Identifying unknown tags using the ChameleonMini Rev.G

January 06, 2017

Step by step instructions for reading unknown HF Tags (13.56 MHz) with the ChameleonMini Rev.G.

What you will need:

Take a look at the Getting Started Guide if you need help with the setup process.

1. Connect up your ChameleonMini and start the client.

CMini Rev.G Hookup

2. Enter the command below to configure the ChameleonMini as a reader. 

Config=ISO14443A_READER

Output:

100:OK=ISO14443A_READER

3. Place the tag under ChameleonMini. Run the identify command.

IDENTIFY

Output:

101:OK WITH TEXT
MIFARE Ultralight
ATQA:   4400
UID:    041891EA453181
SAK:    00
101:OK WITH TEXT
MIFARE Classic 1k
ATQA:   0400
UID:    5C9F9F0D
SAK:    08
101:OK WITH TEXT
MIFARE Classic 4k
ATQA:   0200
UID:    FE333A53
SAK:    18
101:OK WITH TEXT
MIFARE DESFire EV1
ATQA:   4403
UID:    04113B624D3C80
SAK:    20





Also in Blog

ProxmarkPro - How to Save/Load a Tag to SD Card
ProxmarkPro - How to Save/Load a Tag to SD Card

May 21, 2019

View full article →

ProxmarkPro - Using HID Brute
ProxmarkPro - Using HID Brute

May 21, 2019

This blog post covers how to do a brute force attack with a HID tag on the ProxmarkPro. A Brute force attack is done by trying to guess multiple tag UID's similar to a known working tag UID to gain access.

View full article →

ProxmarkPro - Cloning a HID Tag
ProxmarkPro - Cloning a HID Tag

April 02, 2019

This blog post covers the steps to clone a HID tag to a T5577 with a ProxmarkPro.

View full article →

We use cookies to ensure that we give you the best experience on our website. If you continue we'll assume that you are understand this. Learn more
Accept