Read Write Clone Unique (em4x02) Set EM4x02 (Unique/Mira) UID and emulation mode on Q5 or Hitag2. Too many systems to itemize here rely on the ‘unique ID’ of an RFID token to grant access to a system or building, and, in the case that these tokens are based on 125kHz or 134.2kHz standard tags, many of them may be vulnerable to relatively simple cloning attacks.
In a way this is nothing new – several researchers have previously presented attacks whereby RFID tags were emulated by custom built circuits which were able to fool readers into thinking that a genuine tag had been presented.However, the industry response was normally that this was not a ‘real’ threat, as it required specialist knowledge and equipment, and the resulting device was not a ‘true clone’ as it didn’t have the same form factor as the original.
-d Debug on -f <num> Use LibNFC device number <num> (implies -R READER_LIBNFC) -g No GUI -h Print detailed help message -n No Init - do not initialise hardware -N List available LibNFC devices -r <num> Use PCSC device number <num> (implies -R READER_PCSC) -R <type> Reader/writer type: READER_ACG: ACG Serial READER_ACS: PC/SC Subtype ACS READER_ANDROID: Android READER_DEMOTAG: DemoTag READER_FROSCH: Frosch Hitag READER_LIBNFC: libnfc READER_NONE: None READER_OMNIKEY: PC/SC Subtype OmniKey READER_PCSC: PC/SC READER_SCM: PC/SC Subtype SCM -l <line> Line to use for reader/writer -L List available PCSC devices -s <baud> Speed of reader/writer -t <seconds> Timeout for inactivity of reader/writer
cyborg@cyborg:~$ sudo unique.py