Skip to content

Instantly share code, notes, and snippets.

@reintakura
reintakura / Clone MiFare cards using chinesse UUID writable cards
Last active February 12, 2020 09:34 — forked from alphazo/gist:3303282
Clone MiFare cards using chinesse UUID writable cards
libnfc supports UUID writable cards and even has some dedicated tools for them.
However it doesn't work with some of the cards found on eBay that are even simpler to use. Sector 0 is unlocked and can be written without any additional commands. libnfc requires a small patch to get it working.
Following has been tested under ArchLinux with modified libnfc 1.5.1, mfoc 0.10.2 and a SCL3711 dongle.
## Patch & recompile libnfc
The patch is fairly simple, open libnfc-1.5.1/utils/nfc-mfclassic.c and comment 2 lines (it was lines 384 and 385 for me):
// Try to write the trailer
---DMESG OUTPUT---
[ 244.797140] usb 2-2.1: new full-speed USB device number 52 using uhci_hcd
[ 245.282971] usb 2-2.1: New USB device found, idVendor=04e6, idProduct=5591, bcdDevice= 2.07
[ 245.282975] usb 2-2.1: New USB device strings: Mfr=1, Product=2, SerialNumber=0
[ 245.282980] usb 2-2.1: Product: SCL3711-NFC&RW
[ 245.282982] usb 2-2.1: Manufacturer: SCM Micro
[ 245.529533] rfkill: input handler disabled
[ 245.740752] nfc: nfc_init: NFC Core ver 0.1
[ 245.740787] NET: Registered protocol family 39
[ 245.844747] usb 2-2.1: NFC: NXP PN533 firmware ver 2.7 now attached
$ echo -n "password" | openssl dgst -sha
80072568beb3b2102325eb203f6d0ff92f5cef8e
$ echo -n "password" | openssl dgst -sha1
5baa61e4c9b93f3f0682250b6cf8331b7ee68fd8
@reintakura
reintakura / mdxfind-is-awesome.txt
Created December 4, 2019 10:33 — forked from rumikotakahashi/mdxfind-is-awesome.txt
mdxfind-is-awesome.txt
# Courtesy MDXfind - https://hashes.org/mdxfind.php
$ echo -n 'password' | mdxfind -h ALL -h '!salt,!user' -z -f /dev/null -i 5 stdin 2>&1| fgrep password
MD5x01 5f4dcc3b5aa765d61d8327deb882cf99:password
MD5UCx02 3b73cca8b7d9d93a834631fb22769334:password
MD5UCx03 cfe84923ede1864f2e2799b8ff3f80a0:password
MD5UCx04 aaa0cc98c7dc4ab6fd12433f097107d9:password
MD5UCx05 55c2088741f794223bda2d09c4d61c75:password
MD4x01 8a9d093f14f8701df17732b2bb182c74:password
MD4x02 143409f027a6cfde772e3c97b126d9f5:password
MD4x03 b99ae7e24616cc845f20048074d4d415:password