based on this article, i'm trying emulate mifare card managing apdu on android.according apdu receive, application should answer right apdu, simulating mifare behaviour.
with rfidiot.py, reading mifare card give me :
> ff ca 00 00 00 < cd ea 7d 2b 90 0 tag id: cdea7d2b atr: 3b8f8001804f0ca000000306030001000000006a setting mifare key a: ffffffffffff authenticating sector 00 mifare key (ffffffffffff) > ff 82 20 00 06 ff ff ff ff ff ff < [] 90 0 > ff 88 00 00 60 00 < [] 90 0 ok dumping data blocks 01 01: > ff 88 00 01 60 00 < [] 90 0 > ff b0 00 01 01 < [] 6c 10 > ff b0 00 01 10 < 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 90 0 01: 00000000000000000000000000000000 ................
with app simulating card got wrong comportment:
> ff ca 00 00 00 < 08 f0 82 65 90 0 tag id: 08f08265 atr: 3b80800101 setting mifare key a: ffffffffffff authenticating sector 00 mifare key (ffffffffffff) > ff 82 20 00 06 ff ff ff ff ff ff < [] 90 0 > ff 88 00 00 60 00 < [] 90 0 ok dumping data blocks 01 01: > ff 88 00 01 60 00 < [] 90 0 > ff b0 00 01 01 < [] 69 81 failed: command incompatible file structure
an error appear on ff b0 00 01 01 apdu command. , don't know 6981 apdu command comes from..
does can me on "bug" ?
it not possible trying do... @nikolayelenkov has done emulate iso 7816-4 compliant card. mifare classic not iso 7816-4 compliant (it not use apdu commands , responses communication). in fact, not iso 14443-4 compliant: uses proprietary encryption on top of iso 14443-3.
the fact communication looks apdus reader side, because reader strips off encryption before passes data on , wraps data inside "virtual" apdus. in way, mifare cards can used software can deal iso 7816-4 compliant cards.
Comments
Post a Comment