TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Using a mobile phone to clone a Mifare card (2016)

32 点作者 wolframio将近 7 年前

4 条评论

anowlcalledjosh将近 7 年前
Sadly no detail on how to find the keys, which is the hard bit.<p>Vulnerabilities in the protocol make it relatively trivial to discover the keys if you have the correct hardware (e.g. a Proxmark3), but as far as I know nobody has done this with a phone – all these writeups conveniently only clone tags with keys in the list of common keys distributed with MifareClassicTool.
blu2将近 7 年前
In my university all vending machines use a Mifare Classic NFC tag to save users&#x27; credit. It has almost become a tradition that each year at the beginning of the second semester some freshmen find out how to read and modify their credit and mess up the vending machine system for some days just for the lulz and for (a very modest) profit.
yedawg将近 7 年前
Aren&#x27;t most mifare carding systems hooked up so transactions are logged, so to detect fraud? Like the australian gocard system for example, isn&#x27;t every legitimate transaction on the card recorded on an online database somewhere? To exploit a gocard, or similar technology, wouldn&#x27;t you also need to hack their system database? Eg. taps on to pay; records total transaction value and balance on card<i>; taps off records total transaction value and balance</i>; user rewrites card data<i>; balance on the database isnt updated because a direct payment wasn&#x27;t recorded</i>; fraudulent card detected; idk correct me HN if I missed anything
评论 #17174567 未加载
a-dub将近 7 年前
Woah dutch trash collection is surprisingly interesting.
评论 #17174121 未加载