Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Noob trying to clone / emulate a MiFare Classic 1k #73

Open
Eskigloos opened this issue Sep 21, 2021 · 0 comments
Open

Noob trying to clone / emulate a MiFare Classic 1k #73

Eskigloos opened this issue Sep 21, 2021 · 0 comments

Comments

@Eskigloos
Copy link

Hi all,

I've been trying to clone / emulate a MiFare Classic 1K card for a while now to no avail. The only tools I have are (1) a Chameleon Tiny Pro; and (2) Kali Linux run off VirtualBox on my Mac, where I installed the LibNFC, MFOC and MFCUK.

I bought an electronic door lock from Amazon that runs on batteries, with corresponding MF Classic 1k key cards. Thought it would be a good tool to get started.

The steps I did were as follows (On Android Chameleon app):

  1. Hit "UID Clone", placed key card on Chameleon Tiny Pro (CTP), hit "write"
  2. Changed type from "MF_CLASSIC_1K" to "MF_DETECTION_1K"
  3. Place CTP in between card and reader when unlocking the electronic door lock
  4. There will be about 15 white flashes from the CTP (I assume some data is captured)
  5. Place CTP behind the android phone (built in NFC reader)
  6. Hit "Crack" - managed to decrypt one key "d3f7d3f7d3f7"
  7. How do I proceed on from here with MFOC? Or are there other methods?

Have been stuck for a while now. Hopefully someone can shed some light for a noob =)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant