This is an Android NFC-App for reading, writing, analyzing, etc. Mifare Classic RFID-Tags.
<b>GENERAL INFORMATION</b>
This tool provides several features to interact with (and <b>only</b> with) Mifare Classic RFID-Tags.
It is designed for users who have at least basic familiarity with the Mifare Classic technology.
┏━┫ PLEASE READ ┣━
┃Please read the whole page and make sure you got everything right before rating. Thank you!
┃If you rate with less then 4 stars, please leave a comment why. This way I can improve this app.
┃If you like MCT please consider to buy the donate version.
┗━
<b>FEATURES</b>
• Read Mifare Classic tags
• Save and edit the tag data you read
• Write to Mifare Classic tags (block-wise)
• Clone Mifare Classic tags
(Write dump of a tag to another tag; write 'dump-wise')
• Key management based on dictionary-attack
(Write the keys you know in a file (dictionary).
MCT will try to authenticate with these
keys against all sectors and read as much as possible.)
• Format a tag back to the factory/delivery state
• Write the manufacturer block of special Mifare Classic tags
• Create, edit and save key files (dictionaries)
• Decode & Encode Mifare Classic Value Blocks
• Decode & Encode Mifare Classic Access Conditions
• Compare dumps (Diff Tool)
• Display generic tag information
• Display the tag data as highlighted hex
• Display the tag data as 7-Bit US-ASCII
• Display the Mifare Classic Access Conditions as a table
• Display Mifare Classic Value Blocks as integer
• In-App (offline) help and information
• It's open source (GPLv3) ;)
<b>IMPORTANT NOTES</b>
Some important things are:
• The features this tool provides are very basic. There are no such
fancy things like saving a URL to an RFID-Tag with a nice looking
graphical user interface. If you want so save things on a tag,
you have to input the raw hexadecimal data.
• This App can <i>NOT crack/hack</i>
any Mifare Classic keys. If you want to read/write an RFID-Tag, you
need keys for this specific tag first. For additional information
please read/see <i>Getting Started</i> from the links section.
• There will be <i>no "brute-force" attack</i>
capability in this application. It is way too slow due
to the protocol.
• The first block of the first sector of an <b>original</b>
Mifare Classic tag is <b>read-only</b> i.e. not writable. But there
are <b>special</b> Mifare Classic tags that support writing to the
manufacturer block with a simple write command. This App is able to
write to such tags and can therefore create fully correct clones.
However, some special tags require a <b>special command sequence</b>
to put them into the state where writing to the manufacturer block is possible.
These tags will not work.
Remember this when you are shopping for special tags!
• This app will <i>NOT</i> work on some devices because
their hardware (NFC-controller) does not support Mifare Classic
( <a href="https://www.google.com/url?q=https://www.google.com/url?q%3Dhttps://github.com/ikarus23/MifareClassicTool/issues/1%26sa%3DD%26usg%3DAFQjCNH_aMyrd5PTedO7H4CyYXZQHpg37w&sa=D&usg=AFQjCNGYGRMX1T0DSBy16DLww6eXY5cSbQ" target="_blank">https://github.com/ikarus23/MifareClassicTool/issues/1</a> ).
You can find a list of unsupported devices here:
<a href="https://www.google.com/url?q=https://www.google.com/url?q%3Dhttps://github.com/ikarus23/MifareClassicTool%2523general-information%26sa%3DD%26usg%3DAFQjCNEFGeDb_4SgLf2tAaHAJ_1oSE2mZQ&sa=D&usg=AFQjCNE_Ri5mFz4HV8n1CcUJukpWqQuVAw" target="_blank">https://github.com/ikarus23/MifareClassicTool#general-information</a>
<b>LINKS</b>
• Project Page on github:
<a href="https://www.google.com/url?q=https://www.google.com/url?q%3Dhttps://github.com/ikarus23/MifareClassicTool%26sa%3DD%26usg%3DAFQjCNE6uC74ZUkx5a9ZnxBoq-XGvmDoNg&sa=D&usg=AFQjCNFJ-9M34r8V4LNk3Tjn4atXi3LgLQ" target="_blank">https://github.com/ikarus23/MifareClassicTool</a>
• MifareClassicTool on F-Droid:
<a href="https://www.google.com/url?q=https://www.google.com/url?q%3Dhttps://f-droid.org/repository/browse/?fdid%253Dde.syss.MifareClassicTool%26sa%3DD%26usg%3DAFQjCNGcgRVI2BIPTOqZmz8WPC-XZSMjcw&sa=D&usg=AFQjCNFfc5yhhlepaKrZN_BCJ8kK6ZzONw" target="_blank">https://f-droid.org/repository/browse/?fdid=de.syss.MifareClassicTool</a>
• Getting started & other help:
<a href="https://www.google.com/url?q=https://www.google.com/url?q%3Dhttps://github.com/ikarus23/MifareClassicTool%2523getting-started%26sa%3DD%26usg%3DAFQjCNEz04CtmkHQCeohMIfarzGkSQtOsg&sa=D&usg=AFQjCNEliTBsaTNn8g4L7OSfho9jYpXxoA" target="_blank">https://github.com/ikarus23/MifareClassicTool#getting-started</a>
• Bug tracker:
<b>IF YOU ENCOUNTER A PROBLEM PLEASE REPORT IT HERE</b>
<a href="https://www.google.com/url?q=https://www.google.com/url?q%3Dhttps://github.com/ikarus23/MifareClassicTool/issues%26sa%3DD%26usg%3DAFQjCNEFFWQ0tNlBzLYeqLSwCLOV1bP2_w&sa=D&usg=AFQjCNFD7V6BPjUi8vYO_6ERywtZcyDUQw" target="_blank">https://github.com/ikarus23/MifareClassicTool/issues</a>
• Additional stuff:
<a href="https://www.google.com/url?q=https://www.google.com/url?q%3Dhttp://publications.icaria.de/mct/%26sa%3DD%26usg%3DAFQjCNEAl0naeZgORNL6qXt6Gd2wZUtYZg&sa=D&usg=AFQjCNGJDC2VZXH8en9Pa1AtLandu5xwZw" target="_blank">http://publications.icaria.de/mct/</a>
• Thread at the Proxmark3 Forum:
<a href="https://www.google.com/url?q=https://www.google.com/url?q%3Dhttp://www.proxmark.org/forum/viewtopic.php?id%253D1535%26sa%3DD%26usg%3DAFQjCNGhUOxCUcBWf5Xntp53ZlKlrHSZug&sa=D&usg=AFQjCNGKgHGovyYKx8UZ_XrykHTxVm2sEQ" target="_blank">http://www.proxmark.org/forum/viewtopic.php?id=1535</a>
MIFARE is a registered trademark of NXP Semiconductors.
</div> <div jsname="WJz9Hc" style="display:none">这是一个Android NFC的应用为阅读,写作,分析等MIFARE经典的RFID标签。
<b>一般信息
此工具提供多种功能进行交互(和<b>只有的带)MIFARE经典的RFID标签。
它是专为谁拥有至少与MIFARE经典技术基本熟悉的用户。
┏━┫请仔细阅读┣━
┃Please阅读整个页面,并确保你的评价权之前得到的一切。谢谢!
┃If你不到4星评级,请发表评论为什么。这样我可以改善这个应用程序。
┃If你喜欢MCT请考虑购买捐赠的版本。
┗━
<b>功能
•读取MIFARE经典标签
•保存和编辑您读取标签数据
•写入MIFARE经典标签(逐块)
•克隆MIFARE经典标签
(标签到另一个标签中写入垃圾;写“转储明智')
•密钥管理基于字典的攻击
(写在一个文件中(字典你知道键)。
MCT将尝试与这些验证
针对各界键和阅读尽可能多的。)
•格式的标记恢复到出厂/交付状态
•写特殊的MIFARE经典标签的制造商Block
•创建,编辑和保存密钥文件(字典)
•解码和编码的Mifare经典值块
•解码和编码的Mifare经典准入条件
•比较转储(DIFF工具)
•显示通用标签信息
•显示标签数据所强调的十六进制
•显示标签数据作为7位US-ASCII
•显示MIFARE经典准入条件为表
•显示MIFARE经典超值块作为整
•在应用内(离线)帮助和信息
•它是开源(GPL第三版);)
<b>重要提示
一些重要的事情是:
•这个工具提供的功能非常基本。没有这样
花哨的东西像保存URL到RFID标签用一个好看的
图形用户界面。如果你想的那么保存在标签上的东西,
你要输入的原始十六进制数据。
•这个程序可以<i>不会破解/黑客
任何MIFARE经典按键。如果你想读/写RFID标签,你
需要为这个特定的标签第一项。有关其他信息
请阅读/看<i>使用从链接部分入门。
•将有<i>否];强力&QUOT;攻击
能力在本申请中。这是太缓慢,由于
到的协议。
•的第一个扇区的第一个块一个的<b>原始的
MIFARE经典标记为<b>只读,即不写。但是,
是<b>特殊的MIFARE经典支持写入标签
制造商块用一个简单的写命令。这个应用程序能够
写这样的标签,因此可以创建完全正确的克隆。
然而,一些特殊标签要求<b>特殊命令序列
将它们放到哪里写入厂家块的状态是可能的。
这些标签将无法工作。
记住这一点,当你购买特殊的标签!
•这个程序将<i>不会在某些设备上工作,因为
其硬件(NFC控制器)不支持MIFARE经典
(<a href="https://www.google.com/url?q=https://github.com/ikarus23/MifareClassicTool/issues/1&sa=D&usg=AFQjCNH_aMyrd5PTedO7H4CyYXZQHpg37w" target="_blank">https://github.com/ikarus23/MifareClassicTool/issues/1</a>)。
你可以在这里找到不支持的设备列表:
<a href="https://www.google.com/url?q=https://github.com/ikarus23/MifareClassicTool%23general-information&sa=D&usg=AFQjCNEFGeDb_4SgLf2tAaHAJ_1oSE2mZQ" target="_blank">https://github.com/ikarus23/MifareClassicTool#general-information</a>
<b>链接
•项目页面在GitHub上:
<a href="https://www.google.com/url?q=https://github.com/ikarus23/MifareClassicTool&sa=D&usg=AFQjCNE6uC74ZUkx5a9ZnxBoq-XGvmDoNg" target="_blank">https://github.com/ikarus23/MifareClassicTool</a>
•MifareClassicTool对F-Droid的:
<a href="https://www.google.com/url?q=https://f-droid.org/repository/browse/?fdid%3Dde.syss.MifareClassicTool&sa=D&usg=AFQjCNGcgRVI2BIPTOqZmz8WPC-XZSMjcw" target="_blank">https://f-droid.org/repository/browse/?fdid=de.syss.MifareClassicTool</a>
•入门及其他帮助:
<a href="https://www.google.com/url?q=https://github.com/ikarus23/MifareClassicTool%23getting-started&sa=D&usg=AFQjCNEz04CtmkHQCeohMIfarzGkSQtOsg" target="_blank">https://github.com/ikarus23/MifareClassicTool#getting-started</a>
•错误跟踪:
<b>如果您遇到问题,请告诉我们
<a href="https://www.google.com/url?q=https://github.com/ikarus23/MifareClassicTool/issues&sa=D&usg=AFQjCNEFFWQ0tNlBzLYeqLSwCLOV1bP2_w" target="_blank">https://github.com/ikarus23/MifareClassicTool/issues</a>
•其他的东西:
<a href="https://www.google.com/url?q=http://publications.icaria.de/mct/&sa=D&usg=AFQjCNEAl0naeZgORNL6qXt6Gd2wZUtYZg" target="_blank">http://publications.icaria.de/mct/</a>
•线程在Proxmark3论坛:
<a href="https://www.google.com/url?q=http://www.proxmark.org/forum/viewtopic.php?id%3D1535&sa=D&usg=AFQjCNGhUOxCUcBWf5Xntp53ZlKlrHSZug" target="_blank">http://www.proxmark.org/forum/viewtopic.php?id=1535</a>
MIFARE是NXP半导体公司的注册商标。
</b></b>
</i></b></b></b></b></i></i></i></b>
</b>
</b></b></div> <div class="show-more-end">