Mct to bin for proxmark

Hi I received a Mct file of a dump but I haven’t android devices, I have only a proxmark. Is there a file converter to do this? Tnx

1 Like

There’s a pretty nifty online dump editor:

But it seems to only support the F0 and MCT, not PM3. I’m not certain if there’s any cross compatibility of dumps there…

If you would like, I can provide you with a generic MFC PM3 dump file, and you can try to manually copy the data over

Or, inversely if you would be willing to share the file you have I can do the conversion

4 Likes

It kinda sounds like the PM3 client already does this.

4 Likes

the pm3 client should open that file without issues

3 Likes

Thankyou iceman I saw only the output format of my dump with pm3, I never tried to open others. I’ll try soon, probably I have to upgrade my pm3 before….

1 Like

hi, today i’m tring to write a mct dump to this card

[+] UID: A7 72 9C 50
[+] ATQA: 00 04
[+] SAK: 08 [2]
[+] Possible types:
[+] MIFARE Classic 1K
[=] proprietary non iso14443-4 card found, RATS not supported
[+] Magic capabilities… Gen 2 / CUID
[+] Prng detection… weak

i tried hf-mf cload -f filename.mct --1k

[+] Loaded 1024 bytes from MCT file filename.mct
[=] Copying to magic gen1a card
[=] .[#] wupC1 error
[!] Can’t set magic card block: 0

hf mf -f filename.mct -k hf-mf-A7729C50-key.bin

and command list appear….

i don’t see gen2 specific commands. wich one can i use? tnx

i need to clone the original dump with same uid so i found this 1k mifare uid modifiable of lab401

1 Like

The card you have is a Gen2 then? Or are you unsure? You can check with hf mf info

Is missing a command, which is why it shows you the list, you need something between hf mf and -f.
hf mf restore, maybe, if you were looking for Gen2?

If you do have a Gen2 target card, then you may try:

hf mf restore -f filename.mct -k hf-mf-A7729C50-key.bin --ka --force, with -k being the keyfile for the target card, not the source card

1 Like

[usb] pm3 → hf mf info

[=] — ISO14443-a Information ---------------------
[+] UID: A7 72 9C 50
[+] ATQA: 00 04
[+] SAK: 08 [2]

[=] — Keys Information
[+] loaded 2 user keys
[+] loaded 61 keys from hardcoded default array
[+] Sector 0 key A… FFFFFFFFFFFF
[+] Sector 0 key B… FFFFFFFFFFFF
[+] Sector 1 key A… FFFFFFFFFFFF
[+] Block 0… A7 72 9C 50 19 08 04 00 62 63 64 65 66 67 68 69

[=] — Fingerprint
[+] FUDAN based card

[=] — Magic Tag Information
[+] Magic capabilities… Gen 2 / CUID

[=] — PRNG Information
[+] Prng… weak

1 Like

Yep, it’s a Gen2. Which it actually shows at the start of your last post too, if I was paying attention, my bad :classic_tongue:

cload is only for Gen1 credentials, so it wouldn’t work for you, try that restore command

3 Likes

i’m idiot!!! tnks seems written!!

1 Like