Research, development and trades concerning the powerful Proxmark3 device.
Remember; sharing is caring. Bring something back to the community.
"Learn the tools of the trade the hard way." +Fravia
You are not logged in.
Time changes and with it the technology
Proxmark3 @ discord
Users of this forum, please be aware that information stored on this site is not private.
Pages: 1
So I've had success cloning my Mifare Classic 1k:
ATQA : 04 00
UID : 3a 10 bf bc 00 00 00 00 ee a0 dd 77
SAK : 08 [2]
SAK : MIFARE CLASSIC 1K
proprietary non-iso14443a card found, RATS not supported
isOk:01
I'm now trying a slightly different card:
ATQA : 04 00
UID : 6c 47 b0 73 00 00 00 00 ee a0 dd 77
SAK : 08 [2]
SAK : MIFARE CLASSIC 1K
proprietary non-iso14443a card found, RATS not supported
I ran hf mf mifare, it spat out about 160 periods before it found an invalid key and gave me an Nt value. I ran hf mf mifare <Nt> and it took slightly longer to produce another invalid key and a different Nt value. Previously on this second pass I got a 12-digit hexadecimal number I could then plug into hf mf nested and get the A and B keys, but this time around I just got another invalid key and a different Nt value.
I'm running it a third time on the second Nt value, but it's up to about 770 periods without a result.
Any suggestions? I'm using build 486.
Offline
You can solve the problem ??? i have the problem too
Offline
Pages: 1