This is an Android NFC-App for reading, writing, analyzing, etc. MIFARE® Classic RFID-Tags.
<b>GENERAL INFORMATION</b>
This tool provides several features to interact with (and <b>only</b> with) MIFARE Classic RFID-Tags.
It is designed for users who have at least basic familiarity with the MIFARE Classic technology.
┏━┫ PLEASE READ ┣━
┃Please read the whole page and make sure you got everything right before rating. Thank you!
┃If you rate with less then 4 stars, please leave a comment why. This way I can improve this app.
┃If you like MCT please consider to buy the donate version.
┗━
<b>FEATURES</b>
• Read MIFARE Classic tags
• Save and edit the tag data you read
• Write to MIFARE Classic tags (block-wise)
• Clone MIFARE Classic tags
(Write dump of a tag to another tag; write 'dump-wise')
• Key management based on dictionary-attack
(Write the keys you know in a file (dictionary).
MCT will try to authenticate with these
keys against all sectors and read as much as possible.)
• Format a tag back to the factory/delivery state
• Write the manufacturer block of special MIFARE Classic tags
• Create, edit and save key files (dictionaries)
• Decode & Encode MIFARE Classic Value Blocks
• Decode & Encode MIFARE Classic Access Conditions
• Compare dumps (Diff Tool)
• Display generic tag information
• Display the tag data as highlighted hex
• Display the tag data as 7-Bit US-ASCII
• Display the MIFARE Classic Access Conditions as a table
• Display MIFARE Classic Value Blocks as integer
• In-App (offline) help and information
• It's open source (GPLv3) ;)
<b>IMPORTANT NOTES</b>
Some important things are:
• The features this tool provides are very basic. There are no such
fancy things like saving a URL to an RFID-Tag with a nice looking
graphical user interface. If you want so save things on a tag,
you have to input the raw hexadecimal data.
• This App can <i>NOT crack/hack</i>
any MIFARE Classic keys. If you want to read/write an RFID-Tag, you
need keys for this specific tag first. For additional information
please read/see <i>Getting Started</i> from the links section.
• There will be <i>no "brute-force" attack</i>
capability in this application. It is way too slow due
to the protocol.
• The first block of the first sector of an <b>original</b>
MIFARE Classic tag is <b>read-only</b> i.e. not writable. But there
are <b>special</b> MIFARE Classic tags that support writing to the
manufacturer block with a simple write command. This App is able to
write to such tags and can therefore create fully correct clones.
However, some special tags require a <b>special command sequence</b>
to put them into the state where writing to the manufacturer block is possible.
These tags will not work.
Remember this when you are shopping for special tags!
• This app will <i>NOT</i> work on some devices because
their hardware (NFC-controller) does not support MIFARE Classic
( https://github.com/ikarus23/MifareClassicTool/issues/1 ).
You can find a list of unsupported devices here:
https://github.com/ikarus23/MifareClassicTool#general-information
<b>LINKS</b>
• Project Page on github:
https://github.com/ikarus23/MifareClassicTool
• MIFARE Classic Tool on F-Droid:
https://f-droid.org/repository/browse/?fdid=de.syss.MifareClassicTool
• Getting started & other help:
https://github.com/ikarus23/MifareClassicTool#getting-started
• Bug tracker:
<b>IF YOU ENCOUNTER A PROBLEM PLEASE REPORT IT HERE</b>
https://github.com/ikarus23/MifareClassicTool/issues
• Additional stuff:
http://publications.icaria.de/mct/
• Thread at the Proxmark3 Forum:
http://www.proxmark.org/forum/viewtopic.php?id=1535
MIFARE® is a registered trademark of NXP Semiconductors.</br>
</br></br></br></br></br></br></br></br></br></br></br></br></br></br>
</br></br></br></br></br></br></br></br></br></br></br></br></br></br></br></br></br></br></br></br></br></br></br></br></br></br></br>
</br></br></br></br></br></br></br></br></br></br></br></br></br></br></br></br></br></br></br></br></br></br></br>
</br></br></br></br></br>
</br></br></br>