Author Topic: [Android mod] MifareSpy (Mifare Classic key extraction)  (Read 11966 times)

0 Members and 1 Guest are viewing this topic.

Offline Stackprotector

  • Administrator
  • Titan
  • *
  • Posts: 2515
  • Cookies: 205
    • View Profile
Re: [Android mod] MifareSpy (Mifare Classic key extraction)
« Reply #15 on: November 27, 2014, 10:32:19 am »
I am really late, is it the transmitter itself that is too slow or the cycles you need?
In the last case you can probably do that offsite and transer the data, just a suggestion.
Well, mifare classic uses timing to get some vulnerabilities out of the way. So the way from the chip to java land and back is too slow, when using an embedded secure element(SE) it is an applet who communicates internally (on the chip) to the nfc chip (well itself almost) using single wire protocol, so that is much much faster.

It could be possible to do it on driver level but then again there are no implementations public i think. Though i have emulation implementations for a PN512, it might be all possible.

The best thing to do is to get access to the SE on the nfc chip (manufacturer has the password which it only shares with big parties like google wallet, +1 if you reverse engineer it from there) or get a SD card with a SE on it and be happy enough that the wiring is done from the nfc chip to the sd card.

These guys have a hacked android kernel who can do the sd card thingie.
https://code.google.com/p/seek-for-android/wiki/Concept

This guy is great:
http://nelenkov.blogspot.nl/2012/08/accessing-embedded-secure-element-in.html
~Factionwars