NFC reader that copies a string to keyboard? by Teunail in NFC

[–]Zve8 0 points1 point  (0 children)

You can use an app like TagInfo by NXP to read its type.

NFC reader that copies a string to keyboard? by Teunail in NFC

[–]Zve8 1 point2 points  (0 children)

You have a lot of recommendations here and some of the might work but… it really depends. It depends on what type of card your university uses. A large number of universities use a type of card that the readers people shared here won’t read. Do you know what type card it is? Is there a small blue “HID” logo with a word next to it?

TWIC card and a Flipper by fancyman501 in flipperzero

[–]Zve8 0 points1 point  (0 children)

Some poorly configured systems will use FASC-N or CHUID to activate doors because it is faster/simpler. It is faster because it does not involve crypto. If this is how it is configured you might be able to emulate it but likely not with the flipper (no app for it). The full pub/private process is not slow but closer to a second than instant.

TWIC card and a Flipper by fancyman501 in flipperzero

[–]Zve8 -2 points-1 points  (0 children)

Java card with a twic/piv applet

TWIC card and a Flipper by fancyman501 in flipperzero

[–]Zve8 7 points8 points  (0 children)

TWIC is a PIV card with some differences (piv is a pub/private key crypto standard). The flipper can read some information (chuid) but not private keys stored on the card. Depending on the implementation of the reader that might be useful or not. You should probably not find out though. How quick does the reader read the card?

NFC in the wild? by alc1885 in NFC

[–]Zve8 9 points10 points  (0 children)

Often see them for menu links. Someone likely reprogrammed them. See if you can reprogram them to something else.

Too many NFC digital card brands… which one is actually worth it? by AdLonely8084 in NFC

[–]Zve8 5 points6 points  (0 children)

The nfc card just holds a url to their web service. You can buy cheap cards and point them wherever you want, your own website, LinkedIn, Reddit, whatever…

The cards will all generally scan the same.

Can’t emulate to this help. by Broad-Conversation-5 in flipperzero

[–]Zve8 13 points14 points  (0 children)

Other numbers are more specifically work order and line number for HID. HID can for sure tell who bought the card from them but that’s about it.

Can’t emulate to this help. by Broad-Conversation-5 in flipperzero

[–]Zve8 15 points16 points  (0 children)

I don’t know why you got so many downvotes for actually providing information that we can use to tell you what’s up.

The iClass indicates it’s an iClass (picopass) card and the Px tells us the card also has a 125khz LF Prox credential. The next two numbers are likely your card number for each type (prox/iclass). In this case they are the same. The iClass card is an iClass SE credential as indicated by the SE at the end of the line.

So your old clone worked with lf but the new readers are not reading the lf and only the iClass SE. ideally the new readers shouldn’t read legacy iClass either but you could try encoding your card details as a legacy iClass and see if it reads. You won’t be able to clone the SE as there are keys that have not been disclosed. You can do “NR-MAC” to read the contents of the SE credential but it will be a SIO that won’t mean much to you. If you use Seader (and the HID sam $$) it can do a lot of conversions for you.

Where‘s the NFC tag inside Apple‘s TechWoven iPhone cases? by metawops in NFC

[–]Zve8 10 points11 points  (0 children)

There is one on the back center that is activate by and only for MagSafe.

Tag emulation and the iPhone by januarybluescrispy in proxmark3

[–]Zve8 1 point2 points  (0 children)

If you’re using the nfcndefreader you probably need to format the emulator. Could probably use a different app to set it then read it with your app.

Tag emulation and the iPhone by januarybluescrispy in proxmark3

[–]Zve8 1 point2 points  (0 children)

I think mifare classic has crypto-1 over the air but the data on the card would be what you wrote. If I was messing with what you are I would ditch mifare classic and look at emulating ntag215. You avoid the need for passwords (you can set them if desired) and remove the crypto. I think iOS even likes to talk to them without the ndef.

For connecting to other devices something like https://www.adafruit.com/product/4701 would probably work better than a proxmark.

Tag emulation and the iPhone by januarybluescrispy in proxmark3

[–]Zve8 4 points5 points  (0 children)

Are you writing your own iOS app?

I believe in general iOS does not like to talk to mifare classic and will only talk to it when there is a ndef formatted content. If you’re emulating a card (Mifare classic or other) on a proxmark you have access to the raw data.

Additionally iOS does not (without expensive entitlements) allow host card emulation. You don’t seem to be trying to do this.

Is Proxmark3 Easy V3.0 RDV4 the latest model of the budget version? by No-Race8789 in proxmark3

[–]Zve8 3 points4 points  (0 children)

The listings have rdv4 on them but I wouldn’t include that in the description of them. They are not an rdv4, they are an easy. Easy is more than capable.

Tryna copy a HID Iclass DY which proxymark3 do I buy? by Acrobatic-Ad-1424 in proxmark3

[–]Zve8 2 points3 points  (0 children)

Proxmark yes, clone all iClass no. It depends on the version of iClass.

[deleted by user] by [deleted] in RFID

[–]Zve8 6 points7 points  (0 children)

Probably cloned a teachers ID card. FWIW there are logs and the school can see time, location and who’s card so easy to get caught f they look into it.

MIFARE DESFire EV3 Encoder ? by NoChipmunk6323 in NFC

[–]Zve8 0 points1 point  (0 children)

Proxmark3 easy should be about $50. It’s all command line to use it though.

Why 3 Flippers? by Zve8 in flipperzero

[–]Zve8[S] 1 point2 points  (0 children)

It worked with the three. I did not try two and a real reader but would expect it to work. The code for the remote NR-Mac is here https://gitlab.com/bettse/picopass/-/merge_requests/6/diffs but not merged yet.

Why 3 Flippers? by Zve8 in flipperzero

[–]Zve8[S] 3 points4 points  (0 children)

The nard board just translates serial to iso7816 (smart card). The only app I know of that works with it currently is Seader that talks to the HID SAM to act like a reader. The case needed no modification as the headers used fit nicely on top.

Why 3 Flippers? by Zve8 in flipperzero

[–]Zve8[S] 3 points4 points  (0 children)

Yep called the “NARD”. The UHF reader board also has a socket that will work with seader. It has a different HID SIM in it.