Hello everyone,
I am trying to recover the keys of a genuine MIFARE Classic EV1 card using my Proxmark3, but I am running into several issues and I need guidance. Here is a detailed description of what I have tried so far:
Card detection
hf search
-
Result: MIFARE Classic 1K detected.
-
UID detected correctly.
Initial attempt with hf mf autopwn
hf mf autopwn
-
Detected the card as MIFARE Classic EV1.
-
Loaded 5 user keys and 61 hardcoded keys.
-
Targeted sectors 0, 16, 17 successfully and found some valid keys:
-
Sector 0 Key A:
A0A1A2A3A4A5 -
Sector 16 Key A:
5C8FF9990DA2 -
Sector 16 Key B:
D01AFEEB890A -
Sector 17 Key A:
75CCB59C9BED -
Sector 17 Key B:
4B791BEA7BCC
-
-
Attempted further attacks on other sectors but encountered repeated errors:
[#] AcquireEncryptedNonces: Can't select card (UID)
[#] AcquireEncryptedNonces: Auth1 error
[-] No match for the First_Byte_Sum (127), is the card a genuine MFC Ev1?
Hardnested attack attempts
- Commands used:
hf mf hardnested --blk 0 -a -k A0A1A2A3A4A5 --tblk 1 --ta
hf mf hardnested -r --tk A0A1A2A3A4A5 --i2
-
Observations:
-
PM3 successfully detected the EV1 card and loaded nonces from file.
-
Attack tried all guesses for Sum(a8) with bitflip properties applied.
-
None of the attempts recovered the key for sector 1.
-
Final result:
-
[-] Failed to recover a key...
- All logs indicate Auth1/Auth2 errors and inability to select the card for certain operations.
Attempts at brute-force with user/hard keys
-
I have tried loading user keys and hard keys files with
hf mf setuserkeysandhf mf sethardkeys. -
Commands like:
hf mf autopwn --blk 1 --ta
hf mf autopwn --blk 1 --tb
-
The brute-force attempts with known keys did not succeed.
-
Likely cause: genuine EV1 uses random keys per sector, and software-only attacks cannot derive them.
Side-channel consideration
-
I understand that software attacks fail on genuine EV1.
-
I am aware that side-channel attacks (power analysis, EM analysis, or fault injection) are theoretically effective but require additional lab equipment (and i dont have it).
Summary of the problem
-
Sectors like 0, 16, 17 are readable with known keys.
-
Sector 1 (and likely others) cannot be accessed: all hardnested, nested, or brute-force attacks with keys known online fail.
-
PM3 errors observed:
-
Auth1 error/Auth2 error len=1 -
Can't select card (UID) -
Failed to recover a key
-
-
Goal: Recover keys for sector 1 (and possibly others) of a genuine EV1.
Questions / Help requested
-
Is there any software-only method to recover sector keys on a genuine EV1?
-
Are there special tricks or advanced PM3 features that I might not be aware of?
-
Don’t tell me the only option is to do a side-channel attack (or attacks that include other hardware) because I don’t have the tools and I’m broke asf
.
Thank you in advance for your guidance!


