Todd Owen

Results 7 comments of Todd Owen

[miLazyCracker](https://github.com/nfc-tools/miLazyCracker) worked great on a MiFare Plus (7 byte UID) 2K SL1 card I had (ATQA: 00 40, UID size: double, SAK: 08), although it took over an hour to...

@ceres-c, I believe the card is a MiFare Plus based solely on the ATQA and SAK data I mentioned above. The Darkside Attack didn’t work, but the HardNested Attack did....

Based on the ATQA and SAK the card is 2K. Do you know why the mfd file would only be 1024 bytes? Also, would the Chameleon Mini be able to...

The only 7-byte cards I have are 4K, but I’m getting a “Could not read dump file: _____.mfd” error when I try to use them, which I assume is because...

At the end of miLazyCracker, it executes `$ nfc-classic W a $TMPFILE_MFD` which is where the mfd comes in.

I am pleased to say I successfully used a Proxgrind Chameleon Mini RevG RDV2 (using the MF_CLASSIC_1K_7B mode) to emulate the aforementioned card. I used the 1k dump file from...

Looking through some `nodes.conf` files, under the `default` profile I found `write: lanplus` just below `interface: lanplus` which was strange. Each node included a `write: "false"` line I expressly added,...