Neohapsis is currently accepting applications for employment. For more information, please visit our website www.neohapsis.com or email firstname.lastname@example.org
From: Adam Laurie (adamalgroup.co.uk)
Date: Thu Feb 26 2009 - 08:23:01 CST
Well, it's been a busy month... thanks to pytey, I came across TikiTags,
which proved to be rather more interesting than they at first seemed...
These devices contain an NXP PN532 reader chip, which, it turns out, is
also capable of running in emulator mode (it is the chip used in a lot
of NFC mobile phones), and, after looking at documentation from NXP, I
was able to get this functionality working, and I'm delighted that NXP
have also agreed to allow me to release the code despite it being based
on information that was provided under NDA, so massive props to NXP for
supporting the open source security research community! :)
As a result, I'm able to release two new tools:
pn532emulate.py - sets up the emulator and processes one command.
pn532mitm.py - 'pn532 man-in-the-middle', which will drive two
readers: one as an emulator and one as a reader, and will log all
traffic that flows between them. Additionally, you can separate the
reader and emulator onto two different machines, and relay the traffic
As always, this is very much a work in progress, and I know the error
handling is not perfect and needs tweaking. Low level command processing
is also slightly wacky, and will probably be re-written now I understand
what's going on a bit more... :)
I've also added a tool for reading HID ProxCard IDs - 'hidprox.py'
and I finally got around to writing some more detailed documentation,
which you can find here:
Homepage and download instructions etc. can be found here:
Adam Laurie Tel: +44 (0) 20 7993 2690
Suite 117 Fax: +44 (0) 1308 867 949
61 Victoria Road
KT6 4JX http://rfidiot.org
Full-Disclosure - We believe in it.
Hosted and sponsored by Secunia - http://secunia.com/