2011-10-01 14:26:11 +02:00
|
|
|
.TH nfc-relay 1 "June 26, 2009" "libnfc" "libnfc'examples"
|
2009-06-26 17:10:01 +02:00
|
|
|
.SH NAME
|
|
|
|
nfc-relay \- Relay attack command line tool based on libnfc
|
|
|
|
.SH SYNOPSIS
|
|
|
|
.B nfc-relay
|
|
|
|
.SH DESCRIPTION
|
|
|
|
.B nfc-relay
|
2010-10-08 22:01:47 +02:00
|
|
|
is a utility that demonstrates a relay attack.
|
2010-10-08 18:24:04 +02:00
|
|
|
|
|
|
|
This tool requires two NFC devices. One device (configured as target) will
|
|
|
|
emulate an ISO/IEC 14443 type A tag, while the second device (configured as
|
|
|
|
initiator) will act as a reader. The genuine tag can be placed on the second
|
|
|
|
device (initiator) and the tag emulator (target) can be placed close to the
|
|
|
|
original reader. All communication is now relayed and shown in the screen on
|
|
|
|
real-time.
|
2009-06-26 17:10:01 +02:00
|
|
|
|
2010-10-08 22:01:47 +02:00
|
|
|
This tool has the same issues regarding timing as \fBnfc-emulate-uid\fP has,
|
|
|
|
therefore we advise you to try it against e.g. an OmniKey CardMan 5321 reader.
|
|
|
|
|
2009-06-26 17:10:01 +02:00
|
|
|
.SH BUGS
|
|
|
|
Please report any bugs on the
|
|
|
|
.B libnfc
|
2011-10-01 14:26:11 +02:00
|
|
|
issue tracker at:
|
|
|
|
.br
|
2015-04-30 14:19:03 +02:00
|
|
|
.BR https://github.com/nfc-tools/libnfc/issues
|
2009-06-26 17:10:01 +02:00
|
|
|
.SH LICENCE
|
|
|
|
.B libnfc
|
2011-10-01 14:26:11 +02:00
|
|
|
is licensed under the GNU Lesser General Public License (LGPL), version 3.
|
|
|
|
.br
|
|
|
|
.B libnfc-utils
|
2009-06-26 17:10:01 +02:00
|
|
|
and
|
2010-10-01 16:27:39 +02:00
|
|
|
.B libnfc-examples
|
2011-10-01 14:26:11 +02:00
|
|
|
are covered by the the BSD 2-Clause license.
|
2009-06-26 17:10:01 +02:00
|
|
|
.SH AUTHORS
|
|
|
|
Roel Verdult <roel@libnfc.org>
|
|
|
|
.PP
|
2010-10-01 16:27:39 +02:00
|
|
|
This manual page was written by Romuald Conty <romuald@libnfc.org>.
|
2009-06-26 17:10:01 +02:00
|
|
|
It is licensed under the terms of the GNU GPL (version 2 or later).
|