-
Notifications
You must be signed in to change notification settings - Fork 21
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Help with PDOL challenge #5
Comments
If you got the pdol from the acr122 means that you got the track 2 as well. Just add the track 2 to the token variable. There is an example in the code such as char token[19] = {0x44,0x12,0x34,0x15,0x01,0x12,0x03,0x12,0xd2,0x41,0x12,0x01,0x10,0x12,0x09,0x99,0x99,0x99,0x1f}; and then emulate it. |
Thank you for your reply, yes I can use it. But what’s the point in having bought the nfc copy cat with the ability to extract it through the pn 352 if I have to use another device? How can I successfully use the copy cat? Is there a pdf or document that explains the process? |
The PDOL function was designed to challenge the card, to be able to extract track 2, NFC Copy Cat has to send the correct challenge at least in format to the card. That is what PDOL does. Basically it generates the "GET PROCESSING OPTIONS" command in format, so the card can answer with the track 2 Really you do not have to edit the code to work; this code is ready to use, if you press a button and it will spoof data, if you press the second one, it will try yo read the card automatically. If you want to learn about what is pdol: https://www.emvco.com/wp-content/uploads/2017/05/EMV_v4.3_Book_3_Application_Specification_20120607062110791.pdf If you want to learn more about the tool: https://salmg.net/2020/04/13/nfc-copy-cat-magstripe-nfc/ or |
Thank you! I will read all I can to understand the communication with the card. 9.934 -> Command: 0x00 0xA4 0x04 0x00 0x0E 0x32 0x50 0x41 0x59 0x2E 0x53 0x59 0x53 0x2E 0x44 0x44 0x46 0x30 0x31 0x00 I’ve compared with cardpeek, the commands sent are the same. Copy cat gets error responses for some reason. |
Any insight regarding the pdol check? |
After reading most of the documents I found. I’m realizing that the script is fine. There is a communication error somewhere. The PN532 board is unreliable, it recognizes the board 1 out of 30 times. Honestly guy, this is supposed to be for students and people that want to learn? Just take the money and run type of mentality. Pay 120$ with shipping for a 3$ elechouse pn532 and a MagSpoof that doesn’t work. I’m disappointed |
Hi @merdeux50 im really sorry about the timming on answering your issue, i must say our technical team is quite small and we're now focused on a new product, The Hunter Cat NFC we have noticed on the past the problem with the PN532 board sometimes it works in a bad way, talking in other topic, the maspoof should work as thats something that we always test on our product line |
I noticed a crucial thing missing from your wiki which solved most of my issues. I was using the Adafruit PN532 library, I changed it to salm pn532 library and it works better now. |
Hello,
I’ve recently gotten a nfc copy cat and am struggling to understand how to run the read_replay_spoof .ino
could someone please clarify what “ Make a right format challenge using the card PDOL to extract more data(track 2)” means? And how I should go editing the ino?
ive successfully got my cards pdol with the acr122 and cardpeek what next?
The text was updated successfully, but these errors were encountered: