The anti🚫-derailment🚃 & thread🧵 hijackingšŸ”« thread🧵 ⁉

I reckon it’s ā€œFor fuck’s sakeā€. Fuck owns the sake.

4 Likes

Who the fuck is fuck?
I do agree though

3 Likes

I finally pulled my Sony Vaio P out of storage and have been using it as terminal and remote desktop client. I also find it’s great paired with a proxmark lol. I miss cool UMPCs with decent keyboards :sob:

9 Likes

received_473127395696581

6 Likes

Find out in Dallas :smirk:

3 Likes
4 Likes

Wow, you really do like magnet mice :exploding_head:

3 Likes

Not that I could experience it. :frowning:

Small rodent infestation in the basement… If they had magnets implanted, that would make it a lot easier for me to track/catch/take care of.

2 Likes

:robot_gundam:

4 Likes

If you could make this better, what would you change?


Asking for a friend…

Here are a couple ideas I’ve had:

  • Being able to chain multiple commands
  • Scan the tag and get all commands specific to that tag tech
  • A more complete library of commands
4 Likes

Your list is good

3 Likes

How about a drop down of prefilled commands

4 Likes

I think that’s what this is meant to be

3 Likes

Looks like some chips previously considered secure will become clonable w/ proxmark soon?

MIFARE Classic: exposing the static encrypted nonce variant

I’ve got a bit more, should I throw it in?
Philippe Teuwen, Quarkslab

Abstract— MIFARE Classic smart cards, developed and licensed by NXP, are widely used but have been subjected to numerous attacks over the years. Despite the introduction of new versions, these cards have remained vulnerable, even in card-only scenarios. In 2020, the FM11RF08S, a new variant of MIFARE Classic, was released by the leading Chinese manufacturer of unlicensed ā€œMIFARE compatibleā€ chips. This variant features specific countermeasures designed to thwart all known card-only attacks and is gradually gaining market share worldwide. In this paper, we present several attacks and unexpected findings regarding the FM11RF08S. Through empirical research, we discovered a hardware backdoor and successfully cracked its key. This backdoor enables any entity with knowledge of it to compromise all user-defined keys on these cards without prior knowledge, simply by accessing the card for a few minutes. Additionally, our investigation into older cards uncovered another hardware backdoor key that was common to several manufacturers.

3 Likes

From what I understand about this recent release, not really… this chip has been broken and crackable for many many years… decade+ maybe? It’s just a new way to crack the already fundamentally broken proprietary crypto in this chip.

4 Likes

I’d love a decluttered UI version, I really liked NFC shell when it worked on my phone

NFC Tools can send multiple commands back to back though, if that’s what you mean by chaining commands

I believe NFC shell also waited to be presented with a tag once you hit send, instead of having to present the tag and then hit send, but I can’t quite remember

3 Likes

Can it do that while checking returned values? As in , send command, if return == x send next…
I thought that would be a good idea for automation

2 Likes

I doubt it, but I’ve never wanted to do that until now…

4 Likes

I am trying to make things scriptable to an extent

2 Likes