mifare

How to write MifareClassic with Custom Key

允我心安 提交于 2019-12-06 09:08:48
I need to find a solution to write Mifare Classic 1 K Tag with Custom Key. I am unable to write it, I have tried with every option but unfortunately all the time I get the error "IOException: Transceive Failed". Below is my code snippet: byte custom_key[]={ (byte)0xff,(byte)0xff,(byte)0xff,(byte)0xff,(byte)0xff,(byte)0xff }; // 16 bytes of Data. Otherwise it was throwing IllegalArgumentException . byte[] data="Hello world of N".getBytes(); getMfc().connect(); if(getMfc().authenticateSectorWithKeyA(4, custom_key)) { getMfc().writeBlock(3, data); // Here I receive IOException all the time. }

APDU Write block commands on mifare classic

不羁的心 提交于 2019-12-06 07:30:41
I have been trying to write some data to my mifare classic cards. first I send these two commands which returns 90 00: Load Mifare Keys: FF 82 20 01 06 FF FF FF FF FF FF Authenticate: FF 86 00 00 05 01 00 01 60 01 now I can write commands to sector 0 and block 1 + 2 ff d6 00 01 10 14 01 03 E1 03 E1 03 E1 03 E1 03 E1 03 E1 03 E1 ff d6 00 02 10 03 E1 03 E1 03 E1 03 E1 03 E1 03 E1 03 E1 03 E1 i mistakenly overwritten block 3 a few times rendering this sector unreadable it seems: if I send the command ff d6 00 04 10 I get return error 69 82 which i googled as authentication error do I need to

How to authenticate NTAG213 with ACR122U

旧巷老猫 提交于 2019-12-06 07:28:15
问题 I'm using an ACR122U reader with an NTAG213 card. The card is password (reading and writing) protected with the password 52 84 00 08 . What are the APDU commands I should run to authenticate the card and also to read pages 30 and 31 of it once authenticated? I know with the MiFare 1k I could load the password and authenticate a sector, but I'm not sure how authentication works with the NTAG213 cards with the ACR122U readers. 回答1: With the ACR122U you would need to send direct commands to the

Authenticating Ultralight EV1 with PC/SC reader

心已入冬 提交于 2019-12-06 07:20:06
问题 I have a problem trying to authenticate an Ultralight EV1 card using a PC/SC reader (specifically an ACR1222L) in Java. I'm able to write and read on an unprotected tag using the corresponding APDUs for ISO 14443-3 tags. However, I can't find a way to run the PWD_AUTH command since it is not part of the 14443-3 standard (or any native command for that matter). Is it possible to run this command (or any native command for that matter)? I have tried sending the following APDU {e0 00 00 24 07 1b

ACR122U NFC Peer to Peer demo not working

心不动则不痛 提交于 2019-12-06 06:23:20
I've got an ACR122U NFC card reader and ACR122T token from ACS. I'm trying to run their NFC Peer to Peer demo. I've installed the ACR122U SDK, mysql and connector, set up the database, and added the escape command to the registry. When I try to run the peer to peer demo I carry out the following steps (with resultant log results shown) Insert NFC ACR122T into USB port. Open the Smart Poster application and click initalise with reader 0. Log: D1: 2:04:57 PM Program ready D1: 2:05:02 PM Succesful connection to : ACS ACR122U PICC Interface 0 Direct Mode D1: 2:05:02 PM << FF 00 48 00 FF D1: 2:05

Emulate Mifare card with Android 4.4

試著忘記壹切 提交于 2019-12-06 04:59:14
问题 I have researched Mifare and other card emulation I have very good knowledge in programming (not Android, but C/C++). I have proxmark and I have made multiple emulation codes for proxmark, so I know how the cards communicate. I don't understand currently, does android enable full card emulation. I have researched this for about 3 days now, and the conclusion is there is no one constant pattern. Some people say it is possible, some say it is not. I looked through android API and the Host-based

How use security on Mifare Ultralight C (using android)?

丶灬走出姿态 提交于 2019-12-05 22:23:57
I am trying to develop an Android application that uses the features (specifically read protection) of the MF0ICU2 tags (Mifare Ultralight C). That tags are Mifare DESFire EV1 compatible. Into Android classes, MifareUltralightTag have only standard Read and Write capability, but with transceive method you could send raw command to Tag, for example 0x30 0xYY is a read page and it works. But how use raw command to use security capability on MF0ICU2 tags? Does anyone have experience with this type of programming? You should request the datasheet for the MIFARE Ultralight C tags from the

Accessing card-emulation mode on USB-NFC-Reader

萝らか妹 提交于 2019-12-05 12:53:23
I have an Android tablet with Android 4.2. This tablet does not have NFC hardware. However I have an external USB reader: ACR 1252U , that came with an Android library . I have asked some general questions of my setup here . Now that it gets more specific, I need to ask another one. In this previous question I found out, that I can use the ACS Android library to access the readers card emulation capabilities. My first goal is to make that reader emulate an NFC tag, that contains a URL. Any NFC-capable Android phone should be able to scan this emulated tag and automatically open the browser. I

NfcA transceive commands documentation NFC-A (ISO 14443-3A)

时光总嘲笑我的痴心妄想 提交于 2019-12-05 11:03:42
问题 Edit: Please read both answers submitted by henrycjc and me for a full explaination Where do I find the documentation to use in android.nfc.tech.NfcA ? /** * Provides access to NFC-A (ISO 14443-3A) properties and I/O operations on a {@link Tag}. * * <p>Acquire a {@link NfcA} object using {@link #get}. * <p>The primary NFC-A I/O operation is {@link #transceive}. Applications must * implement their own protocol stack on top of {@link #transceive}. * * <p class="note"><strong>Note:</strong>

android nfc intent-filter to show my application when nfc discover a tag

只谈情不闲聊 提交于 2019-12-05 10:32:22
I am writing an app that works with NFC and MIFARE CARD. When my NFC device detect a card, it shows me the list of application that can use NFC, but my application is not mentioned. What I am missing on my android manifest file? <uses-permission android:name="android.permission.NFC" /> <uses-sdk android:minSdkVersion="14" android:targetSdkVersion="17" /> <uses-feature android:name="android.hardware.nfc" android:required="true" /> <application android:icon="@drawable/ic_launcher" android:allowBackup="true" android:label="@string/app_name" android:theme="@style/AppTheme" > <activity android