Research, development and trades concerning the powerful Proxmark3 device.
Remember; sharing is caring. Bring something back to the community.
"Learn the tools of the trade the hard way." +Fravia
You are not logged in.
Time changes and with it the technology
Proxmark3 @ discord
Users of this forum, please be aware that information stored on this site is not private.
Hi All,
I am trying emulate a iso14443a DESfire key. WHen I type HF SEARCH command I get the below.
====================================
proxmark3> hf search
UID : 04 4b 0c ea 3b 38 80
ATQA : 03 44
SAK : 20 [1]
TYPE : NXP MIFARE DESFire 4k | DESFire EV1 2k/4k/8k | Plus 2k/4k SL3 | JCOP 31/41
MANUFACTURER : NXP Semiconductors Germany
ATS : 06 75 77 81 02 80 02 f0
- TL : length is 6 bytes
- T0 : TA1 is present, TB1 is present, TC1 is present, FSCI is 5 (FSC = 64)
- TA1 : different divisors are supported, DR: [2, 4, 8], DS: [2, 4, 8]
- TB1 : SFGI = 1 (SFGT = 8192/fc), FWI = 8 (FWT = 1048576/fc)
- TC1 : NAD is NOT supported, CID is supported
- HB : 80
Answers to chinese magic backdoor commands: NO
Valid ISO14443A Tag Found - Quiting Search
=================================
for cloning it I used the command - script run mifare_autopwn
which return the error saying card cannot be detected. I tried raising the height but same result. Can someone help me with the command I can use to copy this type of key.
Thanks.
Offline
1) what tags did you use to clone a mifare desfire card ?
2) Even given a correct blank magic uid card from my store, you probably need the 3des password to first extract the data and after which clone such a tag
3) i believe the mifare_autopwn is for mifare classic not the mifare desfire.
4) the height isn't the issue
I guess I will be the only one replying to this trend as your question is pretty wrong to start with.
Offline