Research, development and trades concerning the powerful Proxmark3 device.
Remember; sharing is caring. Bring something back to the community.
"Learn the tools of the trade the hard way." +Fravia
You are not logged in.
Time changes and with it the technology
Proxmark3 @ discord
Users of this forum, please be aware that information stored on this site is not private.
I'm trying to put together a collection of whitepapers covering the various limitations and vulnerabilities found in RFID/NFC firmware and hardware.
Ideally, documents that are more suited to consultants or perhaps the end user.
Examples of the various topics I'm trying to find information on:
Wiegand
- No security
- Replay attacks
- Host-side countermeasures
RFID / 125kHz Prox
- No security
- Long range reading and cloning
NFC / MIFARE Classic
- Poor encryption
- Reading and cloning
...
Offline
Looking forward to see your compilation of papers. Some interesting reading.
Offline
That's gonna be so helpful for us beginners!
Offline
If you have anything you can contribute and / or know of sources you'd recommend, please post them here.
Offline
I did write a handout for a presentation I had last year about NFC cracking(Mifare classic only). It might help a little.
Offline
http://proxclone.com/pdfs/iClass_Cloner_rev0.pdf
https://www.usenix.org/legacy/events/wo … Garcia.pdf
Is about iClass.
I suggest as apart of your project you download these resources and keep a copy as they are known to be pulled / go down.
Last edited by samburner3 (2017-02-28 12:58:00)
Offline