Closed mh- closed 2 years ago
I also have this problem with my bus pass, wrote here: https://github.com/flipperdevices/flipperzero-firmware/issues/1904#issuecomment-1295952022
I have one Mifrare Desfire which was read by FZ previously as an Unknown ISO tag
and I was able to save and also emulate its UID without any issues. My Android phone with the NFC Tools PRO app was telling me this is actually a Mifare Desfire, otherwise I wouldn't have known.
Fixed in #2041 thanks to @mh-
Describe the bug.
This is related to #1730, but I want to clarify that I do not expect the encrypted (and thus unreadable) data to be saved. What I do want is that the UID is saved and can be emulated later, by opening a "saved" card.
I only have one particular DESFire card, and it is possible to use a cloned version of that card in its system, by just emulating the UID. I know this works, because the Android app "NFC Card Emulator Pro (Root)" can do that. Of course, only the UID can be cloned, no encrypted data, but the reader accepts it anyway.
Now, after reading this card, the data which is saved by the firmware is 'a bit short', because of these problems
so the file ends after the
Application IDs:
This causes the "Can not parse file" screen, and nothing can be done with this file. So I suggest to accept such file (as it was written by the firmware previously) and only emulate the UID, no apps. I will provide a simple PR for that.
Reproduction
.nfc
fileTarget
No response
Logs
No response
Anything else?
There is a follow-up bug - when trying to emulate the UID of that specific card immediately after the "Read", the external reader will not accept the emulation; and this apparently continues until the Flipper is rebooted, also when using the data from the saved file (which I did after applying the mentioned PR).