it I will send it to you
@pauldunscombe-b9o24 күн бұрын
hi, been watching many of your videos, but this id the one i been trying to work with, am new to proxmark 3, but seem to be getting used to it , when doing the autopwn command , mine only goes through one check to get dump etc, and it dont seem to program card fully when dumping file, i noticed on your when you do autopwn command yours automatically includes a hard nested attack, any idea why mine does`nt, as i said am pretty new and going through many videoa to try learn more, and not great at entering command etc, thanks
@TechSecurityTools23 күн бұрын
could you do a high frequency mifare check keys command (hf mf chk) and it will give a list like in the beginning of the video. Then check if all the sector (Sec first row) have FFFFFFFFFFF or have a red line. It will be useful to know if you have multiple sectors encrypted or only one. In the video we only had one sector encrypted.
@pauldunscombe-b9o23 күн бұрын
@@TechSecurityTools hi, thx for reply, yes i can do a hf mf chk and i get sector 1 key A missing, then i do hf mf autopwn and seems to fill in the nessecary, so all green, and saves dump, but when i write the dump to card and i read it it still has red where the key was missing, i`ve done tons of research, and and your videos are very good, i also tried watching icemans but they are awful, lo but i will keep learning, appreciate the reply , many thanks
@TechSecurityTools23 күн бұрын
@@pauldunscombe-b9oare you reading the same card again? because once you autopwn you have to write the data on the binary file into a new magic card(magic card gen 1a) the original card will always have that sector encrypted but once you write it to a new magic card the magic card will be an exact duplicate as the original one and "should" have all the sectors visible if not make sure you have a valid magic card and that you are copying the .bin file an not the .json
@pauldunscombe-b9o23 күн бұрын
@@TechSecurityTools hi, no i switch cards and seems to write, but upon checking it still has sector 1 key A missing, i do the cload command and copy dump file etc, same as your video, ive watched it loads of times to follow it and the writing to nfc ring video, but still cant get it to open my door in condo,ha,ha
@TechSecurityTools23 күн бұрын
@@pauldunscombe-b9o shitt okay mmm interesting I will research I little bit that error and get back to you if I find anything, there might be another layer of security in your card
@WesamAshamesАй бұрын
thaks alot, can you confirm if its applicable with chameleon ultra, please?
@TechSecurityToolsАй бұрын
haven't tried it with the chameleon but since it's low frequency it should work with the chameleon
@FrauHaferniehlАй бұрын
Nice Vid, Thanks !!!
@carman-hu4ztАй бұрын
can i crack a mifare classic 1k card with the flipper only? or with an ACR122u?
@TechSecurityToolsАй бұрын
ACR122u you should be good! flipperzero is limited in capabilities it doesn't have many useful attacks
@gregoryagricole5289Ай бұрын
Le lien ne fonctionne plus afin de télécharger l'executable Windows
@beststorytime4325Ай бұрын
the ai voice is so intense lol like chill bra
@TechSecurityToolsАй бұрын
ahaha yeah should have used a more calm voice
@NourWork-lf9bgАй бұрын
what is name of the reader that he used with laptop
@TechSecurityToolsАй бұрын
Proxamrk3 Easy
@arremtАй бұрын
If the Mifare classic 1k is encrypted on all 16 sectors, will it work with the proxymark3 Easy? I'm looking into duplicating my dorm rooms keyfob because the ones they sell are 50 bucks each. But not sure if I should make the commitment and get the proximark 3 easy - dont even know if it will work.
@TechSecurityToolsАй бұрын
how do you know that all 16 sectors are encrypted? normally only one or two sectors but all 16 seems weird.
@edenshalom2138Ай бұрын
@@TechSecurityTools same with mine did you find a solution ?
@TechSecurityToolsАй бұрын
@@edenshalom2138 nope
@mufin0076Ай бұрын
Do you know how to decrypt seito?
@TechSecurityToolsАй бұрын
No I don't
@luisvillasenor617Ай бұрын
So the recovered keys were from a Mifare classic EV1 4:11 ??? I thought those werent vulnerable to those attacks
@TechSecurityToolsАй бұрын
They are, If I am not mistaken, the desfire EV3 are the ones that aren't
@bee2yАй бұрын
want to copy Only the encryption of hotel key card to Another card, not UID will proxmark3 help doing that
@TechSecurityToolsАй бұрын
you should be able to do it with the Proxmark3 yes
@ernestonesci4202 ай бұрын
do you have the link to buy on proxmark3 v5? Where can I find the proxmark3 file folder?
@TechSecurityTools2 ай бұрын
to buy the proxmark3: techsecuritytools.com/product/proxmark3-rdv4-01/ the files you can find in this page: proxmarkbuilds.org/
@LcpdfrTutorials2 ай бұрын
hello i have a question where to buy a changeable mifare classic 1k tag thats is changeable
@TechSecurityTools2 ай бұрын
techsecuritytools.com/product/magic-tag-gen-1a-uid/ You can buy them from that link if not you can also look up "Mifare gen 1a" thats their name, they allow for duplicating Mifare Clisic 1K cards
@Blackcatproductionz132 ай бұрын
Dope🐤
@TechSecurityTools2 ай бұрын
Thnak you!!
@Blackcatproductionz132 ай бұрын
New sub!!!
@LcpdfrTutorials3 ай бұрын
hey can you make a video how to know if its rewritable uid card or not have a good day
@LcpdfrTutorials3 ай бұрын
how to fix waiting for proxmark3 to apprear when its appreaed
@TechSecurityTools3 ай бұрын
happend to us once, simply installed in older version of the firmware and it worked
@MuhammetGunalp3 ай бұрын
If I buy a T5577 tag, will I be able to use it instead of a magic card and clone my card ? Or do I need to choose only gen 2-4 cards instead of rewritable cards ?
@TechSecurityTools3 ай бұрын
it depends on the frequency of the card, a T5577 card is for low frequency cards(125kHz) however gen2-4 are for high frequency cards(13.56MHz) and depending on the type you will need either a gen2 or a gen4. You can find out if you have a low or high frequency by checking the original card with a flipperzero or a proxmark
@MuhammetGunalp3 ай бұрын
@@TechSecurityTools I already have a card 13.56 mhz (classic 1k) Would a rewritable 13.56 MHz card be suitable instead of gen 2 or gen 4 or is a gen 4 card required
@TechSecurityTools3 ай бұрын
@@MuhammetGunalpif you have a mifare classic 1K all you need is a mifare rewritable uid(gen 1a) that's all. The gen 2 or gen 4 isn't required
@MuhammetGunalp3 ай бұрын
@@TechSecurityTools I ordered a CUID card. It is not UID, so will it still work or I don't understand what is the difference between CUID and UID? You said it would work as UID and I already ordered CUID, I hope it works. Thanks for support
@TechSecurityTools3 ай бұрын
@@MuhammetGunalp CUID should work. The difference between a CUID and UID is that there are two types of Mifare Classic 1K. The normal one that has a 4-byte UID and a second one that has a 7-byte UID. With the UID magic gen1a card you can only do the normal Mifare Classic 1K (4-byte UID) however the CUID can do both. Since you have a CUID you should be fine.
@LcpdfrTutorials3 ай бұрын
use chatgpt to help to us out 🤣🤣🤣
@LcpdfrTutorials3 ай бұрын
badusb ooo interesting
@TechSecurityTools3 ай бұрын
so many possibilities!
@marcellomartimucci3 ай бұрын
Great. Can I clone an MIFARE Classic 1K NXP on R5 Jackom smart ring?
@TechSecurityTools3 ай бұрын
After looking at the specs it seems like they have 2 CUID chips, therefore technically you should be able
@LcpdfrTutorials3 ай бұрын
what to do if the mfare classic 1k is nfc
@TechSecurityTools3 ай бұрын
they are all NFC the mifare classic 1k is considered a NFC card
@LcpdfrTutorials3 ай бұрын
@@TechSecurityTools so the that machine can decrypt it
@TechSecurityTools3 ай бұрын
@@LcpdfrTutorials yes it can
@pullupordie3 ай бұрын
Keep m comming!
@YoungForeignAli3 ай бұрын
Thank You Bro Learning A Lot From You Keep These Videos Coming ! 🙏🏼💯
@TechSecurityTools3 ай бұрын
Thank you!
@HumbertoHacked4 ай бұрын
I bought a Yrm500 for UHF RFID on my Flipper and still no luck. I'd love to see more UHF RFID support on the flipper
@TechSecurityTools4 ай бұрын
true there isn't much info on UHF maybe we should do a video soon testing the UHF reader and blank stickers
@HumbertoHacked4 ай бұрын
I programed an EM-Micro EM4100 access card onto an RFID (T5577) ring I bought on Amazon and it works too good. Also bought T5577 fobs from Aliexpress and they work great.. I even cloned my friends access card for his community
@partha48914 ай бұрын
Bro is it possible to clone 'NXP MIFARE Classic MFC1C14_x'. I have found the key, it was successful. But when I copied the key to an empty new card, its still not working.
@wiltonsmith62484 ай бұрын
After gen 4 card is encoded as mf 1k, how could I change it to another type if I wanted to?
@TechSecurityTools4 ай бұрын
you run again the command "script run hf_mf_ultimatecard.lua -t" and after the "-t" instead of 4 you write the number of the card you wish to emulate (the list and the corresponding number is in the docs in github )
@Fnantier4 ай бұрын
Does it have similar capabilities as the Proxmark3, or is there something one does better than the other? Thanks!
@TechSecurityTools4 ай бұрын
The Proxmark3 does everything better aha. The chameleon is only compatible with low frequency tags and the Mifare Classic (on the high frequency). The Proxmark3 however can do almost all type of cards plus it can do many more attacks.
@Fnantier4 ай бұрын
@@TechSecurityTools I thought the Chameleon Ultra also does HF? Are you sure? What I'm most interested in though is the cracking capability compared :) So I can make my multitool of all the card accesses I use in my everyday in one card.
@TechSecurityTools4 ай бұрын
@@Fnantier It does have HF but only Mifare Classic, the proxmark3 on the other hand can do pretty much every type of card
@judithsmith94225 ай бұрын
can you tell me why i can read my NFC Fob, but i don't have the option to Write after is saves the info? it is a Mifare DESFire EV2 type 4
@TechSecurityTools5 ай бұрын
normally in order to write you need a magic gen 4 card and with the nfc magic app after you verify your magic card you can then write to it by choosing a saved card, but after you read the mifare you will just be able to save it or emulate it, you need the magic card to see the write option
@Thadopeera4 ай бұрын
@@TechSecurityToolsaha!! This threw me for a loop a few times. Thanks
@jorgethecoach5 ай бұрын
Hey can I do this from a Mac?
@TechSecurityTools5 ай бұрын
I am not sure if you can run the Proxmark3 on a Mac, you could however just run a VM with Windows on it and it should work fine
@SergiPhone5 ай бұрын
How do I do this with a mifare 4k? I followed the instructions exactly like you but it does not work.
@TechSecurityTools5 ай бұрын
After you select write to magic tag and select the card you saved what appears when you try to write to the ring?
@dopeboys29375 ай бұрын
Can you read mifare classic 1k card for car wash and change the value of money in the data?
@TechSecurityTools5 ай бұрын
check out this conference talk: kzbin.info/www/bejne/Z3u3kJ-Km7Bpb7M .....it should answer your question
@Nigga62825 ай бұрын
You cant. The money is not stored on the card, but much rather in a database.
@TechSecurityTools5 ай бұрын
@@Nigga6282 ok thank you for sharing the info
@MrAA-of3ij5 ай бұрын
do you have a video how to clone a MIFARE Classic 1K CL2 card?
@arshadkhn8196 ай бұрын
Can device decrypt all 16 sectors RFID card tag iso-14443-A card Please make a video 🙏
@arshadkhn8196 ай бұрын
Please reply
@TechSecurityTools6 ай бұрын
it can do a dictionary attack therefore if the keys are in the dictionary it will find it. Otherwise we have a video showing how to run the auto pwn command with a proxmark3 which should decrypt any key.
@Solid_Lohen6 ай бұрын
Can this be done with a Mifare Plus?
@TechSecurityTools6 ай бұрын
yes it can, however a Gen1a isn't the card you will need, you will probably need a Gen 4 since the gen1a is only compatible with Mifare Classic, the Gen 4 however can do the job for the Mifare plus.
@vmolinosp6 ай бұрын
Can I rewrite multiple times the gen4 card with the flipper zero? And can I set to delfaut the gen4 card again with the flipper?
@TechSecurityTools6 ай бұрын
yes you can rewrite multiple times the gen4 with the flipperzero but we are not aware of how to reset it to default with a flipper, because the option isn't available
@daRock12126 ай бұрын
If you'd like to return to a default state with the F0, you can either read and save the initial card, or create a new default card with NFC > Add Manually > Mifare Classic 1k 4/7 byte UID. Either of these can then be written to the Gen4 with NFC Magic to effectively wipe the card to a default state
@TechSecurityTools6 ай бұрын
@@daRock1212 Thank you!🙏
@wiltonsmith62484 ай бұрын
@@daRock1212thank you!!!
@unboxingPERFUM6 ай бұрын
👍
@MyTube4Utoo6 ай бұрын
Cool. Thank you.
@7_of_96 ай бұрын
What's the Ai voice? Where do get it? I like to use the ring as my key to unlock my cryptography
@TechSecurityTools6 ай бұрын
elevenlabs is the website and the voice is called Josh, you can find the ring here: techsecuritytools.com/
@joecizin93576 ай бұрын
" for now only . . " what is the expected date, for when? this great looking device will be capable of so much more. 😊
@TechSecurityTools6 ай бұрын
ahahaha you are right, is just that it takes time and there's always unexpected bugs along the way 😨 the most important thing really should be adding more card capabilities but there hasn't been much movement on that
@yanissibachir63106 ай бұрын
I was looking for a good GUI and the others are not easy to navigate, I just try yours and it very easy ! good work!
@Savage.7356 ай бұрын
Yes sir I'm here 👀💯💯👍👍
@TechSecurityTools6 ай бұрын
you're the real MVP!
@vmolinosp6 ай бұрын
One question man, the ring can be rewritten all times I want with the flipper?
@TechSecurityTools6 ай бұрын
yes but can only hold one card at a time
@vmolinosp6 ай бұрын
@@TechSecurityTools Just what I need!
@MrAA-of3ij6 ай бұрын
Okay Thanks. I will try in the morning. It’s late here in Denmark now. Thanks 🙏🏻🙏🏻🙏🏻🙏🏻🙏🏻