Force Android to emit a UID over NFC [migrated]
I would like to emit a custom UID over the NFC chip of my (rooted) Android phone. How can I achieve this ?
Continue reading Force Android to emit a UID over NFC [migrated]
Collaborate Disseminate
I would like to emit a custom UID over the NFC chip of my (rooted) Android phone. How can I achieve this ?
Continue reading Force Android to emit a UID over NFC [migrated]
I want to protect my NFC tag against unauthorized copying.
I understand that EMV is using asymetric cryptography. My focus is on understanding of other standards (NTAG413, MIFARE DESFire) or anything else you could suggest t… Continue reading Which NFC standard prevents NFC tags from unauthorized copying?
My ideal bank would offer online banking from a browser with user/pwd and WebAuthn, for example with a NFC or USB key. No OTP or SMS or apps on the smartphone or physical devices required. (It goes without saying, no recovery… Continue reading Why don’t online banks use WebAuthn? [on hold]
The functionality is to hold a store credit amount. If the credit can be set to 50, and from the chip itself this value can only be decreased, there is no chance for hackers to increase this value again.
Are there any NFC ch… Continue reading NFC Chip with countdown pin
I have done research on how to authenticate NFC tags. Seeing how you can use digital signatures, or a hidden key on newer NFC tags, it seems safe. However none of it would prevent a Man in the Middle attack where a device can… Continue reading Can a Man in the Middle attack on NFC be prevented by programming when working with NFC?
I’m not able to set up keepass2android with otp.
Facts:
Yubikey 5 NFC (FW 5.1.2);
Keepass2Android 1.07-r1;
Keepass 2.42.1 (Windows);
Yubikey Personalization Tool 3.1.25;
Android 8.0
I’ve create the database with Keepass on… Continue reading Keepass2Android with OTP not working
I am trying to clone/write copies of an NFC card. I am using an ACR122U-A9 receiver and running nfc-tools on a kali linux VM.
The card I am trying to clone is identified as a Mifare Classic 1k tag
ISO/IEC 14443A (106 kbps), UID SIZE: Doub… Continue reading Identifying and cloning NFC Card double size UID – type mifare plus 7 byte 2k or classic 7 byte 1k
Regular Hackaday readers may recall that a little less than a year ago, I had the opportunity to explore a shuttered Toys “R” Us before the new owners gutted the building. Despite playing host to the customary fixture liquidation sale that takes place during the last death throes of such …read more
Continue reading Teardown: VeriFone MX 925CTLS Payment Terminal
Most of us are guilty of repeatedly hitting the snooze bar on our alarm clocks and going back to sleep, which is why we’ve seen devices that won’t stop ringing (or even electrocuting) until they’re taken to a remotely-located docking station…. Continue reading EzLarm forces you out of bed using an app and a tag