Clone Proxmark3 dump file to Magic Ring with MCT app on Android

  Рет қаралды 8,280

Dangerous Things

Dangerous Things

Күн бұрын

dngr.us/magic - The Magic Ring is truly something special. Inside we've hidden a 13.56MHz Magic Mifare 1k gen2 chip as well as a 125kHz T5577 RFID chip! Both chips have a fully reprogrammable ID, and with the Magic Mifare chip being gen2, you can even program it with your Android phone via the MCT app!
This video shows how to dump keys and data from a Mifare "Classic" 1k card to a set of files using the Proxmark3, then use those files to clone that card to the Magic Ring using the MCT app on Android!
• • Check out our new Magi... - Magic Ring introductory video

Пікірлер: 13
Getting Started Guide for Proxmark3 Easy on Windows
17:40
Dangerous Things
Рет қаралды 36 М.
Check out our new Magic Ring dual chip programmable wearable!
7:08
Dangerous Things
Рет қаралды 10 М.
나랑 아빠가 아이스크림 먹을 때
00:15
진영민yeongmin
Рет қаралды 16 МЛН
Apple peeling hack @scottsreality
00:37
_vector_
Рет қаралды 123 МЛН
Cloning Mifare 1k "classic" chips to an xM1 with the Proxmark3
15:01
Dangerous Things
Рет қаралды 29 М.
Cloning common 125kHZ chips to the T5577
16:11
Dangerous Things
Рет қаралды 24 М.
Exploring the Proxmark3
11:00
Dangerous Things
Рет қаралды 42 М.
Proxmark3 #4 : Clonando una tarjeta de control de accesos.
9:54
Cambatronics Online
Рет қаралды 16 М.
PROXMARK VS MIFARE
9:15
Дмитрий Зоргович
Рет қаралды 17 М.
Obteniendo llaves de tarjetas Mifare Classic 1K con Proxmark3
5:36
Salvador Mendoza
Рет қаралды 10 М.
Proxmark3 Tutorial: Sniffing MIFARE DESFire Cards
15:17
Iceman Channel
Рет қаралды 18 М.
Duplikat Sector UID dari Kartu 13.56MHz dengan Mifare Classic Tool Part 2
3:40