Now, at hospital, my access badge is the same of the University one (student card), allowing some access (computers room, go in the building, pay coffee…) ; the same one I throw every year in macdo’s junk forgetting in my plate… Oups !
SO.
I was thinking to clone it and chip me with that copy.
I scanned my student card with NFC Tools, here the info :
=======================================
> Click to display the tag info of NFC Tools <
Tag type : NXXP MIFARE Ultralight (Ultralight)
Available tech : MifareUltralight, NfcA, Ndef, NdefFormatable
Serie number - XX:XX:XX:XX:XX:XX:XX (obvisouly )
ATQA : 0x0044
SAK : 0x00
data format : NFC Forum type 2
Size : 0 / 0 Bytes
Write : NO
Read only - YES
Empty tag
======================================
The “Size” thing is troubling me. I assume that my etablissement check the badge validity since the series number. Am I right ?
I’d like to :
1 : check if that “serie number” thing is real. Don’t want to spend some hundred bucks for nothing
2 : what chip should I buy and implant myself so I can use it instead of my badge ?
I know very a little about how NFC works etc etc, I would really like your advices you all
It looks to me as though your card is using the ID on the card to authenticate with the system, and there aren’t any NFC implants where that could be cloned to them. Really any card more advanced than the Mifare Classic 1K seems to give a decent amount of trouble when it comes to being cloned/emulated sucessfully, and most HF cards are like that as well.
The only way I can think to get your card implanted would be to either convert your current ID into a chip, or to get someone in IT/security to add an NFC implant to the system they have and tie it to your account, along side your card. If they would be willing to do something like that, the flexNT or the flexDF would probably be acceptable.
Size is likely 0 because it’s locked and it’s also not likely formatted for NFC. All NFC tags are also RFID tags, so obviously they can be used for non-NFC applications… but the NFC forum requires that tags like the Ultralight, which is an NFC Type 2 tag, must have a “capability container” that is formatted for NFC… the capability container tells the reader that this tag is meant to be used for NFC applications and relays the size of user memory bytes that can be used for NFC applications. It is not likely that this student card is formatted for NFC, so the size is 0.
Also it’s hard to know if the card’s serial number is used exclusively or if it also uses the user memory contents… but in just about every application I’ve ever seen, the serial number is always used in some way. As @Jaroot said, we do not currently have an implant which can support cloning an Ultralight serial number and contents.