Hi I received a Mct file of a dump but I haven’t android devices, I have only a proxmark. Is there a file converter to do this? Tnx
There’s a pretty nifty online dump editor:
But it seems to only support the F0 and MCT, not PM3. I’m not certain if there’s any cross compatibility of dumps there…
If you would like, I can provide you with a generic MFC PM3 dump file, and you can try to manually copy the data over
Or, inversely if you would be willing to share the file you have I can do the conversion
the pm3 client should open that file without issues
Thankyou iceman I saw only the output format of my dump with pm3, I never tried to open others. I’ll try soon, probably I have to upgrade my pm3 before….
hi, today i’m tring to write a mct dump to this card
[+] UID: A7 72 9C 50
[+] ATQA: 00 04
[+] SAK: 08 [2]
[+] Possible types:
[+] MIFARE Classic 1K
[=] proprietary non iso14443-4 card found, RATS not supported
[+] Magic capabilities… Gen 2 / CUID
[+] Prng detection… weak
i tried hf-mf cload -f filename.mct --1k
[+] Loaded 1024 bytes from MCT file filename.mct
[=] Copying to magic gen1a card
[=] .[#] wupC1 error
[!] Can’t set magic card block: 0
hf mf -f filename.mct -k hf-mf-A7729C50-key.bin
and command list appear….
i don’t see gen2 specific commands. wich one can i use? tnx
i need to clone the original dump with same uid so i found this 1k mifare uid modifiable of lab401
The card you have is a Gen2 then? Or are you unsure? You can check with hf mf info
Is missing a command, which is why it shows you the list, you need something between hf mf and -f.
hf mf restore, maybe, if you were looking for Gen2?
If you do have a Gen2 target card, then you may try:
hf mf restore -f filename.mct -k hf-mf-A7729C50-key.bin --ka --force, with -k being the keyfile for the target card, not the source card
[usb] pm3 → hf mf info
[=] — ISO14443-a Information ---------------------
[+] UID: A7 72 9C 50
[+] ATQA: 00 04
[+] SAK: 08 [2]
[=] — Keys Information
[+] loaded 2 user keys
[+] loaded 61 keys from hardcoded default array
[+] Sector 0 key A… FFFFFFFFFFFF
[+] Sector 0 key B… FFFFFFFFFFFF
[+] Sector 1 key A… FFFFFFFFFFFF
[+] Block 0… A7 72 9C 50 19 08 04 00 62 63 64 65 66 67 68 69
[=] — Fingerprint
[+] FUDAN based card
[=] — Magic Tag Information
[+] Magic capabilities… Gen 2 / CUID
[=] — PRNG Information
[+] Prng… weak
Yep, it’s a Gen2. Which it actually shows at the start of your last post too, if I was paying attention, my bad ![]()
cload is only for Gen1 credentials, so it wouldn’t work for you, try that restore command
i’m idiot!!! tnks seems written!!