LibNFC
apt install libnfc5 libnfc-dev
or from scratch
git clone https://github.com/nfc-tools/libnfc.git cd libnfc/ cp contrib/udev/93-pn53x.rules /lib/udev/rules.d/ apt install libusb-dev ./make_release.sh #autoreconf -vis ./configure --with-drivers=all make make install cd ../
Read your log and plug the ACR122U device, it gives
New USB device found, idVendor=072f, idProduct=2200, bcdDevice= 2.07 New USB device strings: Mfr=1, Product=2, SerialNumber=0 Product: ACR122U PICC Interface Manufacturer: ACS
Now check with
nfc-list -v
WATCH THE STANDARD OUTPUT and verify that all (default) keys where found
mfoc -O guest.card mfoc -O unknown.card mfoc -O chinese.card
Now you can look closer to the content
hexdump -vC guest.card | less hexdump -vC unknown.card | less hexdump -vC chinese.card |less
place original card
nfc-list -v
place chinese card, clone and re-check
nfc-list -v nfc-mfsetuid xxxxxxxx nfc-list
nfc-mfclassic -h
Using the ACS ACR122 NFC card reader under linux https://choffee.co.uk/posts/2015/01/nfc_reader_acr122_linux/
How to fix acr122’s and libnfc’s “Unable to claim USB interface” on Linux https://medium.com/@andv/how-to-fix-acr122s-and-libnfcs-unable-to-claim-usb-interface-on-kali-linux-932a34bb8e32
ACR122U NFC USB reader on Linux Mint https://oneguyoneblog.com/2016/11/02/acr122u-nfc-usb-reader-linux-mint/
Touchatag RFID Reader https://wiki.archlinux.org/index.php/Touchatag_RFID_Reader
Drivers for ACR122U https://www.acs.com.hk/en/driver/3/acr122u-usb-nfc-reader/
Part 1: RFID Kit https://www.fuzzysecurity.com/tutorials/rfid/1.html
A simple tool to read/write Mifare RFID tags with an ACR122U device https://github.com/mdeverdelhan/ACR122U-reader-writer
nfc-tools/mfoc https://github.com/nfc-tools/mfoc
jellyjellyrobot/osx_mifare_install.sh https://gist.github.com/jellyjellyrobot/313b99f9f6534f10dafd9fa9d9a9984f
ACR122U, mfcuk, and mfoc: Cracking MIFARE Classic on Arch Linux https://linuskarlsson.se/blog/acr122u-mfcuk-and-mfoc-cracking-mifare-classic-on-arch-linux/
Cracking Mifare Classic NFC cards using the hardnested attack https://medium.com/@decrocksam/cracking-mifare-classic-nfc-cards-using-the-hardnested-attack-506aab3ea305
How to hack Mifare Classic NFC cards https://medium.com/@lp1/how-to-hack-mifare-classic-nfc-cards-69c8edcbe1e7
How to Crack Mifare Classic Cards https://firefart.at/post/how-to-crack-mifare-classic-cards/
Cloning a MIFARE Classic 1k https://mathieu.daitauha.fr/nfc-mifare-classic-1k/
gistfile1.md https://gist.github.com/alphazo/3303282
Know your magic cards https://lab401.com/blogs/academy/know-your-magic-cards
[WIP] List of uid changeable cards http://www.proxmark.org/forum/viewtopic.php?id=6545