BREAKMEIFYOUCAN! - Exploiting Keyspace Reduction and Relay Attacks in 3DES and AES-protected NFC Technologies

Exploiting Keyspace Reduction and Relay Attacks in 3DES and AES-protected NFC Technologies. Reducing 2TDEA keyspace from 2¹¹² to 2²⁸ through partial key overwrites and relay attacks.

BREAKMEIFYOUCAN!

@alan

Not any new app I've written, but both #MiFare classic and #NTAG formats can carry an #NDEF payload; there are many different payloads two of which are WiFi connections and contact cards. NTAG is usually the better choice as it is almost universally readable whereas only certain Android phones can read MiFare tags.

Easiest way to do this is score some writable NTAG cards/chips and use NFC Tools (app) on your phone to write the payload. Read and emulate the tag you write on Flipper :)