Thanks Iceman, you literally opened this door for the community, wish you can do a second video on MIFARE Classic EV1, with more details about signatures and the additional two encryption keys 16&17, how to clone, and the possibility of emulation via Chameleon tiny/Ultra!
For MIFARE Classic there is many of them. It depends on your rfid device you are using to read the cards. Android, use MCT app Flipper, use flipper Chameleon, use chameleon app Proxmark, use native client arduino / any pcsc reader, use libnfc
@@iceman1001 and I was thinking to buy a proxmark3 just for that : encrypted static nonce . It is strange how this can't be cracked as I saw that the mifare card that have this encrypted static nonce , I got 4 keys from it . I know that if you find at least one key , you can do nested attacks .
You will need to have access to all keys for that particular card. And then you will need a Reader/Writer device, either android phone, flipper, proxmark3 or other ones. Then you would use the methods available for the particular device you choose.
hello I need help to clone a 14443-a tag with the iceman version when I run hf mf chk --1k --dump everything goes correctly the files are saved in the root folder but when restoring with hf mf restore --k --uid xxxxxxxxxx -k hf-mf-xxxxxxxxx-key.bin it is indicated error-can't find hf-mf yet the file is present thank you for your help
Thanks Iceman you are such a great staple of this community!
Thank you for your kind words!
Very nice to see these videos of comparing cards.
Glad you like them!
Hope so videos will keep coming. 🤞
That's the plan!
New SUB here :)
What a great video! thank you for investing your time into this.
> BTW, which REV of Proxmark are you using?
Thank you!
Thanks for the sub!
I use my trusty old RDV4.01
Thank you!
Thanks Iceman, you literally opened this door for the community,
wish you can do a second video on MIFARE Classic EV1, with more details about signatures and the additional two encryption keys 16&17, how to clone, and the possibility of emulation via Chameleon tiny/Ultra!
Thanks for the idea!
let me see what I can come up with
@@iceman1001 Looking forward :)
Good video , THANKS
Happy to hear it!
this may be a very dumb question but what is the rg tool you are using?
Good question,
its called "ripgrep". I find it quite fast and easy to work with.
@@iceman1001 cheers really appreciate that
hello! CUID magic card in nessesary to clone this one?
A Gen2 / CUID might work.
As always when making a duplicate you must verify with the system if it accepts it.
Will this work using iCopy XS CLI? I see proxmark3 is under the hood..
that is the problem. the icopy-x uses an proxmark3 w firmware and client from 2020. Its not maintained.
Alguém sabe qual software, e usado para conseguir, chave de acesso de cartão rfid,mifaire
For MIFARE Classic there is many of them. It depends on your rfid device you are using to read the cards.
Android, use MCT app
Flipper, use flipper
Chameleon, use chameleon app
Proxmark, use native client
arduino / any pcsc reader, use libnfc
Can static encrypted nonce can be cracked with proxmark3 ?
That is a good question.
The short answer is no. No key recovery is possible yet.
@@iceman1001 and I was thinking to buy a proxmark3 just for that : encrypted static nonce . It is strange how this can't be cracked as I saw that the mifare card that have this encrypted static nonce , I got 4 keys from it . I know that if you find at least one key , you can do nested attacks .
Hello How to erase mfiare ?thanks
You will need to have access to all keys for that particular card.
And then you will need a Reader/Writer device, either android phone, flipper, proxmark3 or other ones.
Then you would use the methods available for the particular device you choose.
@@iceman1001 do you know where I could get the proxdroid Android application the link is dead in the repository github thanks in advance
Sorry, I don't know. How about you search some more? Most likely on one of the github, gitlab sites
hello I need help to clone a 14443-a tag with the iceman version when I run hf mf chk --1k --dump everything goes correctly the files are saved in the root folder but when restoring with hf mf restore --k --uid xxxxxxxxxx -k hf-mf-xxxxxxxxx-key.bin it is indicated error-can't find hf-mf yet the file is present thank you for your help
you seem to have wrong syntax for your restore command. Take a look at it.