Proxmark3 community

Research, development and trades concerning the powerful Proxmark3 device.

Remember; sharing is caring. Bring something back to the community.


"Learn the tools of the trade the hard way." +Fravia

  • Logged in as ikarus
  • Last visit: Today 11:22:42

Announcement

Time changes and with it the technology
Proxmark3 @ discord

Users of this forum, please be aware that information stored on this site is not private.

#1 2022-04-07 07:53:05

Dan1234
Contributor
Registered: 2022-03-30
Posts: 5

can't seem to clone a mifare card with a pm3 easy

Client.... Iceman/master/v4.14831-531-g190508339 2022-04-06 11:55:13
Bootrom... Iceman/master/v4.14831-531-g190508339 2022-04-06 11:53:31
OS........ Iceman/master/v4.14831-531-g190508339 2022-04-06 11:54:00
Target.... PM3 GENERIC

Hi folks,

I'm trying to clone a mifare 1k card to a magic card..

Pm3 is working correctly as far as I know

I ran
hf mf chk on both cards to find the respective CUID's

then I ran
hf mf csetuid -u f9c6d99e -a 0004 -s08 and successfully changed the CUID ATQA and the SAK on the magic card to match the source card

then I ran
hf mf nested --1k --blk 19 -a -k FFFFFFFFFFFF --dump because block 19 was the first readable key

it then successfully decrypted and dumped the card showing hex numbers where before they were only --------------

the feedback from the client was
Found keys have been dumped to hf-mf-F9C6D99E-key-6.bin

then I ran
hf mf restore --1k --uid F9C6D99E -k hf-mf-F9C6D99E-key-6.bin on the magic card

and the response was . . .
[-] Error - can't find `hf-mf-F9C6D99E-dump.bin`

not sure where to go from here? do I do a dump prior to the nested attack and then after the attack? is there another dump file I'm supposed to create (hf-mf-F9C6D99E-dump.bin) ?

Any help would be appreciated!

Dan

Offline

#2 2022-04-11 02:22:28

Dan1234
Contributor
Registered: 2022-03-30
Posts: 5

Re: can't seem to clone a mifare card with a pm3 easy

So I was able to clone the card . . . it's a learning process for sure.

the trick was to combine a dump with the nested attack for the keys, then to do a general dump to dump the data.

It went like this . . .

first the nested attack combined with a dump
hf mf nested --1k --blk 19 -a -k FFFFFFFFFFFF --dump

then the general data dump
hf mf dump

then after swapping with the magic card
hf mf restore

I have yet to do extensive testing on the clone but so far the results are promising!

I installed and ran the "super hex editor" from the microsoft store in order to check the binary files.

Offline

#3 2022-04-11 16:51:37

iceman
Administrator
Registered: 2013-04-25
Posts: 9,468
Website

Re: can't seem to clone a mifare card with a pm3 easy

good learning..

hf mf autopwn -h
hf mf view -h
data diff -h

Offline

Quick reply

Write your message and submit

Board footer

Powered by FluxBB