Mifare Classic Plus - Hardnested Attack Implementation for LibNFC USB readers (SCL3711, ASK LoGO, etc)
Installation:
./miLazyCrackerFreshInstall.sh
Usage example: place a tag and enjoy
mkdir mydumps
cd mydumps
miLazyCracker
This tool is comprised of work from:
-
Aram Verstegen (https://github.com/aczid/crypto1_bs)
-
Carlo Meijer and Roel Verdult: (http://www.cs.ru.nl/~rverdult/Ciphertext-only_Cryptanalysis_on_Hardened_Mifare_Classic_Cards-CCS_2015.pdf)
-
Iceman Proxmark Branch: https://github.com/iceman1001/proxmark
-
Piwi Proxmark Branch - https://github.com/pwpiwi/proxmark3/tree/hard_nested
-
Blahpost Solver