Giter Site home page Giter Site logo

electroniccats / nfc-copy-cat Goto Github PK

View Code? Open in Web Editor NEW
106.0 10.0 21.0 3.6 MB

NFC Copy Cat is a small device that combines two powerful cybersecurity tools, NFCopy and MagSpoof. NFCopy works by reading or emulating a NFC card; depending on the necessities of the researcher.

Home Page: https://electroniccats.com/store/

License: GNU General Public License v3.0

magspoof nfc nfc-reader nfc-copy circuitpython nfc-payment-systems electronic-cats hardware replay-attacks security

nfc-copy-cat's Introduction

NFC Copy Cat

NFC Copy Cat, manufactured by Electronic Cats, is a small device that combines two powerful cybersecurity tools, NFCopy and MagSpoof. NFCopy works by reading or emulating an NFC card; depending on the necessities of the researcher. On the other hand, MagSpoof can wirelessly emulate/spoof any magnetic stripe card. So using NFC Copy Cat, the user will have a device capable of storing magnetic stripe data or NFC payment data to be replayed later — known in the cybersecurity world as a replay attack. 

To show the capabilities of NFC Copy Cat, the emulation example will use a Visa MSD protocol. So be aware that this type of transaction will not be accepted in some payment systems.

NFC Copy Cat combines a simple user interface that can be programmed using Arduino IDE. Adding a micro USB connection, 3.7V LiPo battery connector, antenna, two programmable buttons, LEDs and a reset button. The most important part, NFC Copy Cat is an open hardware project. So anyone could modify or redesign it on their own.

Devices like NFC Copy Cat are essential for researchers, students, teachers or anyone interested in payment systems. It will help to understand how the payment system works, the communications or the APDU protocol. 

Some of the code examples that will be available introduce different concepts. For example, how to detect a card reader, how to detect an NFC card, how to use MagSpoof using a button as a trigger to spoof, how to use NFC with a button to emulate, how to read a Visa card, how to emulate a Visa MSD card, how to generate challenges to extract card information or how to combine both tools: NFCopy and MagSpoof.

Features:

  • Microcontroller SAMD21 ARM 32-bit Cortex M0
  • Memory Flash for support Circuit Python
  • Battery Charger 3.7v
  • Compatible con Adafruit PN532 breakout
  • Compatible con NFC Module V3

Included Complete Version:

  • NFC Copy Cat
  • Coil for Magspoof
  • NFC Module V3 +Tag 

Included Single Version:

  • NFC Copy Cat
  • Coil for Magspoof

Wiki and Getting Started

Getting Started in our Wiki

Disclaimer

NFC Copy Cat is a wireless penetration testing tool intended solely for use in authorized security audits, where such usage is permitted by applicable laws and regulations. Before utilizing this tool, it is crucial to ensure compliance with all relevant legal requirements and obtain appropriate permissions from the relevant authorities.

It is essential to note that the board does not provide any means or authorization to utilize credit cards or engage in any financial transactions that are not legally authorized. Electronic Cats holds no responsibility for any unauthorized use of the tool or any resulting damages.

License

OpenSourceLicense

Electronic Cats invests time and resources providing this open source design, please support Electronic Cats and open-source hardware by purchasing products from Electronic Cats!

Designed by Electronic Cats.

Firmware released under an GNU AGPL v3.0 license. See the LICENSE file for more information.

Hardware released under an CERN Open Hardware Licence v1.2. See the LICENSE_HARDWARE file for more information.

Electronic Cats is a registered trademark, please do not use if you sell these PCBs.

8 July 2019

nfc-copy-cat's People

Contributors

eric286 avatar jazhe avatar jorgeuri avatar juan-eduardo avatar liars126 avatar montserrat12345 avatar oscar-raygoza avatar sabas1080 avatar salmg avatar wero1414 avatar xpeqex avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

nfc-copy-cat's Issues

Hardware setup imformation

Hey can you send some info on how to hook up and program the board with arduino mega 2560. Also any pictures and basic hardware/hookup support would be appreciated.

Instructions to connect and setup

It will be nice if the wiki page is updatd with the details to setup the connection of NFC Copy Cat with NFC Module for the Begineers and student like me to follow through the examples. Appriciate the samples in the repo.

Is there a program or tutorial to decode the nfc tag data or msd data?

Is there any tutorials of sites with more info on decrypting nfc data and converting it to magstripe data. My main question is why is Magstripe data so important? How did Samy Kamkar figure out what parts of track 2 discretionary data needed to be changed in order to downgrade the service code from 201 to 101. Was his downgrade method simply using his algorithim to use a previous cards CVC3 or CVV2 on the magstripe and apply it to the new card?

pn532

Being helped by support, thank you

Help with PDOL challenge

Hello,

I’ve recently gotten a nfc copy cat and am struggling to understand how to run the read_replay_spoof .ino

could someone please clarify what “ Make a right format challenge using the card PDOL to extract more data(track 2)” means? And how I should go editing the ino?

ive successfully got my cards pdol with the acr122 and cardpeek what next?

bootloader

NFC Copy Cat is an interesting project. I made several PCBs. How can I burn the bootloader?

微信图片_20200429161646

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.