Drücke "Enter", um den Text zu überspringen.

mifare classic 1k clone – block 0 uid

Anybody knows how to set the block 0 after the uid part?

 

Update: I need a 7 byte UID completely writable mifare classic 1k card

eBay: 7 Byte UID Changeable Card 1K S50 13.56MHz ISO14443A

 

Mathiass-MacBook-Pro:test mathias$ diff check.hex original.hex
1c1
< 00000000 04 e8 f9 c2 d7 08 04 00 46 59 25 58 49 10 23 02 |……..FY%XI.#.|

> 00000000 04 e8 f9 c2 a5 59 80 88 44 00 c8 20 00 00 00 00 |…..Y..D.. ….|

 

 

works:

Mathiass-MacBook-Pro:fitti mathias$ nfc-mfsetuid 04e8f9c2
NFC reader: ACS ACR122U / ACR122U214 opened
Sent bits: 26 (7 bits)
Received bits: 04 00
Sent bits: 93 20
Received bits: 04 e8 f9 c2 d7
Sent bits: 93 70 04 e8 f9 c2 d7 dc ee
Received bits: 08 b6 dd

Found tag with
UID: 04e8f9c2
ATQA: 0004
SAK: 08

Sent bits: 50 00 57 cd
Sent bits: 40 (7 bits)
Received bits: a (4 bits)
Sent bits: 43
Received bits: 0a
Card unlocked
Sent bits: a0 00 5f b1
Received bits: 0a
Sent bits: 04 e8 f9 c2 d7 08 04 00 46 59 25 58 49 10 23 02 0d 87
Received bits: 0a



problem:

Mathiass-MacBook-Pro:fitti mathias$ nfc-mfsetuid 04e8f9c2a55980884400c82000000000

NFC reader: ACS ACR122U / ACR122U214 opened

Sent bits:     26 (7 bits)

Received bits: 04  00

Sent bits:     93  20

Received bits: 04  e8  f9  c2  d7

Sent bits:     93  70  04  e8  f9  c2  d7  dc  ee

Received bits: 08  b6  dd




Found tag with

 UID: 04e8f9c2

ATQA: 0004

 SAK: 08




Sent bits:     50  00  57  cd

Sent bits:     40 (7 bits)

Received bits: a (4 bits)

Sent bits:     43

Received bits: 0a

Card unlocked

Sent bits:     a0  00  5f  b1

Received bits: 0a

Sent bits:     04  e8  f9  c2  d7  59  80  88  44  00  c8  20  00  00  00  00  25  47

Received bits: 0a

Mathiass-MacBook-Pro:fitti mathias$ nfc-list

nfc-list uses libnfc libnfc-1.7.1-191-g216145f

NFC device: ACS ACR122U / ACR122U214 opened

1 ISO14443A passive target(s) found:

ISO/IEC 14443A (106 kbps) target:

    ATQA (SENS_RES): 88  80

       UID (NFCID1): 04  e8  f9  c2

      SAK (SEL_RES): 59



Mathiass-MacBook-Pro:fitti mathias$ mfoc -O check.dmp -k 3e65e4fb65b3 -k 81cc25ebbb6a

The custom key 0x3e65e4fb65b3 has been added to the default keys

The custom key 0x81cc25ebbb6a has been added to the default keys

mfoc: ERROR: Cannot determine card type from SAK

 

Mathiass-MacBook-Pro:fitti mathias$ nfc-mfclassic W a U04e8f9c2 original.dmp check.dmp
Attempting to use specific UID: 0x 4 0xe8 0xf9 0xc2
NFC reader: ACS ACR122U / ACR122U214 opened
Found MIFARE Classic card:
ISO/IEC 14443A (106 kbps) target:
ATQA (SENS_RES): 00 04
UID (NFCID1): 04 e8 f9 c2
SAK (SEL_RES): 08
Guessing size: seems to be a 1024-byte card
Sent bits: 50 00 57 cd
Sent bits: 40 (7 bits)
Received bits: a (4 bits)
Sent bits: 43
Received bits: 0a
Card unlocked
Writing 64 blocks |!
Error: incorrect BCC in MFD file!
Expecting BCC=D7

Mathiass-MacBook-Pro:fitti mathias$ nfc-mfclassic w a U04e8f9c2 original.dmp check.dmp
Attempting to use specific UID: 0x 4 0xe8 0xf9 0xc2
NFC reader: ACS ACR122U / ACR122U214 opened
Found MIFARE Classic card:
ISO/IEC 14443A (106 kbps) target:
ATQA (SENS_RES): 00 04
UID (NFCID1): 04 e8 f9 c2
SAK (SEL_RES): 08
Guessing size: seems to be a 1024-byte card
Writing 64 blocks |...............................................................|
Done, 63 of 64 blocks written.

Mathiass-MacBook-Pro:fitti mathias$ diff check.hex original.hex
1c1
< 00000000 04 e8 f9 c2 d7 08 04 00 46 59 25 58 49 10 23 02 |........FY%XI.#.|
---
> 00000000 04 e8 f9 c2 a5 59 80 88 44 00 c8 20 00 00 00 00 |.....Y..D.. ....|

 

Mathiass-MacBook-Pro:fitti mathias$ nfc-list
nfc-list uses libnfc libnfc-1.7.1-191-g216145f
NFC device: ACS ACR122U / ACR122U214 opened
1 ISO14443A passive target(s) found:
ISO/IEC 14443A (106 kbps) target:
ATQA (SENS_RES): 00 44
UID (NFCID1): 04 e8 f9 c2 a5 59 80
SAK (SEL_RES): 08


Mathiass-MacBook-Pro:fitti mathias$ nfc-list
nfc-list uses libnfc libnfc-1.7.1-191-g216145f
NFC device: ACS ACR122U / ACR122U214 opened
1 ISO14443A passive target(s) found:
ISO/IEC 14443A (106 kbps) target:
ATQA (SENS_RES): 00 04
UID (NFCID1): 04 e8 f9 c2
SAK (SEL_RES): 08

3 Comments

  1. Peter Mai 30, 2018

    konntest du das Problem schon lösen?

    habe selber hier eine 7 byte mifare karte, die sich ums verrecken nicht kopieren lässt. die keys finden ist kein problem, aber ich bekomme die karte nicht kopiert, da ich nur eine 4 byte blankokarte habe

    • mathias Mai 30, 2018

      Die Frage ist halt wo man eine Mifare Classic 1K Karte mit einer 7 Byte UID herbekommt wo komplett beschreibbar ist……

Schreibe einen Kommentar

Deine E-Mail-Adresse wird nicht veröffentlicht. Erforderliche Felder sind mit * markiert.