Wireshark-bugs: [Wireshark-bugs] [Bug 6161] New: Dissector for the NXP MiFare Protocol
https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=6161
Summary: Dissector for the NXP MiFare Protocol
Product: Wireshark
Version: SVN
Platform: All
OS/Version: All
Status: NEW
Severity: Enhancement
Priority: Low
Component: Wireshark
AssignedTo: bugzilla-admin@xxxxxxxxxxxxx
ReportedBy: tyson.key@xxxxxxxxx
Created an attachment (id=6709)
--> (https://bugs.wireshark.org/bugzilla/attachment.cgi?id=6709)
The latest version of the dissector
Build Information:
Version 1.7.0 (SVN Rev 37346 from /trunk)
Copyright 1998-2011 Gerald Combs <gerald@xxxxxxxxxxxxx> and contributors.
This is free software; see the source for copying conditions. There is NO
warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.
Compiled (32-bit) with GTK+ 2.22.0, with GLib 2.26.0, with libpcap
1.2.0-PRE-GIT_2011_03_23, with libz 1.2.5, with POSIX capabilities (Linux),
without libpcre, with SMI 0.4.8, without c-ares, without ADNS, without Lua,
without Python, without GnuTLS, without Gcrypt, without Kerberos, without
GeoIP,
without PortAudio, without AirPcap.
Running on Linux 2.6.35.6-45.fc14.i686, with libpcap version
1.2.0-PRE-GIT_2011_03_23, with libz 1.2.5.
Built using gcc 4.5.1 20100924 (Red Hat 4.5.1-4).
Wireshark is Open Source Software released under the GNU General Public
License.
Check the man page and http://www.wireshark.org for more information.
--
I've just finished writing a dissector for the NXP-proprietary MiFare Protocol,
as used alongside ISO 14443-A by a popular range of contactless (not-so-smart)
cards, and various emulations, variants and clones thereof.
It currently supports all of the commands listed in
http://www.nxp.com/documents/data_sheet/MF1S703x.pdf that also happen to be
supported by LibNFC (http://code.google.com/p/libnfc/) - modulo the "NAK" and
CRC bytes, since I haven't found examples of their usage in my USB traces, and
I didn't want to hand-craft (probably incorrect) examples for testing.
I've tested it against a quickly-modified version of the dissector in Bug 6155,
and also against a sample file created using text2pcap using data extracted
from parts of USB traces, and hand-crafted data where I was unable to generate
any using my small collection of RFID tokens and reader.
The source code for that modified dissector is published at
https://bitbucket.org/vmlemon/smartcardtools/src/tip/USBSmartCardDissector/, if
necessary; and I'll attach the text2pcap sample shortly.
--
Configure bugmail: https://bugs.wireshark.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are watching all bug changes.