ChameleonMini icon indicating copy to clipboard operation
ChameleonMini copied to clipboard

Request: Read with keys when dumping/cloning

Open tkerby opened this issue 3 years ago • 1 comments

It would be great to be able to set keys to use when dumping or cloning a card. I can see a few applications

1 - Key detection with reader. You can get the first key from the reader but you may need some data readable to convince the reader to try and read a second sector. Being able to clone more of a real card would help without a Proxmark to run a nested attack.

2 - Dictionary Attack. Try common keys against all the slots when cloning or dumping. This could be a key you already know tested against each slot or a set of keys downloaded from an app.

3 - Saved keys. Let's say you know all the keys from a card issued to you but you want to quickly clone another card from the same facility. Loading keys would enable this.

tkerby avatar Apr 16 '22 14:04 tkerby

If I'm understanding this correctly, Question 1 describes a mifare reader attack? There are youtube videos on how to do this with the official android app. I've never tried it though, as I have yet to encounter a standard mifare classic system that I can play with 😉

2 and 3 can be solved (better yet, are pretty much solved) with Proxmark3 Standalone Modules - I'm not sure if the chameleon is the right hardware for this. From what I read here the chameleon mini/tiny/tiny pro is pretty much newly designed 'light' version of the proxmark3 - so there might not be enough memory and/or computing power to achieve those things.

cyber-vi-king avatar Sep 17 '22 10:09 cyber-vi-king