Sadly no detail on how to find the keys, which is the hard bit.<p>Vulnerabilities in the protocol make it relatively trivial to discover the keys if you have the correct hardware (e.g. a Proxmark3), but as far as I know nobody has done this with a phone – all these writeups conveniently only clone tags with keys in the list of common keys distributed with MifareClassicTool.
In my university all vending machines use a Mifare Classic NFC tag to save users' credit. It has almost become a tradition that each year at the beginning of the second semester some freshmen find out how to read and modify their credit and mess up the vending machine system for some days just for the lulz and for (a very modest) profit.
Aren't most mifare carding systems hooked up so transactions are logged, so to detect fraud? Like the australian gocard system for example, isn't every legitimate transaction on the card recorded on an online database somewhere? To exploit a gocard, or similar technology, wouldn't you also need to hack their system database? Eg. taps on to pay; records total transaction value and balance on card<i>; taps off records total transaction value and balance</i>; user rewrites card data<i>; balance on the database isnt updated because a direct payment wasn't recorded</i>; fraudulent card detected; idk correct me HN if I missed anything