-
Notifications
You must be signed in to change notification settings - Fork 83
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[REQUEST] Implement VK496 MFOC Hardnested attack #55
Comments
Note that the vk496 repo is now maintained at https://github.com/nfc-tools/mfoc-hardnested |
Wow, new toy, i can try to add(not replace). At present, my plan is to update the rdv4 client for rfidtools after the RRG warehouse test is stable. After that, I can try to add new toy. |
only run if the device has 1.2gb ram ... |
Thanks. I'll pay attention to it. |
Actually, it could very well replace the current mfoc option in RFID Tools, as is deals with both nested AND hardnested attack in order to deal with all cases. Standard nested attack works as usual. If the card is detected as "not vulnerable to nested attack", the hardnested attack is launched right away. Regards! |
@xianglin1998 have you tried to compile this version of mfoc for android? |
Hi. Did someone tried to replace the current mfoc option in RFID Tools and compile it? |
Any news on this ? |
Hello,
Is it possible to replace the current version of mfoc with this: https://github.com/vk496/mfoc/tree/hardnested ?
The current tool reports the error "Card is not vulnerable to nested attack", whereas the modified version by VK496 works perfectly fine against every Mifare Classic card I've used so far.
The text was updated successfully, but these errors were encountered: