I reckon itās āFor fuckās sakeā. Fuck owns the sake.
Who the fuck is fuck?
I do agree though
I finally pulled my Sony Vaio P out of storage and have been using it as terminal and remote desktop client. I also find itās great paired with a proxmark lol. I miss cool UMPCs with decent keyboards
Find out in Dallas
Wow, you really do like magnet mice
Not that I could experience it.
Small rodent infestation in the basement⦠If they had magnets implanted, that would make it a lot easier for me to track/catch/take care of.
If you could make this better, what would you change?
Asking for a friendā¦
Here are a couple ideas Iāve had:
- Being able to chain multiple commands
- Scan the tag and get all commands specific to that tag tech
- A more complete library of commands
Your list is good
How about a drop down of prefilled commands
I think thatās what this is meant to be
Looks like some chips previously considered secure will become clonable w/ proxmark soon?
MIFARE Classic: exposing the static encrypted nonce variant
Iāve got a bit more, should I throw it in?
Philippe Teuwen, Quarkslab
Abstractā MIFARE Classic smart cards, developed and licensed by NXP, are widely used but have been subjected to numerous attacks over the years. Despite the introduction of new versions, these cards have remained vulnerable, even in card-only scenarios. In 2020, the FM11RF08S, a new variant of MIFARE Classic, was released by the leading Chinese manufacturer of unlicensed āMIFARE compatibleā chips. This variant features speciļ¬c countermeasures designed to thwart all known card-only attacks and is gradually gaining market share worldwide. In this paper, we present several attacks and unexpected ļ¬ndings regarding the FM11RF08S. Through empirical research, we discovered a hardware backdoor and successfully cracked its key. This backdoor enables any entity with knowledge of it to compromise all user-deļ¬ned keys on these cards without prior knowledge, simply by accessing the card for a few minutes. Additionally, our investigation into older cards uncovered another hardware backdoor key that was common to several manufacturers.
From what I understand about this recent release, not really⦠this chip has been broken and crackable for many many years⦠decade+ maybe? Itās just a new way to crack the already fundamentally broken proprietary crypto in this chip.
Iād love a decluttered UI version, I really liked NFC shell when it worked on my phone
NFC Tools can send multiple commands back to back though, if thatās what you mean by chaining commands
I believe NFC shell also waited to be presented with a tag once you hit send, instead of having to present the tag and then hit send, but I canāt quite remember
Can it do that while checking returned values? As in , send command, if return == x send nextā¦
I thought that would be a good idea for automation
I doubt it, but Iāve never wanted to do that until nowā¦
I am trying to make things scriptable to an extent