miLazyCracker
Mifare Classic Plus - Hardnested Attack Implementation for LibNFC USB readers (SCL3711, ASK LoGO, etc)
Installation:
./miLazyCrackerFreshInstall.sh
Usage example: place a tag and enjoy
mkdir mydumps
cd mydumps
miLazyCracker
Possible issue:
error libnfc.driver.pn53x_usb Unable to set USB configuration (Device or resource busy)
Fix:
sudo modprobe -r pn533_usb
This tool is comprised of work from:
-
Aram Verstegen (https://github.com/aczid/crypto1_bs)
-
Carlo Meijer and Roel Verdult: (https://www.cs.ru.nl/~rverdult/Ciphertext-only_Cryptanalysis_on_Hardened_Mifare_Classic_Cards-CCS_2015.pdf)
-
Iceman Proxmark Branch: https://github.com/iceman1001/proxmark
-
Piwi Proxmark Branch - https://github.com/pwpiwi/proxmark3/tree/hard_nested
-
Blapost Solver