I got a Proxmark3 and Magic Ring. After a learning curve and learning the basics I managed to get around well with the major commands.
However, the fob I want to clone does not just rely on the UID, but rather has multiple encrypted blocks.
autopwn solves this, but when copying the .eml file that results from the autopwn, it shows:
[usb] pm3 → hf mf cload -f example-key.eml
[+] loaded 1024 bytes from text file example-key.eml
[=] Copying to magic gen1a card
[=] .[#] wupC1 error
[!] Can’t set magic card block: 0
The Magic ring is a gen 2 magic mifare, not a gen 1 so you don’t need the backdoor. You should be able to just do a restore of the dump to the ring although you might then need to write block 0 yourself.
The cload command is failing because there is no backdoor on the magic ring.
Hi @Zwack and @amal ! I’ve been trying to unbrick this v1 magic ring. But now I’m getting BCC0 incorrect error, and can’t make it work. Could you have a quick look?
[usb] pm3 → hf mf csetuid -u BEF256C2
[#] wupC1 error
[=] couldn’t get old data. Will write over the last bytes of block 0
[+] new block 0… BEF256C2D80000000000000000000000
[#] wupC1 error
[!!] Can’t set UID. error -1
[usb] pm3 →