Huge thanks to our Platinum Members Endace and LiveAction,
and our Silver Member Veeam, for supporting the Wireshark Foundation and project.

Wireshark-bugs: [Wireshark-bugs] [Bug 8291] Support for dissection of MiFare command payloads in

Date: Sat, 02 Feb 2013 14:41:05 +0000

Comment # 1 on bug 8291 from
Created attachment 9922 [details]
A trace file containing MiFare (UltraLight) R+W packets from a PN532-based
reader

This trace file contains some packets from reading from, and writing to an NXP
MiFare UltraLight token using the "nfc-mfultralight" utility included with
LibNFC.

To successfully dissect the MiFare payloads within, it is necessary to first
set the USB CCID dissector's payload type to "NXP PN532 with ACS
Pseudo-Header", and then the PN532 dissector's payload to "NXP MiFare".


You are receiving this mail because:
  • You are watching all bug changes.