4.9 KiB
IMPORTANT: Due to constant lack of time, I (Andrei Costin) cannot support/maintain this project. If there is any volunteer to maintain/develop, please contact me or leave a message on libnfc's forum.
MFCUK - MiFare Classic Universal toolKit
Toolkit containing samples and various tools based on and around libnfc and crapto1, with emphasis on Mifare Classic NXP/Philips RFID cards.
Special emphasis of the toolkit is on the following:
- mifare classic weakness demonstration/exploitation
- demonstrate use of libnfc (and ACR122 readers)
- demonstrate use of Crapto1 implementation to confirm internal workings and to verify theoretical/practical weaknesses/attacks
Wishlist for next version:
integrate with mifarecrack (proxmark3 sniffed-logs parser-decrypter) (short-term)- write proper proxmark3 parser (c for internal calls and py for external calls)
- integrate with MFOC (medium-term)
- integrate with crapto1 3.2
create initial fingerprint design&implementation. card fingerprinting based on: known plain-text in specific blocks, range of UIDs, etc. (short-term)- more templates to add (short-term)
- summarize decoding info and implement custom decoders (short-medium-term)
- implement "wiser" template data-structure and appropriate binary data similarity algotihms (medium-term)
- have command-line (silent+interactive) and GUI (QT-based?) (long-term)
More of research type long-term activity (any volunteers :)?):
- go deeper into how UID/block/keys/Nt/Nr relate so that we choose Nt and Nr with shortest crack time (long-term)
- research on how to shorten time in case prefix of the keys or any part of the keys are known
- many cards from same issuer might have known plaintext in specific blocks - can this be exploited to speed-up first key recovery and then use optimized darkside/nested to get whole card (medium-term)
PACKAGE HISTORY:
- zv_mf_dark_side-v0.3.zip Nov 28 829 KB 604 Downloads
- zv_mf_dark_side-v0.2.zip Nov 15 43.2 KB 82 Downloads
- zv_mf_dark_side-v0.1.zip Nov 13 40.1 KB 48 Downloads
IMPORTANT NOTICE - would greatly appreciate if someone can donate (even used, smashed, but still programmable) things below:
- either Nokia 6131 either Nokia 6212
- iCarte for iPhone
These things are aimed to research, implement the 100% software emulation of Mifare Classic Cards (including UID) and release it open-source under GPL.
Please contact zveriu through my zveriu's blog regarding donations.
DISCLAIMER - The information and reference implementation source/binary contained herein is provided:
- for informational use only as part of academic or research study, especially in the field of informational security, cryptography and secure systems
- as-is without any warranty, support or liability - any damages or consequences obtained as a result of consulting this information if purely on the side of the reader
- NOT to be used in illegal circumstances (for example to abuse, hack or trick a system which the reader does not have specific authorizations to such as ticketing systems, building access systems or whatsoever systems using Mifare Classic as core technology)
Contacts
Andrei
Andrei Costin - mailto:zveriu@gmail.com
http://code.google.com/p/mfcuk/
Nethemba Team
Pavol Luptak - mailto:pavol.luptak@nethemba.com
Norbert Szetei - mailto:norbert.szetei@nethemba.com
Papers
http://eprint.iacr.org/2009/137.pdf
http://www.cs.ru.nl/~petervr/web/papers/grvw_2009_pickpocket.pdf
Links
http://www.libnfc.org forum
http://www.proxmark.org forum
