Extracting card content and working with EMV commands can be interesting for more than just research purposes. There are several types of attacks on contactless bank cards, the implementation of which will be described under the cut.
Introduction
This year I got into the Summer of Hack 2019...