<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.yobi.be/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Pablos</id>
	<title>YobiWiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.yobi.be/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Pablos"/>
	<link rel="alternate" type="text/html" href="https://wiki.yobi.be/index.php?title=Special:Contributions/Pablos"/>
	<updated>2026-04-30T20:33:51Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.43.8</generator>
	<entry>
		<id>https://wiki.yobi.be/index.php?title=RFID&amp;diff=6047</id>
		<title>RFID</title>
		<link rel="alternate" type="text/html" href="https://wiki.yobi.be/index.php?title=RFID&amp;diff=6047"/>
		<updated>2009-12-22T17:52:50Z</updated>

		<summary type="html">&lt;p&gt;Pablos: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==RFID readers==&lt;br /&gt;
===pcscd===&lt;br /&gt;
Is the Linux daemon to access readers compatible with the PC/SC standard.&lt;br /&gt;
&amp;lt;br&amp;gt;To dump the readers list supported by libccid of your pcscd install:&lt;br /&gt;
&amp;lt;source lang=bash&amp;gt;&lt;br /&gt;
 cat /etc/libccid_Info.plist|gawk &#039;&lt;br /&gt;
    /ifdVendorID/{&lt;br /&gt;
        mode=1&lt;br /&gt;
    }&lt;br /&gt;
    /ifdProductID/{&lt;br /&gt;
        mode=2&lt;br /&gt;
    }&lt;br /&gt;
    /ifdFriendlyName/{&lt;br /&gt;
        mode=3&lt;br /&gt;
    }&lt;br /&gt;
    {&lt;br /&gt;
        inarray=0&lt;br /&gt;
    }&lt;br /&gt;
    /&amp;lt;array&amp;gt;/{&lt;br /&gt;
        i=0&lt;br /&gt;
    }&lt;br /&gt;
    /&amp;lt;array&amp;gt;/,/&amp;lt;\/array&amp;gt;/{&lt;br /&gt;
        inarray=1&lt;br /&gt;
    }&lt;br /&gt;
    /string/&amp;amp;&amp;amp;inarray{&lt;br /&gt;
        match($0,/&amp;lt;string&amp;gt;(.*)&amp;lt;\/string&amp;gt;/,a);&lt;br /&gt;
        t[mode i]=a[1]; &lt;br /&gt;
        i++&lt;br /&gt;
    }&lt;br /&gt;
    END{&lt;br /&gt;
        for (j=0;j&amp;lt;i;j++) &lt;br /&gt;
            print t[1 j]&amp;quot;:&amp;quot;t[2 j], t[3 j]&lt;br /&gt;
    }&#039;&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Parallax===&lt;br /&gt;
* http://www.makezine.com/06/theorypractice/ =&amp;gt; See MAKE n6&lt;br /&gt;
* [http://www.gumbolabs.org/2009/10/17/parallax-rfid-reader-arduino/ Using it with an Arduino]&lt;br /&gt;
&lt;br /&gt;
===[http://www.openpcd.org/ OpenPCD]===&lt;br /&gt;
===[http://www.acs.com.hk/acr122.php ACR122U]===&lt;br /&gt;
====Intro====&lt;br /&gt;
based on PN532&lt;br /&gt;
* [http://www.nfc-reader.com/acr122-document.php docs]&lt;br /&gt;
** ISO/IEC18092 (NFC) compliant&lt;br /&gt;
** NFC Tags Access Speed = 212 kbps&lt;br /&gt;
** Support FeliCa card&lt;br /&gt;
** Support ISO 14443 Type A &amp;amp; B cards&lt;br /&gt;
** MIFARE® cards (Classics, DESFire)&lt;br /&gt;
** SAM Socket (optional)&lt;br /&gt;
&lt;br /&gt;
* To get the Firmware version string in command line: (actual string here is &amp;quot;ACR122U203&amp;quot; as the last 2 bytes are not SW1/SW2 but part of the string)&lt;br /&gt;
 $ opensc-tool -s FF00480000&lt;br /&gt;
 Sending: FF 00 48 00 00.&lt;br /&gt;
 Received (SW1=0x30, SW2=0x33):&lt;br /&gt;
 41 43 52 31 32 32 55 32 ACR122U2&lt;br /&gt;
&lt;br /&gt;
You can also use scriptor:&lt;br /&gt;
 $ echo ff00480000|scriptor           &lt;br /&gt;
 No reader given: using ACS ACR122U PICC Interface 00 00&lt;br /&gt;
 Using T=1 protocol&lt;br /&gt;
 Reading commands from STDIN&lt;br /&gt;
 &amp;gt; ff 00 48 00 00 &lt;br /&gt;
 &amp;lt; 41 43 52 31 32 32 55 32 30 33 : Error not defined by ISO 7816&lt;br /&gt;
&lt;br /&gt;
If you get the following error:&lt;br /&gt;
 Can&#039;t allocate Chipcard::PCSC::Card object: No smartcard inserted.&lt;br /&gt;
that&#039;s because you&#039;ve a model without SAM support. Place a tag on the reader and try again, it should work.&lt;br /&gt;
&lt;br /&gt;
So that&#039;s where a lot of confusion comes into play: the two models behave very differently! See below&lt;br /&gt;
&amp;lt;br&amp;gt;Note that [http://www.libnfc.org/hardware/devices/acr122 this site] points out that it also corresponds to a difference of firmware versions&lt;br /&gt;
&lt;br /&gt;
====ACR122U-SAM====&lt;br /&gt;
* With SAM slot&lt;br /&gt;
* [http://www.acs.com.hk/drivers-manual.php?driver=ACR122SAM Windows drivers &amp;amp; API docs]&lt;br /&gt;
Usage:&lt;br /&gt;
* When there is a SAM inserted, ATR shown is the ATR of the SAM&lt;br /&gt;
* When there is no SAM inserted, ATR shown is a pseudo-ATR = 3B 00&lt;br /&gt;
* So for PCSC there is always a &amp;quot;card inserted&amp;quot;&lt;br /&gt;
* APDUs are sent to SAM&lt;br /&gt;
* To send APDUs to a contactless card, you &#039;&#039;must&#039;&#039; wrap them into pseudo-APDUs (FF 00 00 00 ...)&lt;br /&gt;
* To send special APDUs to the reader (to get fw or to control LEDs), just send them&lt;br /&gt;
&lt;br /&gt;
Some more infos [http://hackerati.com/post/57314994/rfid-on-the-cheap-hacking-tikitag here] about the Tikitag&lt;br /&gt;
&amp;lt;br&amp;gt;Some more [http://www.libnfc.org/hardware/pn53x-chip here]&lt;br /&gt;
&lt;br /&gt;
====ACR122U PICC====&lt;br /&gt;
* Without SAM slot&lt;br /&gt;
* [http://www.acs.com.hk/drivers-manual.php?driver=ACR122 Windows drivers &amp;amp; API docs]&lt;br /&gt;
Usage:&lt;br /&gt;
* When there is a contactless card, ATR shown is the ATR of the card&lt;br /&gt;
* When there is no contactless card, no ATR&lt;br /&gt;
* So for PCSC there is a &amp;quot;card inserted&amp;quot; if there is a contactless card&lt;br /&gt;
* APDUs are sent directly to the contactless card, which makes this reader fully transparent in this mode&lt;br /&gt;
* To send APDUs to a contactless card, you can also wrap them into pseudo-APDUs (FF 00 00 00 ...)&lt;br /&gt;
* To send special APDUs to the reader (to get fw or to control LEDs)&lt;br /&gt;
** If there is a contactless card, just send the APDUs&lt;br /&gt;
** If there is no contactless card, the CCID Escape command must be used (*)&lt;br /&gt;
&lt;br /&gt;
(*) Here is one small example how to use the Escape command:&lt;br /&gt;
&amp;lt;source lang=python&amp;gt;&lt;br /&gt;
#!/usr/bin/python&lt;br /&gt;
from smartcard.scard import *&lt;br /&gt;
hresult, hcontext = SCardEstablishContext( SCARD_SCOPE_USER )&lt;br /&gt;
hresult, hcard, dwActiveProtocol = SCardConnect(&lt;br /&gt;
hcontext, &#039;ACS ACR122U PICC Interface 00 00&#039;, SCARD_SHARE_DIRECT, SCARD_PROTOCOL_T0 )&lt;br /&gt;
IOCTL_SMARTCARD_VENDOR_IFD_EXCHANGE = SCARD_CTL_CODE(1)&lt;br /&gt;
CMD = [0xFF, 0x00, 0x48, 0x00, 0x00]&lt;br /&gt;
hresult, response = SCardControl( hcard, IOCTL_SMARTCARD_VENDOR_IFD_EXCHANGE, CMD )&lt;br /&gt;
if hresult!=SCARD_S_SUCCESS:&lt;br /&gt;
     raise error, &#039;Failed to control: &#039; + SCardGetErrorMessage(hresult)&lt;br /&gt;
print &#039;&#039;.join([chr(i) for i in response])&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
This requires also to allow libccid to use the Escape command, you&#039;ve to set bit 0 of ifdDriverOptions in /etc/libccid_Info.plist to 1:&lt;br /&gt;
        &amp;lt;key&amp;gt;ifdDriverOptions&amp;lt;/key&amp;gt;&lt;br /&gt;
        &amp;lt;string&amp;gt;0x0001&amp;lt;/string&amp;gt;&lt;br /&gt;
        Possible values for ifdDriverOptions&lt;br /&gt;
        1: DRIVER_OPTION_CCID_EXCHANGE_AUTHORIZED&lt;br /&gt;
                the CCID Exchange command is allowed. You can use it through&lt;br /&gt;
                SCardControl(hCard, IOCTL_SMARTCARD_VENDOR_IFD_EXCHANGE, ...)&lt;br /&gt;
&lt;br /&gt;
In case libccid refuses with a&lt;br /&gt;
 Firmware (x.xx) is bogus! Upgrade the reader firmware or get a new reader.&lt;br /&gt;
you can force it by setting the third bit (0x04) of ifdDriverOptions in /etc/libccid_Info.plist to 1&lt;br /&gt;
        &amp;lt;key&amp;gt;ifdDriverOptions&amp;lt;/key&amp;gt;&lt;br /&gt;
        &amp;lt;string&amp;gt;0x0005&amp;lt;/string&amp;gt;&lt;br /&gt;
        Possible values for ifdDriverOptions&lt;br /&gt;
        1: DRIVER_OPTION_CCID_EXCHANGE_AUTHORIZED&lt;br /&gt;
                the CCID Exchange command is allowed. You can use it through&lt;br /&gt;
                SCardControl(hCard, IOCTL_SMARTCARD_VENDOR_IFD_EXCHANGE, ...)&lt;br /&gt;
        4: DRIVER_OPTION_USE_BOGUS_FIRMWARE &lt;br /&gt;
                Some reader firmwares have bugs. By default the driver refuses &lt;br /&gt;
                to work with such firmware versions. If your reader is rejected&lt;br /&gt;
                because of the firmware (log message: &amp;quot;Firmware (x.y) is &lt;br /&gt;
                bogus!&amp;quot;) you can: &lt;br /&gt;
                - activate this option but you will have problems depending on the bug&lt;br /&gt;
&lt;br /&gt;
===Pegoda===&lt;br /&gt;
* See &amp;lt;nowiki&amp;gt;http://www.nxp.com/#/pip/pip=[pfp=41960]|pp=[t=pfp,i=41960]&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
===[http://www.nfc-global.com/nfc_global/nfc_products/adra.php Arygon ADRA]===&lt;br /&gt;
based on PN531&lt;br /&gt;
&lt;br /&gt;
Supported Standards:&lt;br /&gt;
* ISO18092 ( NFC transport protocol)&lt;br /&gt;
* Sony FeliCa&lt;br /&gt;
* NXP Mifare ® family&lt;br /&gt;
* compliant to ISO14443A, ISO14443A – 4 (T=CL)&lt;br /&gt;
Communication protocol:&lt;br /&gt;
* ARYGON (HL - high level language), TAMA (LL - low level language)&lt;br /&gt;
** To send TAMA frames, send an ascii &#039;2&#039; as first char, e.g. to get firmware of the PN531:&lt;br /&gt;
 0x32 0x00 0x00 0xFF 0x02 0xFE 0xD4 0x02 0x2A 0x00&lt;br /&gt;
 =&amp;gt;&lt;br /&gt;
 0x00 0x00 0xFF 0x00 0xFF 0x00 (TAMA ACK)&lt;br /&gt;
 0x00 0x00 0xFF 0x04 0xFC 0xD5 0x03 0x02 0x02 0x24 0x00 (TAMA v=2.2)&lt;br /&gt;
&lt;br /&gt;
 echo 32 00 00 ff 02 fe d4 02 2a 00|xxd -p -r|socat - /dev/ttyUSB0|xxd -p&lt;br /&gt;
 0000ff00ff000000ff04fcd50304022200&lt;br /&gt;
&lt;br /&gt;
Baud rate (passive/active):&lt;br /&gt;
* 106 kBaud, 212 kBaud, up to 424 kBaud&lt;br /&gt;
* USB, seen as a serial port&lt;br /&gt;
&lt;br /&gt;
===PN531===&lt;br /&gt;
* Official site: &amp;lt;nowiki&amp;gt;http://www.nxp.com/#/pip/pip=[pfp=53424]|pp=[t=pfp,i=53424]&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
* [http://www.google.com/search?q=pn531+transmission+module Short Form Specification, Near Field Communication PN531 µ-based Transmission module]&lt;br /&gt;
&lt;br /&gt;
The PN531 is capable of speaking directly USB so there exist readers consisting simply of the PN531 wired to your Pc via USB.&lt;br /&gt;
&amp;lt;br&amp;gt;In that case, the vendorID/productID will be either 04CC:0531 or 054c:0193&lt;br /&gt;
&lt;br /&gt;
Apparently the following products are like that:&lt;br /&gt;
* [http://www.scmmicro.com/scl3710/ SCL3710] by SCM Microsystems&lt;br /&gt;
* [http://www.snapper.co.nz/ Snapper], see also discussion [http://www.proxmark.org/forum/post/189/#p189 here]&lt;br /&gt;
===PN533===&lt;br /&gt;
* Official site: &amp;lt;nowiki&amp;gt;http://www.nxp.com/#/pip/pip=[pfp=53424]|pp=[t=pfp,i=53424]&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The PN531 is capable of speaking directly USB so there exist readers consisting simply of the PN531 wired to your Pc via USB.&lt;br /&gt;
&amp;lt;br&amp;gt;vendorID/productID may vary, e.g. 04CC:2533 or for SCL3711: 04E6:5591&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The following products are embodiments of a PN533:&lt;br /&gt;
* [http://www.scmmicro.com/en/products-services/smart-card-readers-terminals/contactless-dual-interface-readers/scl3711.html SCL3711] by SCM Microsystems&lt;br /&gt;
&lt;br /&gt;
===[http://www.omnikey.com/?id=products&amp;amp;tx_okprod_pi1%5bproduct%5d=41 Omnikey 5321]===&lt;br /&gt;
* [http://www.omnikey.com/fileadmin/Documents/OK5321_Datasheet.pdf datasheet]&lt;br /&gt;
* ISO 14443 A/B and 15693 ( up to 848 Kbps in the fastest ISO 14443 transmission mode)&lt;br /&gt;
* APIs: PC/SC, Synchronous-API (on top of PC/SC), OCF (Open Card Framework) or CT-API&lt;br /&gt;
* contactless smartcards supported:&lt;br /&gt;
** HID: iCLASS®&lt;br /&gt;
** NXP: MIFARE®, DESFire®, SMART-MX and ICODE&lt;br /&gt;
** Texas Instruments: TagIT®&lt;br /&gt;
** ST Micro: x-ident, SR 176, SR 1X 4K&lt;br /&gt;
** Infineon: My-d (in secure mode UID only)&lt;br /&gt;
** Atmel: AT088RF020&lt;br /&gt;
** KSW MicroTech: KSW TempSens&lt;br /&gt;
** iCODE SLI, iCODE SL2 &amp;amp; LRI 64&lt;br /&gt;
** Contactless 2048 bit key generation in RSA mode (JCOP / SMART-MX)&lt;br /&gt;
&lt;br /&gt;
Installing OmniKey reader under linux:&lt;br /&gt;
&lt;br /&gt;
There are drivers [http://omnikey.aaitg.com/index.php?id=69 here]&lt;br /&gt;
&lt;br /&gt;
But there is also a Debian package pcsc-omnikey&lt;br /&gt;
&amp;lt;br&amp;gt;Warning! Don&#039;t install it or it will remove libccid!!&lt;br /&gt;
&amp;lt;br&amp;gt;It&#039;s better to keep libccid if needed for other readers and install the missing RFID driver by hand: (here on a 64-bit platform)&lt;br /&gt;
 aptitude download pcsc-omnikey&lt;br /&gt;
 dpkg -x pcsc-omnikey_1%3a2-4_amd64.deb .&lt;br /&gt;
 cp -a usr/lib/pcsc/drivers/ifdokrfid_lnx_x64-2.6.0.bundle /usr/lib/pcsc/drivers/&lt;br /&gt;
&lt;br /&gt;
See [http://www.hidglobal.com/faqs.php?techCat=19 here]: you need also to recompile pcscd with libusb:&lt;br /&gt;
 ./configure --disable-libhal --enable-libusb&lt;br /&gt;
To do it by repackaging the Debian pcscd:&lt;br /&gt;
 aptitude install libusb-dev&lt;br /&gt;
 apt-get source pcscd&lt;br /&gt;
 apt-get build-dep pcscd&lt;br /&gt;
&lt;br /&gt;
&amp;lt;source lang=diff&amp;gt;&lt;br /&gt;
--- debian/rules        2009-01-14 13:54:42.000000000 +0100&lt;br /&gt;
+++ debian/rules        2009-01-14 13:46:56.000000000 +0100&lt;br /&gt;
@@ -38,6 +38,8 @@&lt;br /&gt;
        dh_testdir&lt;br /&gt;
        # we add LDFLAGS=&amp;quot;-lpthread&amp;quot; for bug #253629&lt;br /&gt;
        ./configure $(confflags) \&lt;br /&gt;
+               --disable-libhal \&lt;br /&gt;
+               --enable-libusb \&lt;br /&gt;
                --sysconfdir=/etc \&lt;br /&gt;
                --prefix=/usr \&lt;br /&gt;
                --enable-usbdropdir=/usr/lib/pcsc/drivers \&lt;br /&gt;
&amp;lt;/source&amp;gt;&lt;br /&gt;
Then&lt;br /&gt;
 dpkg-buildpkg -uc -us&lt;br /&gt;
&lt;br /&gt;
To launch the modified pcsc in foreground, showing ADPUs and debug info: (here pcscd was installed in /usr/local/bin/pcscd-libusb)&lt;br /&gt;
 pcscd-libusb -f -a -d&lt;br /&gt;
&lt;br /&gt;
===Others===&lt;br /&gt;
* [http://www.netronix.pl/index_en.php Netronix]: producer of RFID readers for Unique, Mifare, Q5,Hitag, I-code transponders.&lt;br /&gt;
* [http://www.elektor.fr/products/kits-modules/modules-(-9x)/elektor-rfid-reader-(060132-91).91440.lynkx kit from Elektor] and a [http://81.56.186.109/ELEKTOR/RFID_EXPERIMENTAL.html user experience] (fr)&lt;br /&gt;
* [http://www.velleman.be/be/en/product/view/?id=379238 Proximity card reader kit] by Velleman, supporting [http://www.priority1design.com.au/em4100_protocol.html EM4100 protocol]&lt;br /&gt;
* [http://instruct1.cit.cornell.edu/courses/ee476/FinalProjects/s2006/cjr37/Website/index.htm 100% home-made 125kHz reader]&lt;br /&gt;
* [http://www.icarte.ca iCarte 110]: &#039;&#039;As a MFi (Made for iPod/iPhone) accessory attaching to the bottom connector of the iPhone, the iCarte™ turns the iPhone into an NFC phone as well as an RFID Reader/Writer&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==Other Hardware Tools==&lt;br /&gt;
===RFID killers===&lt;br /&gt;
* http://www.acbm.com/inedits/rfid.html (French)&lt;br /&gt;
* [http://globalguerrillas.typepad.com/globalguerrillas/2006/01/weapons_the_rfi.html WEAPONS: The RFID zapper]&lt;br /&gt;
* [https://events.ccc.de/congress/2005/static/r/f/i/RFID-Zapper(EN)_77f3.html RFID-Zapper(EN)]&lt;br /&gt;
* [http://www.rfidwasher.com/index.php RFIDwasher], if not hoax...&lt;br /&gt;
* [http://www.tagzapper.com/ TagZapper], if not hoax...&lt;br /&gt;
&lt;br /&gt;
===RFID skimmers===&lt;br /&gt;
* [http://www.schneier.com/blog/archives/2006/06/build_your_own.html Build Your Own RFID Skimmer]&lt;br /&gt;
* [http://www.eng.tau.ac.il/~yash/kw-usenix06/index.html How to Build a Low-Cost, Extended-Range RFID Skimmer]&lt;br /&gt;
* [http://www.openpcd.org/rfiddump.0.html RFIDDump]&lt;br /&gt;
* [http://blog.didierstevens.com/2009/05/19/another-lowcost-rfid-detector/ Another low-cost RFID detector]: using a BasicCard&lt;br /&gt;
* [http://rfid.marcboon.com/ RFID sniffer], cheap hardware just to tell you if it&#039;s a 13.26MHz tag or not, can be bought [http://shop.marcboon.com/ here]&lt;br /&gt;
&lt;br /&gt;
===RFID emulators===&lt;br /&gt;
====[http://www.openpcd.org/openpicc.0.html OpenPICC]====&lt;br /&gt;
* [http://wiki.openpcd.org/wiki/OpenPICC wiki]&lt;br /&gt;
* Flashing:&lt;br /&gt;
Use ARM toolchain, e.g. [http://www.mikrocontroller.net/download/arm-toolchain-linux-2.tar.bz2], add arm/bin/ to the path&lt;br /&gt;
 svn co -r432 http://svn.openpcd.org/branches/sniffonly/openpicc/&lt;br /&gt;
 cd openpicc&lt;br /&gt;
 make&lt;br /&gt;
You may try later revision but at least r432 is compiling and working.&lt;br /&gt;
&amp;lt;br&amp;gt;If you don&#039;t get a /dev/usbTTYx to flash the beast, load the driver by hand:&lt;br /&gt;
 modprobe -r usbserial&lt;br /&gt;
 modprobe usbserial vendor=0x03EB product=0x6124&lt;br /&gt;
If ./at91flash_automatic openpicc.bin failed, edit at91flash =&amp;gt; /dev/ttyUSB0 then&lt;br /&gt;
 ./at91flash openpicc.bin&lt;br /&gt;
Unplus &amp;amp; replug, you&#039;ll get a /dev/ttyACM0&lt;br /&gt;
* Using:&lt;br /&gt;
Whatever talking serial:&lt;br /&gt;
 socat - /dev/ttyACM0,raw,echo=0,crnl,b115200 &lt;br /&gt;
&lt;br /&gt;
 cu -l /dev/ttyACM0 -s 115200 &lt;br /&gt;
&lt;br /&gt;
 screen /dev/ttyACM0 115200 &lt;br /&gt;
h for help, f for field strength measure&lt;br /&gt;
&amp;lt;br&amp;gt;To sniff raw data, you&#039;ve to convert the hexadecimal stream if you want to display it, e.g. with&lt;br /&gt;
 (echo r;cat)|socat - /dev/ttyACM0,raw,echo=0,crnl,b115200 |xxd&lt;br /&gt;
Note that you can still send commands to the OpenPICC, e.g. &amp;quot;r&amp;quot; to stop sniffing, CTRL-D to quit&lt;br /&gt;
&amp;lt;br&amp;gt;To sniff and get decoded frames (from reader only, for tag you would need a OpenPCD)&lt;br /&gt;
 svn co -r432 http://svn.openpcd.org/branches/sniffonly/host/&lt;br /&gt;
 cd host&lt;br /&gt;
 make&lt;br /&gt;
Usage:&lt;br /&gt;
 ./openpicc-sniff-14443a /dev/ttyACM0&lt;br /&gt;
To get just the raw stream:&lt;br /&gt;
 ./openpicc-sniff-14443a /dev/ttyACM0|cut -c 50-|sed &#039;s/\([0-9A-F]\+\) [01]!\? */\1/g&#039;&lt;br /&gt;
* Using under Windows:&lt;br /&gt;
Plug it, let Windows finding the new hardware -&amp;gt; search software? -&amp;gt; no -&amp;gt; install from specific location -&amp;gt; search/include/browse -&amp;gt; svn/branches/sniffonly/openpicc/win32driver (OpenBeaconUSB.inf) -&amp;gt; continue anyway&lt;br /&gt;
&amp;lt;br&amp;gt;To communicate, use whatever talking serial, e.g.&lt;br /&gt;
Start-&amp;gt;Accessories-&amp;gt;Communications-&amp;gt;HyperTerminal -&amp;gt; new connection -&amp;gt; COM4 -&amp;gt; 115200/8/N/1/None -&amp;gt; try e.g. &amp;quot;h&amp;quot; -&amp;gt; File -&amp;gt; Save&lt;br /&gt;
* Debug&lt;br /&gt;
In case of trouble, you can get more lucky with [http://wiki.openpcd.org/wiki/Hardware#RS232_CMOS the debug cable] (115200/8/N/1 3v3)&lt;br /&gt;
# GND&lt;br /&gt;
# CTS# - shorted&lt;br /&gt;
# VCC  - provided! not to be connected to external Vcc&lt;br /&gt;
# TXD&lt;br /&gt;
# RXD&lt;br /&gt;
# RTS# - shorted&lt;br /&gt;
&lt;br /&gt;
====[http://www.proxmark.org/ Proxmark III]====&lt;br /&gt;
Originally created by J.Westhues: [http://cq.cx/proxmark3.pl here], video in action [http://www.youtube.com/watch?v=4jpRFgDPWVA here]&lt;br /&gt;
* [https://www.lafargue.name/proxmark3/refman.html manual], see also [http://proxmark3.com/dl/PM3-UserGuide.pdf this pdf]&lt;br /&gt;
* [http://www.proxmark.org/forum/index.php forum]&lt;br /&gt;
* [http://www.proxmark.org/files/index.php files], require login&lt;br /&gt;
* can read, sniff &amp;amp; emulate&lt;br /&gt;
* 13.6MHz, 125kHz and 134kHz&lt;br /&gt;
* [http://www.proxmark.org/files/index.php?dir=Sources%2Funix_windows%2F&amp;amp;download=20090306_proxmark_edo512.zip 20090306_proxmark_edo512 version] of the firmware/client is currently the latest available, running on both Windows and Linux&lt;br /&gt;
* Some troubles under Linux in USB2.0 mode, better to force USB1.1: Plug the proxmark in an USB 1.1 hub or unload ehci_hcd kernel module&lt;br /&gt;
Extracting the reader datastream (to be compared with OpenPICC results)&lt;br /&gt;
&amp;lt;pre&amp;gt;cat dump |grep -v TAG|cut -c 21-|sed &#039;s/!crc.*//;s/\([0-9a-f]\+\)[[:space:]]*/\1/g&#039;|tr a-z A-Z&amp;lt;/pre&amp;gt;&lt;br /&gt;
Getting both directions&lt;br /&gt;
&amp;lt;pre&amp;gt;cat dump |sed &#039;s/:     /+/;s/: TAG /-/&#039;|cut -c 15-|sed &#039;s/!crc.*//;s/\([0-9a-f]\+\)!\?[[:space:]]*/\1/g&#039;|tr a-z A-Z&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://www.cq.cx/verichip.pl Demo: Cloning a Verichip]&lt;br /&gt;
&lt;br /&gt;
====[http://www.iaik.tugraz.at/content/research/rfid/tag_emulators/ IAIK RFID DemoTag]====&lt;br /&gt;
====125kHz cloners====&lt;br /&gt;
* Chris Paget&#039;s cloner: [http://www.youtube.com/watch?v=fDimlEdeGjM video], [http://www.flickr.com/photos/eecue/990977879/ picture]. Raw cloner&lt;br /&gt;
* [http://www.rfidhackers.com/viewtopic.php?f=3&amp;amp;t=26 Programmable HID]&amp;lt;br&amp;gt;&#039;&#039;The design is currently capable of emulating any of HID’s 26-bit, 35-bit (Corporate 1000) or 37-bit card formats.&#039;&#039;&lt;br /&gt;
* [http://cq.cx/vchdiy.pl Verilog chip cloner]&lt;br /&gt;
* [http://pe.ece.olin.edu/projects/proxcard/prox.html AM-FSK] explained&lt;br /&gt;
* [http://www.cq.cx/prox.pl Flexpass PSK] explained + cloning&lt;br /&gt;
* [http://www.rmxtech.com/products/ RMX commercial] [http://www.rmxlabs.ru/ products]: emulators etc&lt;br /&gt;
* [http://www.proxpick.com/default.html ProxPick] is a highly versatile attack &amp;amp; defense tool for 125-134KHz RFID systems, about the size of a playing card. It is able to read, copy, and playback almost all Prox-type tags&lt;br /&gt;
&lt;br /&gt;
===Misc===&lt;br /&gt;
* [http://en.wikipedia.org/wiki/USRP Universal Software Radio Peripheral]&lt;br /&gt;
* [http://www.rfidguardian.org RFID Guardian], see [http://www.rfidguardian.org/pipermail/announce/2008-July/000000.html here] what they want to come with for v4.&lt;br /&gt;
* [http://www.instructables.com/id/RFID_Reader_Detector_and_Tilt_Sensitive_RFID_Tag/ RFID Reader Detector and Tilt Sensitive RFID Tag]&lt;br /&gt;
* [http://www.raisonance.com Raisonance] products: [http://www.raisonance.com/~proxilab__smart-cards__product~product__T017:4cc863cqyaql.html ProxiLAB] ([http://www.raisonance.com/tzr/scripts/downloader2.php?filename=T020/file/73/b5/4ccaodgr44ka&amp;amp;mime=application/pdf&amp;amp;originalname=ProxiLAB_brochure.pdf pdf]), [http://www.raisonance.com/~proxispy__smart-cards__product~product__T017:4cc6848h7ij1.html ProxiSPY] ([http://www.raisonance.com/tzr/scripts/downloader2.php?filename=T020/file/3d/46/4ccap1bwb3vo&amp;amp;mime=application/pdf&amp;amp;originalname=ProxiSPY_brochure.pdf pdf]), [http://www.raisonance.com/~proxicard__smart-cards__product~product__T017:4cc87fzi8mge.html ProxiCARD] ([http://www.raisonance.com/tzr/scripts/downloader2.php?filename=T020/file/e0/3f/4ccappplhlbs&amp;amp;mime=application/pdf&amp;amp;originalname=ProxiCARD_brochure.pdf pdf])&lt;br /&gt;
* [http://www.cs.ru.nl/~flaviog/tools.html Ghost &amp;amp; RfidSpy]&lt;br /&gt;
* [http://blog.makezine.com/archive/2009/10/seeing_rfid_on_the_cheap.html Seeing RFID on the cheap] on Makezine and [http://www.flickr.com/photos/doegox/4029711939/ my own attempt] based on a slightly different technique&lt;br /&gt;
* [http://www.spirtech.com/detector_us.html Spirtech probe]&lt;br /&gt;
* [http://code.google.com/p/mikeycard/ mikey card]&lt;br /&gt;
&lt;br /&gt;
==Software Tools==&lt;br /&gt;
===[http://openmrtd.org/projects/librfid/ librfid]===&lt;br /&gt;
librfid is a Free Software RFID library. It implements the PCD (reader) side protocol stack of ISO 14443 A, ISO 14443 B, ISO 15693, Mifare Ultralight and Mifare Classic. Support for iCODE*1 and other 13.56MHz based transponders is planned.&lt;br /&gt;
===[http://www.rfdump.org/ RFDump]===&lt;br /&gt;
RFDump is a backend GPL tool to directly interoperate with any RFID ISO-Reader to make the contents stored on RFID tags accessible.&lt;br /&gt;
===[http://www.rfidiot.org/ RFIDIOt]===&lt;br /&gt;
RFIDIOt is an open source python library for exploring RFID devices&lt;br /&gt;
 apt-get install python-pyscard&lt;br /&gt;
 $ ./mrpkey.py -L&lt;br /&gt;
 PCSC devices:&lt;br /&gt;
    No: 0               OMNIKEY CardMan 5x21 00 00&lt;br /&gt;
    No: 1               OMNIKEY CardMan 5x21 00 01&lt;br /&gt;
 $ ./mrpkey.py -r 1 CHECK&lt;br /&gt;
 mrpkey v0.1n (using RFIDIOt v0.1s)&lt;br /&gt;
  Reader: PCSC OMNIKEY CardMan 5x21 00 01&lt;br /&gt;
  Device is a Machine Readable Document&lt;br /&gt;
 $ ./mrpkey.py -r 1 &amp;quot;EXnnnnnn&amp;lt;cBELyymmddcSyymmddc&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;&amp;lt;cc&amp;quot;&lt;br /&gt;
To fix reader number, edit RFIDIOtconfig.py&lt;br /&gt;
&amp;lt;br&amp;gt;In MRZ passport number is coded with 9 chars. Belgian uses only 8 chars so some passport readers need a document number padded with char &amp;quot;&amp;lt;&amp;quot; (&amp;quot;EXnnnnnn&amp;lt;&amp;quot;)&lt;br /&gt;
&lt;br /&gt;
To use mrpkey under Windows you need:&lt;br /&gt;
&amp;lt;br&amp;gt;[http://www.python.org/download/ python], [http://sourceforge.net/projects/pyscard/ pyscard], [http://sourceforge.net/projects/pyserial/ pyserial], [http://sourceforge.net/project/showfiles.php?group_id=78018 pywin32], [http://www.voidspace.org.uk/python/modules.shtml#pycrypto pycrypto], [http://www.pythonware.com/products/pil/ python imaging library]&lt;br /&gt;
&lt;br /&gt;
===[http://www.gnu.org/software/gnuradio/ GNU Radio]===&lt;br /&gt;
GNU Radio is a collection of software that when combined with minimal hardware, allows the construction of radios where the actual waveforms transmitted and received are defined by software. What this means is that it turns the digital modulation schemes used in today&#039;s high performance wireless devices into software problems.&lt;br /&gt;
===[http://www.rfidunplugged.com/pwnpass/ pwnpass]===&lt;br /&gt;
RFID tool by 3ric Johanson (get info from rfid on credit cards), presented at Shmoocon 2009&lt;br /&gt;
&amp;lt;br&amp;gt;See also this [http://tv.boingboing.net/2008/03/19/how-to-hack-an-rfide.html video] showing it demo&#039;d&lt;br /&gt;
&amp;lt;br&amp;gt;See [http://www.nytimes.com/packages/pdf/business/20061023_CARD/techreport.pdf here(pdf)] a technical report of the vulnerabilities of RFID credit cards and [http://www.rfidhackers.com/viewtopic.php?f=4&amp;amp;t=45&amp;amp;start=0 here] info on PayPass 3000 reader&lt;br /&gt;
&lt;br /&gt;
===[http://www.libnfc.org libnfc]===&lt;br /&gt;
Open source library for Near Field Communication (NFC) using readers based on PN531/PN532/PN533 chips.&lt;br /&gt;
The library comes with examples demonstrating read, emulation &amp;amp; relay attack by exploiting a &amp;quot;hidden&amp;quot; raw mode of those chips.&lt;br /&gt;
&lt;br /&gt;
See also [http://code.google.com/p/nfc-tools/ nfc-tools] project&lt;br /&gt;
&lt;br /&gt;
===[http://www.springcard.com SpringCard]===&lt;br /&gt;
Offers a SDK for their reader but somehow compatible with e.g. the Omnikey 5321, see [http://www.springcard.com/download/sdks.html here] especially the two PCSC-SDK&lt;br /&gt;
&lt;br /&gt;
===[http://www.scardsoft.com/ SCard SOFT]===&lt;br /&gt;
A Russian software company making stuff to explore smartcards&lt;br /&gt;
* [http://www.scardsoft.com/main.php3?Theme=Soft_v3Server Smart Card ToolSet PRO v3.4], a shareware to explore cards based on APDUs, seems rich of features&lt;br /&gt;
&lt;br /&gt;
==Specific applications==&lt;br /&gt;
* [[ePassport]]&lt;br /&gt;
** [[Belgian ePassport]]&lt;br /&gt;
** [[EPassport#US_Passport_Card]] (which is not an ePassport...)&lt;br /&gt;
* [[MOBIB]]&lt;br /&gt;
* Cambio&lt;br /&gt;
** Cambio (at least in Germany) is using [http://www.invers.com/en/products/keymanager/keymanager.html Invers COCOS-keymanager], according to this [http://carsharingus.blogspot.com/2008/12/carsharing-technology-overview.html car-sharing technology overview] and if [http://www.rfidjournal.com/article/articleview/3839/1/1/ RFIDjournal] is right, this is a passive 125 kHz Hitag RFID inlay, manufactured by NXP Semiconductors&lt;br /&gt;
* Mifare Classic&lt;br /&gt;
** crapto1&lt;br /&gt;
** tk-libnfc-crapto1 &amp;amp; mfoc, does not work against MFC emulation on e.g. JCOP or Mifare Plus&lt;br /&gt;
&lt;br /&gt;
==Privacy==&lt;br /&gt;
* Social patterns at conferences: the good and the bad ;-)&lt;br /&gt;
** [http://events.ccc.de/congress/2008/Fahrplan/events/2899.en.html Mining social contacts with active RFID], presentation and application of the [http://www.sociopatterns.org/ SocioPatterns project]&lt;br /&gt;
** [http://www.wavetrend.net/docs/case_study-justBproductions.pdf Attendee Tracking/Networking], a commercial Big Brother application&lt;br /&gt;
* See [http://blog.yobi.be/category/privacy/ privacy-related news] on the blog&lt;br /&gt;
* Why it&#039;s important to consider privacy when designing a RFID infrastructure: acceptance!&lt;br /&gt;
** Huge thread [http://www.theblackvault.com/ftopic-60856-days0-orderasc-0.html starting here], see also the other pages...&lt;br /&gt;
** [http://www.notags.co.uk/ UK Consumers against the pervasive use of RFID in our society]&lt;br /&gt;
** [http://www.nocards.org/ Consumers Against Supermarket Privacy Invasion and Numbering]&lt;br /&gt;
** [http://www.spychips.com/ Spychips - Don&#039;t buy items that contain RFID tags]&lt;br /&gt;
** [http://www.cbc.ca/searchengine/blog/2009/03/podcast_24_is_up.html Podcast Interview with privacy commissioner Ann Cavoukian]&lt;br /&gt;
* Privacy: cultural differences&lt;br /&gt;
** [http://www.rtbf.be/info/societe/securite/les-japonais-veulent-pister-leurs-enfants-87768 Japaneses want to track their children (fr)]&lt;br /&gt;
* Recently Belgian Privacy Commission expressed its thoughts on the matter:&lt;br /&gt;
** See &#039;&#039;[http://www.privacycommission.be/fr/docs/Commission/2009/avis_27_2009.pdf Avis d&#039;initiative relatif à la RFIDDate: 28 octobre 2009 N° : 27/2009]&#039;&#039; from [http://www.privacycommission.be/fr/decisions/commission/opinions/ here]&lt;br /&gt;
&lt;br /&gt;
==Misc documentation==&lt;br /&gt;
* [http://www.rfidhackers.com/index.php Forum] setup by Chris Paget (aka foon)&lt;br /&gt;
* [http://www.proxmark.org/forum Proxmark forum], also with a lot of other information&lt;br /&gt;
* [http://en.wikipedia.org/wiki/Near_Field_Communication#Security_aspects Security aspects of NFC] on Wikipedia&lt;br /&gt;
&lt;br /&gt;
* [http://www.rfidblog.org.uk/research.html Research page of Gerhard Hancke], mainly about physical RFID attacks&lt;br /&gt;
* [http://www.avoine.net/rfid/ RFID Security &amp;amp; Privacy lounge] by Professor Gildas Avoine, *the* bibliography of academic papers on those matters&lt;br /&gt;
* [http://ec.europa.eu/information_society/policy/rfid/index_en.htm Radio Frequency IDentification and the Internet of Things], a page of the European Commission]&lt;br /&gt;
&lt;br /&gt;
* [http://sid.rstack.org/blog/index.php/321-vagues-reflexions-sur-le-warfidriving Réflexions sur le warfidriving] &amp;amp; experiments on skipass...&lt;br /&gt;
* [http://www.rfidvirus.org/ RFID virus]&lt;br /&gt;
* [http://www.acbm.com/inedits/pass-transports-commun-secrets.html Les secrets des Pass de transports en commun] by P. Gueulle&lt;/div&gt;</summary>
		<author><name>Pablos</name></author>
	</entry>
</feed>