You all know the deal.
Put through you nomination with a link.
The Winner will be decided at the end of the year
for all the fame and glory that comes with it
and an exclusive BEST POST badge
Less than a week into the year, and we have this little gem
I finished a new project recently that lets me unlock my computer using my blinky
XSIID implant. The script also passes data scanned to a website if needed, so I can also badge into custom websites I build. I’m using a few basic python packages, as well as systemd, i3lock, and the MIRKOE2540 NFC USB dongle. This seems to be the only USB device I’ve been able to find that will scan my implant.
To use this, install Python and i3lock. Replace tokens and text_tokens with the ID and text written to …
Awe thank you! I’m glad you enjoyed my post. I’ve worked so hard to write compatible software for my implants, it’s tricky with WebUSB and WebNFC all blocking readers by default, and only a few pieces of software supporting NFC unlock on Windows. I just bought an ACR1252U so I’ll post an update with a link to software compatible with it that can replace /etc/nxp when I get a chance. Thanks again for your support!
Out of nowhere, and
@lelando’s first post.
Super detailed, and super helpful.
If cost is no objective I’d grab the portapack. The portapack is just a peripheral device that plugs into a vanilla HackRF, and it can be used in HackRF mode which effectively shuts down all portapack peripherals and operates as a naked HackRF over USB.
If cost is an objective, I wouldn’t miss the portapack at all. It’s novel and interesting, but I have not yet done anything outside of really simple tinkering on a portapack (like watching planes fly by over ads-b or listening to local ham bands…
Super generous (This is just one example)
Intergrated NFC reader into a laptop
Inspired by the
wonderful work of @StarGate01, I decided to undertake a similar project, and install a reader into my ThinkPad X230, in place of the pc card slot. Mine was much less invasive, though the fit is a bit less than optimal.
All I used was:
A Mini PCIe to USB adapter
A ferrite sheet
…and some basic tools; a soldering kit, a bit of electrical tape.
The materials, before hacking away at them:
Stripped the case off the reader
Detailed, informative and helpful
The eml file type has been phased out of use within the RRG Proxmark repo/project in favour of the more industry accepted file type of json. On the older guides where you read “eml”, replace it with “json” and you’ll be fine.
Few things Ive noticed as I was reading the thread:
Source card has 4 byte (N)UID
Source card has weak PRNG
Source card has 1k memory
You are using Proxspace
You have used Autopwn/recovery commands multiple times
You are copying to a gen1a (primarily)
Taking into accoun…