EMVemulator Save

This Android app collects Mag-Stripe data and CVC3 codes from PayPass cards and emulates that information.

Project README

EMVemulator

IMPORTANT - THIS REPO IS NO LONGER MAINTAINED

This Android app collects Mag-Stripe data and CVC3 codes from MasterCard PayPass cards and emulates that information. It is based on combined pre-play and downgrade attack described in Cloning Credit Cards: A combined pre-play and downgrade attack on EMV Contactless by Michael Roland, Josef Langer.

WARNING! This application might destroy your credit card (MasterCard only) after ~ 66 successful attacks.*

*For each attack application increments card's ATC by 1000. ATC (Application Transaction Counter) is 2B value that means that maximum value of ATC is 65535, so after approximately 66 attacks this counter overflows.

Downloads

Source code

APK

Usage

This is just proof of concept application, so interface is quite simple.

1, This screen shows, that app is ready for reading card

alt text

2, When you have compatible card (MasterCard PayPass) app will start collecting data

alt text

3, Data collection is completed and your phone is ready for emulating your card

alt text

4, Now you can put this app to background or just close it and whenever you want to reply collected data just turn on your screen and app will start to communicate with reader

Open Source Agenda is not affiliated with "EMVemulator" Project. README Source: MatusKysel/EMVemulator

Open Source Agenda Badge

Open Source Agenda Rating