- 27
- 20 230
Tech Security Tools
เข้าร่วมเมื่อ 30 ม.ค. 2024
Welcome to Tech Security Tools, where Technology has no limits!
Proxmark3 RDV4.01
techsecuritytools.com/product/proxmark3-rdv4-01
Unboxing and setting up the Proxmark3 RDV4
Unboxing and setting up the Proxmark3 RDV4
มุมมอง: 130
วีดีโอ
Chameleon Ultra Mifare Classic
มุมมอง 49214 วันที่ผ่านมา
techsecuritytools.com/product/chameleon-ultra/ How to find Mifare keys using the Chameleon Ultra.
Chameleon Ultra Low Frequency
มุมมอง 954หลายเดือนก่อน
techsecuritytools.com/product/chameleon-ultra/ Using the Chameleon Ultra to emulate a Low Frequency EM410x tag.
NFC Technology (Mifare Access Control)
มุมมอง 3.2Kหลายเดือนก่อน
NFC Technology, High Frequency Mifare Classic Access Control, techsecuritytools.com DEFCON31 Conference: th-cam.com/video/1JT_lTfK69Q/w-d-xo.html For any questions: support@techsecuritytools.com
Program an RFID Ring
มุมมอง 1.3Kหลายเดือนก่อน
techsecuritytools.com/product/rfid-ring/ In this video we will show you how to program an RFID ring for the low frequency.
Understanding Low Frequency
มุมมอง 3.1K2 หลายเดือนก่อน
techsecuritytools.com In this video we show you everything you need to know in terms of low frequency and how to use the flipper zero and the proxmark3.
Ultimate Magic Gen 4 Overview
มุมมอง 1972 หลายเดือนก่อน
Overview of the features of the Ultimate Magic Gen 4 card. techsecuritytools.com
Understanding Antiviruses
มุมมอง 512 หลายเดือนก่อน
Understanding Antiviruses and the different plans and services they offer.
Chameleon Ultra unboxing and setting up
มุมมอง 4132 หลายเดือนก่อน
Unboxing and setting up the Chameleon Ultra.
Decrypt a Mifare Classic 1K
มุมมอง 8K3 หลายเดือนก่อน
The commands used to decrypt the Mifare Classic 1K: hf mf autopwn For rewritable UID cards visit techsecuritytools.com
Mifare Classic 1K Rewritable UID Gen 1a
มุมมอง 1293 หลายเดือนก่อน
Mifare Classic 1K Rewritable UID Gen 1a
How is it possible to hack it without having the key fob?
A number of attacks on the reader do exist
So flipper z can't decript the mf card?
Apparently now they have developed some attacks for the mifare keys on the flipper zero but we haven't tried them
Does the RDV4.01 do things that the 3 Easy can't ???
That's a really good question, the rdv4.01 is more performant as in for now in terms of capabilities the rdv4.01 can perform some attacks on a couple of specific tags that the easy can't. But for now the easy can still do almost all of the things the rdv4.01 can.
Wow I was looking at doing this on my own and I mind my business on TH-cam looking for nothing then BOOM. The AI stalking is real bro.
How can you emulate NFC-card, ISO 14443-4A (unknown)? How can i fix the unkown?
the proxmark3 gives you unknown? Try the h14 info command
Wow! I need to decrypt my Mifare Classic 1K tag, to proceed with cloning do you think that using the ACR122U NFC device could work for this mission?
hello, yes you should be able with an ACR122U using the linux libnfc library I believe there a command for that
This channel reads minds. I was looking at Magic 4k cards to buy right now
We have psychic powers aha
This video is shit.
TRY THE MOMENTUM FIRMEARE HAS MORE OPTIONS TO MODIFY THE MAGIC CARDS
I will give it a try, it looks really nice!
you can change the UID successfully with flipper zero, But what is more striking is that the SAK remains the same and does not change it and neither does the ATQ?
what program do you use to read and the different section of a card? please
the proxmark3 with the Iceman firmware
Looking forward to your video on UHF
I use iCopy XS whenever flipper runs into this problem. Saved me every time 💯
yeah the copy XS is probably the best and the most simple but it is expensive
there is a app for the flipper zero called" rfid detector" witch checks if it is nfc or rfid in tools
oh nice we will try it out, thanks for letting us know!
Great work! I learned a lot from this video. The proxmark3-easy seems to have its limits, e.g. with hard-nested mifare. The proxmark3 rdv4 can crack these, but is very expensive. Does anyone have experience with whether the Chameleon ultra can also crack hard-nested mifare or mifare plus? Any advice in this topic is apreciated.
The chameleon ultra should be able to crack the mifare, we will be doing a video on the chameleon ultra very soon given the fact that it can read and emulate mifare classic cards
🚀🚀
Nice 💯👍
thank you Mojo!
FOUND A RELIABLE BRAND TO BUY?
well the one used in this video, techsecuritytools.com/product/rfid-ring/
👍🏻
These are great videos with very helpful information, please never stop making them.
Thank you!! this is just the beginning better things yet to come!!
I really like your videos. Straight to the point and easy step by step guide. You deserve more subscribers. Got to love the rfid rings!
Thank you !!
Isildur’s Bane has been found!
Yes! ahahaha
Можно в 20 раз дешевле купить прибор для чтения и записи ключей
Чтение /запись это 0.00000000001 % Филипера возможностей! Где можно докупить 1000 дополнительных блоков для своих целей.
Nice love to see more 👍
Thank you, we are working on the iCLASS and iCODE, iCODE souldn't be a problem but the iCLASS SE is quite difficult but we will find a solution ahaha
What would you use this for
any task that is done repetitively can be automated, it is also used in penetration testing environment, we can write a script to open powershell and run commands on the target computer.
Hello, I hope all is well by you. I saw these on your website earlier today and came across this video doing research. Is there any chance you will sell these as a fob? I’d really like to get it as one. Cheers
hello, given the functionality we don't have any as a fob, do you have a particular tag that you want to duplicate, maybe theirs a fob for the particular tag you need, thank you