emsec / ChameleonMini

The ChameleonMini is a versatile contactless smartcard emulator compliant to NFC. The ChameleonMini was developed by https://kasper-oswald.de. The device is available at https://shop.kasper.it. For further information see the Getting Started Page https://rawgit.com/emsec/ChameleonMini/master/Doc/Doxygen/html/_page__getting_started.html or the Wiki tab above.
Other
1.72k stars 391 forks source link

Some Questions about the ChameleonMini #328

Open RealestReazon opened 1 year ago

RealestReazon commented 1 year ago

Hello everyone,

I am pretty new to the ChameleonMini and I am working on a project involving NFC right now. I still have some question regarding the functions of the ChameleonMini:

I am using Tera Term and I have 2 smart cards. The cards I used are: MIFARE DESFire EV2-J and ComSign digital signature card (eID) [I dont have any other information about the second card except the name]. I used the Chameleon as a reader and used the IDENTIFY command to identify them. The console gives me "Unknown Card type" but gives me the UID. I used the CLONE command after and the console says "Multiple possibilities, not clonable".

  1. Does that mean that I cannot clone the card or is there still a way to clone it?
  2. Would it be possible to clone it if I have the dump?
  3. If I have a NFC reader where you can register smartphones to unlock a door, is it possible to clone the smartphone with the Chameleon the same way like the smart cards?
  4. How do I know I have the right Firmware?
  5. Is there some sort of tutorial, to sniff the NFC traffic between a card or a smartphone and the reader? If yes how would you do that?

I heard that the DESfire cards are pretty much impossible to crack. Can someone who knows better maybe confirm this? That would be very helpful.

Thank you in advance to anyone. It would be a big help if anyone could help me in some way to get my project going :)