Open noproto opened 1 month ago
The tag is a 4B UID NXP MIFARE Classic MFC1C14_x. It appears to be possible to emulate a physical tag (if necessary) using certain magic tags if a MIFARE Classic 1K EV1 is not on hand/available: https://github.com/RfidResearchGroup/proxmark3/blob/master/doc/magic_cards_notes.md#uscuid-configuration-guide
I just ordered few 1k ev1 4b and 7b cards (maybe we have them available on hand)
Describe the bug.
I have a MIFARE Classic 1K EV1 tag which I read with the Flipper and received this result:
Reading the same tag with the Proxmark results in:
Because
sectors_total
is miscalculated, this is interfering with the dictionary attack (which is not attempting to read the two signature sectors or discover these keys) and further may cause the card to fail emulation at a legitimate reader.Reproduction
Using an EV1 1K tag, read with official NFC app. Note 16 sectors and 32 keys tested.
Target
12.F7B9C6 R02, OFW 0.105.0
Logs
No response
Anything else?
No response