1
0
mirror of https://github.com/nfc-tools/mfcuk.git synced 2026-01-23 19:08:21 +00:00
nfc-tools.mfcuk/ProjectHome.md
2015-04-19 03:50:14 -04:00

4.9 KiB

IMPORTANT: Due to constant lack of time, I (Andrei Costin) cannot support/maintain this project. If there is any volunteer to maintain/develop, please contact me or leave a message on libnfc's forum.

MFCUK - MiFare Classic Universal toolKit

Toolkit containing samples and various tools based on and around libnfc and crapto1, with emphasis on Mifare Classic NXP/Philips RFID cards.

Special emphasis of the toolkit is on the following:

  • mifare classic weakness demonstration/exploitation
  • demonstrate use of libnfc (and ACR122 readers)
  • demonstrate use of Crapto1 implementation to confirm internal workings and to verify theoretical/practical weaknesses/attacks

Wishlist for next version:
  • integrate with mifarecrack (proxmark3 sniffed-logs parser-decrypter) (short-term)
  • write proper proxmark3 parser (c for internal calls and py for external calls)
  • integrate with MFOC (medium-term)
  • integrate with crapto1 3.2
  • create initial fingerprint design&implementation. card fingerprinting based on: known plain-text in specific blocks, range of UIDs, etc. (short-term)
  • more templates to add (short-term)
  • summarize decoding info and implement custom decoders (short-medium-term)
  • implement "wiser" template data-structure and appropriate binary data similarity algotihms (medium-term)
  • have command-line (silent+interactive) and GUI (QT-based?) (long-term)

More of research type long-term activity (any volunteers :)?):

  • go deeper into how UID/block/keys/Nt/Nr relate so that we choose Nt and Nr with shortest crack time (long-term)
  • research on how to shorten time in case prefix of the keys or any part of the keys are known
  • many cards from same issuer might have known plaintext in specific blocks - can this be exploited to speed-up first key recovery and then use optimized darkside/nested to get whole card (medium-term)

PACKAGE HISTORY:

  • zv_mf_dark_side-v0.3.zip Nov 28 829 KB 604 Downloads
  • zv_mf_dark_side-v0.2.zip Nov 15 43.2 KB 82 Downloads
  • zv_mf_dark_side-v0.1.zip Nov 13 40.1 KB 48 Downloads

IMPORTANT NOTICE - would greatly appreciate if someone can donate (even used, smashed, but still programmable) things below:

  • either Nokia 6131 either Nokia 6212
  • iCarte for iPhone

These things are aimed to research, implement the 100% software emulation of Mifare Classic Cards (including UID) and release it open-source under GPL.

Please contact zveriu through my zveriu's blog regarding donations.


DISCLAIMER - The information and reference implementation source/binary contained herein is provided:

  • for informational use only as part of academic or research study, especially in the field of informational security, cryptography and secure systems
  • as-is without any warranty, support or liability - any damages or consequences obtained as a result of consulting this information if purely on the side of the reader
  • NOT to be used in illegal circumstances (for example to abuse, hack or trick a system which the reader does not have specific authorizations to such as ticketing systems, building access systems or whatsoever systems using Mifare Classic as core technology)

Contacts

Andrei

Andrei Costin - mailto:zveriu@gmail.com

http://andreicostin.com

http://code.google.com/p/mfcuk/

Nethemba Team

mailto:mifare@nethemba.com

Pavol Luptak - mailto:pavol.luptak@nethemba.com

Norbert Szetei - mailto:norbert.szetei@nethemba.com

http://nethemba.com

Papers

http://eprint.iacr.org/2009/137.pdf

http://www.cs.ru.nl/~petervr/web/papers/grvw_2009_pickpocket.pdf

Links

http://www.mikeycard.org

http://www.libnfc.org forum

http://www.proxmark.org forum