Huge thanks to our Platinum Members Endace and LiveAction,
and our Silver Member Veeam, for supporting the Wireshark Foundation and project.

Wireshark-bugs: [Wireshark-bugs] [Bug 8291] Support for dissection of MiFare command payloads in

Date: Sat, 02 Feb 2013 15:02:39 +0000

Comment # 2 on bug 8291 from
Created attachment 9924 [details]
The attached trace file contains packets from unsuccessful authentication
attempts against a MiFare Classic 4K card

I can confirm that this also works with traces generated by the "nfc-mfclassic"
utility from LibNFC, against a MiFare Classic 4K card. (The extra "Authenticate
with Key A"/"Authenticate with Key B" packets are correctly dissected).

Attached is a demo trace file from the "nfc-mfclassic" utility that doesn't
contain references to any (university) proprietary sector keys.


You are receiving this mail because:
  • You are watching all bug changes.