tried this w/my card and no luck reading it w/several nfc apps. however, the door reader will beep when i try my phone on it. so i think door readers use a different frequency for security. makes sense.
What I'm going to try is get security at where I work (they do all the access cards and all) and see if they'll be willing to program the NFC chip in the phone. To provide access to a card they program it and swipe against a writer. Going to see if they can do that. Flaws in logic?
Sent from my GT-I9300 using Tapatalk 2
definately not going to work. Your phone may be able to read the write command, and save this as a file, or whatever. But you will need a different approach if you want to actually emulate the card.
I thought that you needed the key in order to read all of the sectors & blocks. So, there is a key exchange between the card and reader meaning that it is a lot harder to copy the card entirely, leaving it somewhat useless.Then it would be ridiculously insecure. Ex. If I took a friends paywave and was able to emulate it then now I in theory just stole their credit card .
It would be insane to allow phones to emulate this, then everybody would ride the train for free, enter storage areas with other ppl's tag etc.
definately not going to work. Your phone may be able to read the write command, and save this as a file, or whatever. But you will need a different approach if you want to actually emulate the card.
Phones can't emulate specific UIDs, not because of software limitations, but because of hardware. There are other solutions out there, such as the Proxmark 3, which allows UID cloning. The Proxmark 3 makes it very easy to clone school, university and place of work access cards, as most of these rely purely on UID association.It would be insane to allow phones to emulate this, then everybody would ride the train for free, enter storage areas with other ppl's tag etc.
You might be able to recharge this yourself if you get a card r/w for your PC. Depends how pro the cantina solution is.
This is false. These systems are based on the UID of the NFC card. The vast majority of access systems for schools and places of work don't write anything onto the card. They simply make an association in their backend system with that person's user account and the UID of their NFC card.
Because of this, it is indeed possible to get your phone's NFC chip associated with your account instead of a NFC card. However, the issue with Android is that your phone generates a random UID with each NFC interaction. This means that, once the security guy swipes your phone to associate it with your account, the UID will change the next time you swipe it. The only way to fix this and get a static UID would be to enable card emulation. This was done in the Nexus S with custom firmware a while ago, but has not been repeated on any other phones. If you are able to enable card emulation, your phone will emulate a generic Mifare NFC card with a static UID, and you would then be able to replace your door access card with your phone (in most cases).
Phones can't emulate specific UIDs, not because of software limitations, but because of hardware. There are other solutions out there, such as the Proxmark 3, which allows UID cloning. The Proxmark 3 makes it very easy to clone school, university and place of work access cards, as most of these rely purely on UID association.
Here in England, trains, buses etc don't work with the system you've described, and I'd imagine it's the same for most other countries. The data (money stored, top-ups, money deducted) is written to the card in real time. Of course these types of cards have higher levels of security through the use of secret access keys. Without access to these secret access keys, you can't dump the data from an Oyster card, for example. You therefore cannot simply duplicate an Oyster card with your phone, unless the issuer provides you with the access keys or you manage to crack them on your own.
Application for simple Bluetooth file sharing using NFC. Run this application from the context menu of a selected file and tap phones to start the file transfer.
Application does automatically, without requiring user interaction:
* enable Bluetooth
* establish a connection with the second device
* disable Bluetooth after file transfer to save a battery
NOTE: Only for devices with NFC support, tested on Nexus S. The application has to be installed on both devices.
I've been trying for quite some time now to see where I'd get stuck.
My scenario: Touch-a-tag NFC reader (usb) on a laptop with BackTrack 5R2, within 20 minutes I had the NFC working, and 10 minutes later I succesfully copied/cracked a Mifare Classic card.
Since the guide I was following proved to be working, I just tried to do the exact same on the S3, with the 'Complete Linux installer' app and a Backtrackv8.img file as LiveOS.
I ran into a lot of compatibility errors, for instance the ARM apt repository isnt as filled/complete as the x86/x64 one, a lot of aps need to be cross compiled by hand, however I got those working.
The driver for the NFC on the other hand won't f****ng compile, but then again, I might not even need it since the chipset of the Touch-a-Tag is different from the S3's NFC.
From there on it was all just getting messy and depended on usb.h (libusb) that sometimes couldn't be found and whatnot.
I don't think this will work from the android shell, since android seems to have limited the NFC capabilities.
Any real hacker got thoughts or would like the give it a try together?
definately not going to work. Your phone may be able to read the write command, and save this as a file, or whatever. But you will need a different approach if you want to actually emulate the card.
Phones can't emulate specific UIDs, not because of software limitations, but because of hardware. There are other solutions out there, such as the Proxmark 3, which allows UID cloning. The Proxmark 3 makes it very easy to clone school, university and place of work access cards, as most of these rely purely on UID association.It would be insane to allow phones to emulate this, then everybody would ride the train for free, enter storage areas with other ppl's tag etc.
You might be able to recharge this yourself if you get a card r/w for your PC. Depends how pro the cantina solution is.
I tried nfclassic and that didn't work I'm also looking for NFC card emulation
I thought that you needed the key in order to read all of the sectors & blocks. So, there is a key exchange between the card and reader meaning that it is a lot harder to copy the card entirely, leaving it somewhat useless.
tried this w/my card and no luck reading it w/several nfc apps. however, the door reader will beep when i try my phone on it. so i think door readers use a different frequency for security. makes sense.