{"id":11822,"date":"2020-11-16T21:25:38","date_gmt":"2020-11-16T15:55:38","guid":{"rendered":"http:\/\/kalilinuxtutorials.com\/?p=11822"},"modified":"2020-11-16T21:25:38","modified_gmt":"2020-11-16T15:55:38","slug":"nfcgate","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/nfcgate\/","title":{"rendered":"NFCGate : An NFC Research Toolkit Application For Android"},"content":{"rendered":"\n<p><strong>NFCGate <\/strong>is an Android application meant to capture, analyze, or modify NFC traffic. It can be used as a researching tool to reverse engineer protocols or assess the security of protocols against traffic modifications.<\/p>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><strong>Features<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>On-device capture<\/strong>: Captures NFC traffic sent and received by other applications running on the device.<\/li><li><strong>Relay<\/strong>: Relays NFC traffic between two devices using <a href=\"https:\/\/github.com\/nfcgate\/server\">a server<\/a>. One device operates as a &#8220;reader&#8221; reading an NFC tag, the other device emulates an NFC tag using the Host Card Emulation (HCE).<\/li><li><strong>Replay<\/strong>: Replays previously captured NFC traffic in either &#8220;reader&#8221; or &#8220;tag&#8221; mode.<\/li><li><strong>Clone<\/strong>: Clones the initial tag information (e.g. ID).<\/li><li><a href=\"https:\/\/github.com\/pcapng\/pcapng\">pcapng<\/a> export of captured NFC traffic, readable by Wireshark.<\/li><\/ul>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><strong>Requirements For Specific Modes<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>NFC support<\/li><li>Android 4.4+ (API level 19+)<\/li><li><a href=\"https:\/\/github.com\/ElderDrivers\/EdXposed\">EdXposed<\/a> or <a href=\"https:\/\/repo.xposed.info\/\">Xposed<\/a>: On-device capture, relay tag mode, replay tag mode, clone mode.<\/li><li>ARMv8-A, ARMv7: Relay tag mode, replay tag mode, clone mode.<\/li><li><a href=\"https:\/\/developer.android.com\/guide\/topics\/connectivity\/nfc\/hce\">HCE<\/a>: Relay tag mode, replay tag mode, clone mode.<\/li><\/ul>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><strong>Usage<\/strong><\/p>\n\n\n\n<p class=\"has-light-green-cyan-background-color has-background\"><strong>Building<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Initialize submodules: <code><strong>git submodule update --init<\/strong><\/code><\/li><li>Build using Android Studio or Gradle<\/li><\/ul>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><strong>Operating Modes<\/strong><\/p>\n\n\n\n<p>As instructions differ per mode, each mode is described in detail in its own document in <code>doc\/mode\/<\/code>:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><a href=\"https:\/\/github.com\/nfcgate\/nfcgate\/blob\/v2\/doc\/mode\/OnDevice.md\"><strong>On-device capture<\/strong><\/a><\/li><li><a href=\"https:\/\/github.com\/nfcgate\/nfcgate\/blob\/v2\/doc\/mode\/Relay.md\"><strong>Relay<\/strong><\/a><\/li><li><a href=\"https:\/\/github.com\/nfcgate\/nfcgate\/blob\/v2\/doc\/mode\/Replay.md\"><strong>Replay<\/strong><\/a><\/li><li><a href=\"https:\/\/github.com\/nfcgate\/nfcgate\/blob\/v2\/doc\/mode\/Clone.md\"><strong>Clone<\/strong><\/a><\/li><\/ul>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><strong>Pcapng Export<\/strong><\/p>\n\n\n\n<p>Captured traffic can be exported in or imported from the <a href=\"https:\/\/github.com\/pcapng\/pcapng\">pcapng<\/a> file format. For example, Wireshark can be used to further analyze NFC traffic. A detailed description of the import and export functionality is documented in <a href=\"https:\/\/github.com\/nfcgate\/nfcgate\/blob\/v2\/doc\/pcapng.md\">doc\/pcapng.md<\/a>.<\/p>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><strong>Compatibility<\/strong><\/p>\n\n\n\n<p>NFCGate provides an in-app status check. For further notes on compatibility see the <a href=\"https:\/\/github.com\/nfcgate\/nfcgate\/blob\/v2\/doc\/Compatibility.md\">compatibility document<\/a>.<\/p>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><strong>Known Issues &amp; Caveats<\/strong><\/p>\n\n\n\n<p>Please consider the following issues and caveats before using the application (and especially before filing a bug report).<\/p>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><strong>NFC Stack<\/strong><\/p>\n\n\n\n<p>When using modes, that utilize HCE, the phone has to implement the <a href=\"https:\/\/nfc-forum.org\/our-work\/specifications-and-application-documents\/specifications\/nfc-controller-interface-nci-specification\/\">NFC Controller Interface (NCI)<\/a> specification. Most of the phones should implement this specification when offering HCE support.<\/p>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><strong>Confidentiality of Data Channel (relay)<\/strong><\/p>\n\n\n\n<p>Right now, all data in relay mode is sent <em>unencrypted<\/em> over the network. We may or may not get around to implementing cryptographic protection, but for now, consider everything you send over the network to be readable by anyone interested, unless you use extra protection like VPNs. Keep that in mind while performing your own tests.<\/p>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><strong>Compatibility with Cards (relay, replay, clone)<\/strong><\/p>\n\n\n\n<p>We can only proxy tags supported by Android. For example, Android no longer offers support for MiFare classic chips, so these cards are not supported. When in doubt, use an application like NFC Tag info to find out if your tag is compatible. Also, at the moment, every tag technology supported by Android&#8217;s HCE is supported (A, B, F), however NFC-B and NFC-F remain untested. NFC-A tags are the most common tags (for example, both the MiFare DESFire and specialized chips like the ones in electronic passports use NFC-A), but you may experience problems if you use other tags.<\/p>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><strong>Compatibility with readers (relay)<\/strong><\/p>\n\n\n\n<p>This application only works with readers which do not implement additional security measures. One security measure which will prevent our application from working in relay mode is when the reader checks the time it takes the card to respond (or, to use the more general case, if the reader implements &#8220;distance bounding&#8221;). The network transmission adds a noticeable delay to any transaction, so any secure reader will not accept our proxied replies.<br>This does not affect other operating modes.<\/p>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><strong>Android NFC limitations (relay, replay)<\/strong><\/p>\n\n\n\n<p>Some features of NFC are not supported by Android and thus cannot be used with our application. We have experienced cases where the NFC field generated by the phone was not strong enough to properly power more advanced features of some NFC chips (e.g. cryptographic operations). Keep this in mind if you are testing chips we have not experimented with.<\/p>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><strong>Publications &amp; Media<\/strong><\/p>\n\n\n\n<p>This application was <a href=\"https:\/\/www.usenix.org\/conference\/woot20\/presentation\/klee\">presented at the 14th USENIX Workshop on Offensive Technologies (WOOT &#8217;20)<\/a>. An <a href=\"https:\/\/arxiv.org\/abs\/2008.03913\">arXiv preprint can be found here<\/a>.<\/p>\n\n\n\n<p>An early version of this application was presented at WiSec 2015. The <a href=\"https:\/\/blog.velcommuta.de\/wp-content\/uploads\/2015\/07\/nfcgate-extended-abstract.pdf\">extended Abstract<\/a> and <a href=\"https:\/\/blog.velcommuta.de\/wp-content\/uploads\/2015\/07\/NFCGate-Poster.pdf\">poster<\/a> can be found on the <a href=\"https:\/\/blog.velcommuta.de\/publications\/\">website<\/a> of one of the authors. It was also presented in a brief <a href=\"https:\/\/media.ccc.de\/browse\/conferences\/camp2015\/camp2015-6862-lightning_talks_day_2.html#video&amp;t=300\">Lightning Talk<\/a> at the <a href=\"https:\/\/events.ccc.de\/camp\/2015\/wiki\/Main_Page\">Chaos Communication Camp 2015<\/a>.<\/p>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><strong>Reference Our Project<\/strong><\/p>\n\n\n\n<p>Any use of this project which results in an academic publication or other publication which includes a bibliography should include a citation to NFCGate:<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">@inproceedings {257188,\n    author = {Steffen Klee and Alexandros Roussos and Max Maass and Matthias Hollick},\n    title = {NFCGate: Opening the Door for {NFC} Security Research with a Smartphone-Based Toolkit},\n    booktitle = {14th {USENIX} Workshop on Offensive Technologies ({WOOT} 20)},\n    year = {2020},\n    url = {https:\/\/www.usenix.org\/conference\/woot20\/presentation\/klee},\n    publisher = {{USENIX} Association},\n    month = aug,\n}\n<\/pre>\n\n\n\n<div class=\"wp-block-buttons aligncenter is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--1\"><a class=\"wp-block-button__link has-vivid-cyan-blue-background-color has-background\" href=\"https:\/\/github.com\/nfcgate\/nfcgate\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Download<\/strong><\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>NFCGate is an Android application meant to capture, analyze, or modify NFC traffic. It can be used as a researching tool to reverse engineer protocols or assess the security of protocols against traffic modifications. Features On-device capture: Captures NFC traffic sent and received by other applications running on the device. Relay: Relays NFC traffic between [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":16598,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/1.bp.blogspot.com\/-0LW777zyJEo\/X6_mqkgzS8I\/AAAAAAAAH_Q\/xxRvwA3Me-E7mGtZ7vhA9QEi7z-6A9LDwCLcBGAsYHQ\/s728\/NFC%25281%2529.png","fifu_image_alt":"NFCGate : An NFC Research Toolkit Application For Android","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[28],"tags":[156,2246,2247],"class_list":["post-11822","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-kali","tag-android","tag-nfc","tag-nfcgate"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>NFCGate : An NFC Research Toolkit Application For Android<\/title>\n<meta name=\"description\" content=\"NFCGate is an Android application meant to capture, analyze, or modify NFC traffic. It can be used as a researching tool to reverse engineer\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/nfcgate\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"NFCGate : An NFC Research Toolkit Application For Android\" \/>\n<meta property=\"og:description\" content=\"NFCGate is an Android application meant to capture, analyze, or modify NFC traffic. It can be used as a researching tool to reverse engineer\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/nfcgate\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2020-11-16T15:55:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/1.bp.blogspot.com\/-0LW777zyJEo\/X6_mqkgzS8I\/AAAAAAAAH_Q\/xxRvwA3Me-E7mGtZ7vhA9QEi7z-6A9LDwCLcBGAsYHQ\/s728\/NFC%25281%2529.png\" \/>\n<meta name=\"author\" content=\"R K\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/1.bp.blogspot.com\/-0LW777zyJEo\/X6_mqkgzS8I\/AAAAAAAAH_Q\/xxRvwA3Me-E7mGtZ7vhA9QEi7z-6A9LDwCLcBGAsYHQ\/s728\/NFC%25281%2529.png\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"R K\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/nfcgate\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/nfcgate\/\"},\"author\":{\"name\":\"R K\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\"},\"headline\":\"NFCGate : An NFC Research Toolkit Application For Android\",\"datePublished\":\"2020-11-16T15:55:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/nfcgate\/\"},\"wordCount\":713,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/nfcgate\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/1.bp.blogspot.com\/-0LW777zyJEo\/X6_mqkgzS8I\/AAAAAAAAH_Q\/xxRvwA3Me-E7mGtZ7vhA9QEi7z-6A9LDwCLcBGAsYHQ\/s728\/NFC%25281%2529.png\",\"keywords\":[\"android\",\"NFC\",\"NFCGate\"],\"articleSection\":[\"Kali Linux\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/nfcgate\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/nfcgate\/\",\"name\":\"NFCGate : An NFC Research Toolkit Application For Android\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/nfcgate\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/nfcgate\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/1.bp.blogspot.com\/-0LW777zyJEo\/X6_mqkgzS8I\/AAAAAAAAH_Q\/xxRvwA3Me-E7mGtZ7vhA9QEi7z-6A9LDwCLcBGAsYHQ\/s728\/NFC%25281%2529.png\",\"datePublished\":\"2020-11-16T15:55:38+00:00\",\"description\":\"NFCGate is an Android application meant to capture, analyze, or modify NFC traffic. It can be used as a researching tool to reverse engineer\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/nfcgate\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/nfcgate\/#primaryimage\",\"url\":\"https:\/\/1.bp.blogspot.com\/-0LW777zyJEo\/X6_mqkgzS8I\/AAAAAAAAH_Q\/xxRvwA3Me-E7mGtZ7vhA9QEi7z-6A9LDwCLcBGAsYHQ\/s728\/NFC%25281%2529.png\",\"contentUrl\":\"https:\/\/1.bp.blogspot.com\/-0LW777zyJEo\/X6_mqkgzS8I\/AAAAAAAAH_Q\/xxRvwA3Me-E7mGtZ7vhA9QEi7z-6A9LDwCLcBGAsYHQ\/s728\/NFC%25281%2529.png\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\",\"name\":\"R K\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"caption\":\"R K\"},\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"NFCGate : An NFC Research Toolkit Application For Android","description":"NFCGate is an Android application meant to capture, analyze, or modify NFC traffic. It can be used as a researching tool to reverse engineer","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/nfcgate\/","og_locale":"en_US","og_type":"article","og_title":"NFCGate : An NFC Research Toolkit Application For Android","og_description":"NFCGate is an Android application meant to capture, analyze, or modify NFC traffic. It can be used as a researching tool to reverse engineer","og_url":"https:\/\/kalilinuxtutorials.com\/nfcgate\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2020-11-16T15:55:38+00:00","og_image":[{"url":"https:\/\/1.bp.blogspot.com\/-0LW777zyJEo\/X6_mqkgzS8I\/AAAAAAAAH_Q\/xxRvwA3Me-E7mGtZ7vhA9QEi7z-6A9LDwCLcBGAsYHQ\/s728\/NFC%25281%2529.png","type":"","width":"","height":""}],"author":"R K","twitter_card":"summary_large_image","twitter_image":"https:\/\/1.bp.blogspot.com\/-0LW777zyJEo\/X6_mqkgzS8I\/AAAAAAAAH_Q\/xxRvwA3Me-E7mGtZ7vhA9QEi7z-6A9LDwCLcBGAsYHQ\/s728\/NFC%25281%2529.png","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"R K","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/nfcgate\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/nfcgate\/"},"author":{"name":"R K","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad"},"headline":"NFCGate : An NFC Research Toolkit Application For Android","datePublished":"2020-11-16T15:55:38+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/nfcgate\/"},"wordCount":713,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/nfcgate\/#primaryimage"},"thumbnailUrl":"https:\/\/1.bp.blogspot.com\/-0LW777zyJEo\/X6_mqkgzS8I\/AAAAAAAAH_Q\/xxRvwA3Me-E7mGtZ7vhA9QEi7z-6A9LDwCLcBGAsYHQ\/s728\/NFC%25281%2529.png","keywords":["android","NFC","NFCGate"],"articleSection":["Kali Linux"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/nfcgate\/","url":"https:\/\/kalilinuxtutorials.com\/nfcgate\/","name":"NFCGate : An NFC Research Toolkit Application For Android","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/nfcgate\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/nfcgate\/#primaryimage"},"thumbnailUrl":"https:\/\/1.bp.blogspot.com\/-0LW777zyJEo\/X6_mqkgzS8I\/AAAAAAAAH_Q\/xxRvwA3Me-E7mGtZ7vhA9QEi7z-6A9LDwCLcBGAsYHQ\/s728\/NFC%25281%2529.png","datePublished":"2020-11-16T15:55:38+00:00","description":"NFCGate is an Android application meant to capture, analyze, or modify NFC traffic. It can be used as a researching tool to reverse engineer","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/nfcgate\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/nfcgate\/#primaryimage","url":"https:\/\/1.bp.blogspot.com\/-0LW777zyJEo\/X6_mqkgzS8I\/AAAAAAAAH_Q\/xxRvwA3Me-E7mGtZ7vhA9QEi7z-6A9LDwCLcBGAsYHQ\/s728\/NFC%25281%2529.png","contentUrl":"https:\/\/1.bp.blogspot.com\/-0LW777zyJEo\/X6_mqkgzS8I\/AAAAAAAAH_Q\/xxRvwA3Me-E7mGtZ7vhA9QEi7z-6A9LDwCLcBGAsYHQ\/s728\/NFC%25281%2529.png"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad","name":"R K","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","caption":"R K"},"url":"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/"}]}},"jetpack_featured_media_url":"https:\/\/1.bp.blogspot.com\/-0LW777zyJEo\/X6_mqkgzS8I\/AAAAAAAAH_Q\/xxRvwA3Me-E7mGtZ7vhA9QEi7z-6A9LDwCLcBGAsYHQ\/s728\/NFC%25281%2529.png","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":36975,"url":"https:\/\/kalilinuxtutorials.com\/nfcgate-2\/","url_meta":{"origin":11822,"position":0},"title":"NFCGate : A Comprehensive NFC Traffic Analysis Tool","author":"Varshini","date":"March 11, 2025","format":false,"excerpt":"NFCGate is an innovative Android application designed for capturing, analyzing, and modifying NFC traffic. Developed by students at the Secure Mobile Networking Lab at TU Darmstadt, it serves as a valuable tool for security researchers aiming to reverse-engineer protocols or assess their security against traffic modifications. This article delves into\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/NFCGate-.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/NFCGate-.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/NFCGate-.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/NFCGate-.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/NFCGate-.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/NFCGate-.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":36859,"url":"https:\/\/kalilinuxtutorials.com\/nfctoolsgui\/","url_meta":{"origin":11822,"position":1},"title":"NFCToolsGUI : A Comprehensive NFC Management Tool","author":"Varshini","date":"March 5, 2025","format":false,"excerpt":"NFCToolsGUI is a versatile, cross-platform program designed to interact with PN532 NFC modules, supporting Windows, Linux, and macOS. It simplifies NFC tag management and offers a wide range of functionalities for developers, researchers, and hobbyists. Key Features NFCToolsGUI provides robust features for NFC tag operations: Crack Card Using MFOC: Perform\u2026","rel":"","context":"In &quot;Hacking Tools&quot;","block_context":{"text":"Hacking Tools","link":"https:\/\/kalilinuxtutorials.com\/category\/hacking-tools\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/DeepSeek-Vulnerability-Analyze1.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/DeepSeek-Vulnerability-Analyze1.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/DeepSeek-Vulnerability-Analyze1.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/DeepSeek-Vulnerability-Analyze1.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/DeepSeek-Vulnerability-Analyze1.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/03\/DeepSeek-Vulnerability-Analyze1.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":7073,"url":"https:\/\/kalilinuxtutorials.com\/homepwn-swiss-army-knife-pentesting-iot-devices\/","url_meta":{"origin":11822,"position":2},"title":"HomePWN : Swiss Army Knife for Pentesting of IoT Devices","author":"R K","date":"October 28, 2019","format":false,"excerpt":"HomePwn is a framework that provides features to audit and pentesting devices that company employees can use in their day-to-day work and inside the same working environment. It is designed to find devices in the home or office, take advantage of certain vulnerabilities to read or send data to those\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/JgbIsP7IGxo\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":2169,"url":"https:\/\/kalilinuxtutorials.com\/vproxy-forward-traffic-proxy-instance\/","url_meta":{"origin":11822,"position":3},"title":"Vproxy &#8211; Forward HTTP\/S Traffic To Proxy Instance","author":"R K","date":"August 7, 2018","format":false,"excerpt":"Vproxy tool is used to forward HTTP\/S traffic to proxy instance. The WIFI proxy option in your mobile device doesn't make you capture all of the HTTP\/S traffic using your favorite proxy program ? use this tool to solve this issue and capture the whole HTTP\/S traffic. Vproxy System Requirements\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"https:\/\/github.com\/Nekmo\/dirhunt","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2018\/04\/button_download.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":32450,"url":"https:\/\/kalilinuxtutorials.com\/awesome-embedded-and-iot-security\/","url_meta":{"origin":11822,"position":4},"title":"Awesome Embedded And IoT Security &#8211; Key Tools And Insights","author":"Varshini","date":"March 25, 2024","format":false,"excerpt":"Botnets like\u00a0Mirai\u00a0have proven that there is a need for more security in embedded and IoT devices. This list shall help beginners and experts to find helpful resources on the topic. If you are a beginner, you should have a look at the\u00a0Books\u00a0and\u00a0Case Studies\u00a0sections. If you want to start right away\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhAeAS8alb4haQnVHHUi3eLpwxJKGUsTABOdmqCgXe0zrx66fWXpKrVLK9DOWbjXT8Rb-r68jJi1MvUlm8Stz0mvvc2-DSFOL8Luo6xgaydPonkZFaCn9HY6n6Jo_qsAUn9fGO00txWPIk1qYsZEzweD7zEMKjqUtM1jiDpQphHmpmUblsAmuYrGEODJW4f\/s16000\/Critical%20Atlassian%20Flaw%20%286%29.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhAeAS8alb4haQnVHHUi3eLpwxJKGUsTABOdmqCgXe0zrx66fWXpKrVLK9DOWbjXT8Rb-r68jJi1MvUlm8Stz0mvvc2-DSFOL8Luo6xgaydPonkZFaCn9HY6n6Jo_qsAUn9fGO00txWPIk1qYsZEzweD7zEMKjqUtM1jiDpQphHmpmUblsAmuYrGEODJW4f\/s16000\/Critical%20Atlassian%20Flaw%20%286%29.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhAeAS8alb4haQnVHHUi3eLpwxJKGUsTABOdmqCgXe0zrx66fWXpKrVLK9DOWbjXT8Rb-r68jJi1MvUlm8Stz0mvvc2-DSFOL8Luo6xgaydPonkZFaCn9HY6n6Jo_qsAUn9fGO00txWPIk1qYsZEzweD7zEMKjqUtM1jiDpQphHmpmUblsAmuYrGEODJW4f\/s16000\/Critical%20Atlassian%20Flaw%20%286%29.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhAeAS8alb4haQnVHHUi3eLpwxJKGUsTABOdmqCgXe0zrx66fWXpKrVLK9DOWbjXT8Rb-r68jJi1MvUlm8Stz0mvvc2-DSFOL8Luo6xgaydPonkZFaCn9HY6n6Jo_qsAUn9fGO00txWPIk1qYsZEzweD7zEMKjqUtM1jiDpQphHmpmUblsAmuYrGEODJW4f\/s16000\/Critical%20Atlassian%20Flaw%20%286%29.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhAeAS8alb4haQnVHHUi3eLpwxJKGUsTABOdmqCgXe0zrx66fWXpKrVLK9DOWbjXT8Rb-r68jJi1MvUlm8Stz0mvvc2-DSFOL8Luo6xgaydPonkZFaCn9HY6n6Jo_qsAUn9fGO00txWPIk1qYsZEzweD7zEMKjqUtM1jiDpQphHmpmUblsAmuYrGEODJW4f\/s16000\/Critical%20Atlassian%20Flaw%20%286%29.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhAeAS8alb4haQnVHHUi3eLpwxJKGUsTABOdmqCgXe0zrx66fWXpKrVLK9DOWbjXT8Rb-r68jJi1MvUlm8Stz0mvvc2-DSFOL8Luo6xgaydPonkZFaCn9HY6n6Jo_qsAUn9fGO00txWPIk1qYsZEzweD7zEMKjqUtM1jiDpQphHmpmUblsAmuYrGEODJW4f\/s16000\/Critical%20Atlassian%20Flaw%20%286%29.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":35068,"url":"https:\/\/kalilinuxtutorials.com\/wireshark-network-traffic-analysis\/","url_meta":{"origin":11822,"position":5},"title":"Getting Started with Wireshark: Network Traffic Analysis","author":"Rajashekar Yasani","date":"May 6, 2016","format":false,"excerpt":"Wireshark is a powerful and widely-used network protocol analyzer that allows users to capture and interactively browse the traffic running on a computer network. This guide will walk you through the basics of how Wireshark works, how to analyze network traffic, its features, and technical specifications. How Wireshark Works Wireshark\u2026","rel":"","context":"In &quot;Web Application Security&quot;","block_context":{"text":"Web Application Security","link":"https:\/\/kalilinuxtutorials.com\/category\/web-application-security\/"},"img":{"alt_text":"Wireshark","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiHtZ8KQ1NFJ9rxpOlfXHHSm9hdpSuDRbIWQHH_EdW7PlteTd4YOmH4IPRedruA0vhc-ESu4mtc-Y4by3Z3utczWmRNRuHc3Xo76eRabN_U4lLX1ICcliy-gbLlG0mEAKR2OGEj4DX24IwdhNU9jBePIdzQIKlovQqA6C0lo0SPUOYPtMYFvdb0tyFyA-zL\/s16000\/Wireshark.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiHtZ8KQ1NFJ9rxpOlfXHHSm9hdpSuDRbIWQHH_EdW7PlteTd4YOmH4IPRedruA0vhc-ESu4mtc-Y4by3Z3utczWmRNRuHc3Xo76eRabN_U4lLX1ICcliy-gbLlG0mEAKR2OGEj4DX24IwdhNU9jBePIdzQIKlovQqA6C0lo0SPUOYPtMYFvdb0tyFyA-zL\/s16000\/Wireshark.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiHtZ8KQ1NFJ9rxpOlfXHHSm9hdpSuDRbIWQHH_EdW7PlteTd4YOmH4IPRedruA0vhc-ESu4mtc-Y4by3Z3utczWmRNRuHc3Xo76eRabN_U4lLX1ICcliy-gbLlG0mEAKR2OGEj4DX24IwdhNU9jBePIdzQIKlovQqA6C0lo0SPUOYPtMYFvdb0tyFyA-zL\/s16000\/Wireshark.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiHtZ8KQ1NFJ9rxpOlfXHHSm9hdpSuDRbIWQHH_EdW7PlteTd4YOmH4IPRedruA0vhc-ESu4mtc-Y4by3Z3utczWmRNRuHc3Xo76eRabN_U4lLX1ICcliy-gbLlG0mEAKR2OGEj4DX24IwdhNU9jBePIdzQIKlovQqA6C0lo0SPUOYPtMYFvdb0tyFyA-zL\/s16000\/Wireshark.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiHtZ8KQ1NFJ9rxpOlfXHHSm9hdpSuDRbIWQHH_EdW7PlteTd4YOmH4IPRedruA0vhc-ESu4mtc-Y4by3Z3utczWmRNRuHc3Xo76eRabN_U4lLX1ICcliy-gbLlG0mEAKR2OGEj4DX24IwdhNU9jBePIdzQIKlovQqA6C0lo0SPUOYPtMYFvdb0tyFyA-zL\/s16000\/Wireshark.png?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiHtZ8KQ1NFJ9rxpOlfXHHSm9hdpSuDRbIWQHH_EdW7PlteTd4YOmH4IPRedruA0vhc-ESu4mtc-Y4by3Z3utczWmRNRuHc3Xo76eRabN_U4lLX1ICcliy-gbLlG0mEAKR2OGEj4DX24IwdhNU9jBePIdzQIKlovQqA6C0lo0SPUOYPtMYFvdb0tyFyA-zL\/s16000\/Wireshark.png?resize=1400%2C800&ssl=1 4x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/11822","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=11822"}],"version-history":[{"count":0,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/11822\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/16598"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=11822"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=11822"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=11822"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}