Research, development and trades concerning the powerful Proxmark3 device.
Remember; sharing is caring. Bring something back to the community.
"Learn the tools of the trade the hard way." +Fravia
You are not logged in.
Time changes and with it the technology
Proxmark3 @ discord
Users of this forum, please be aware that information stored on this site is not private.
Client.... Iceman/master/v4.14831-531-g190508339 2022-04-06 11:55:13
Bootrom... Iceman/master/v4.14831-531-g190508339 2022-04-06 11:53:31
OS........ Iceman/master/v4.14831-531-g190508339 2022-04-06 11:54:00
Target.... PM3 GENERIC
Hi folks,
I'm trying to clone a mifare 1k card to a magic card..
Pm3 is working correctly as far as I know
I ran
hf mf chk on both cards to find the respective CUID's
then I ran
hf mf csetuid -u f9c6d99e -a 0004 -s08 and successfully changed the CUID ATQA and the SAK on the magic card to match the source card
then I ran
hf mf nested --1k --blk 19 -a -k FFFFFFFFFFFF --dump because block 19 was the first readable key
it then successfully decrypted and dumped the card showing hex numbers where before they were only --------------
the feedback from the client was
Found keys have been dumped to hf-mf-F9C6D99E-key-6.bin
then I ran
hf mf restore --1k --uid F9C6D99E -k hf-mf-F9C6D99E-key-6.bin on the magic card
and the response was . . .
[-] Error - can't find `hf-mf-F9C6D99E-dump.bin`
not sure where to go from here? do I do a dump prior to the nested attack and then after the attack? is there another dump file I'm supposed to create (hf-mf-F9C6D99E-dump.bin) ?
Any help would be appreciated!
Dan
Offline
So I was able to clone the card . . . it's a learning process for sure.
the trick was to combine a dump with the nested attack for the keys, then to do a general dump to dump the data.
It went like this . . .
first the nested attack combined with a dump
hf mf nested --1k --blk 19 -a -k FFFFFFFFFFFF --dump
then the general data dump
hf mf dump
then after swapping with the magic card
hf mf restore
I have yet to do extensive testing on the clone but so far the results are promising!
I installed and ran the "super hex editor" from the microsoft store in order to check the binary files.
Offline
good learning..
hf mf autopwn -h
hf mf view -h
data diff -h
Offline