RDIF is used everywhere today from access control to purchasing food in the canteen, in vending machines or alike. The safety is often not sufficient on many of the cards so we decided to make a proof of concept on if it was possible to clone the most common used ones in Denmark with hardware that costs less than 100$. We spend them on a Raspberry Pi Zero W, a battery (not the one shown in the video but one for 10$ on ebay), an old ACR122U card reader and some empty "china cards" were we could write to sector0 . The Proxmark RDV 4.0 is in the video here used to emulate the writing a new (cloned) card We managed to run an offline nested attack (using the mfoc utility) and recover authentication keys from a MIFARE Classic guest card to our building on around 75 seconds using the Raspberry Pi and when the key to the card was known it only took 4 seconds ! It ended up being a very nice Redteam tool and we are planning to build the next-gen version of it on a Fitlet2 PC that most likely would run the /usr/bin/mfoc (to successfully crack the key) and clone the cards even faster Last but not least we were able to clone cards on up to 17 cm with this (a little better) RFID reader/antenna NB: To visualize the status of the reader and emulator we used Fit-statUSB sticks ( ) - just because it really looks nice :) #Proxmark #ACR122U #DL533n #RFID #CloningIDcards #Redteaming #Prowl #BlueShark #FID-Leds #Iceman











