Has anyone played with the MrKeyFob cloning app? Have figured out all of the DRM it uses for LF rfids (password and trace data) and mifares (special UID and some data in 1 block) but have not figured what it uses for iClass. From my understanding from inspecting the blank MrKeyFob iClass fobs and preliminary inspection of decompiling the .exe, it uses some data on block 18 that is unique to each fob most likely tied into the CSN. This value changes when a credential is is written to it using the app.
I can share the app, dumps, and sniffs for validating a blank, writing, wiping
Already started scrutinizing the decompiled version
well we’re all in this together in figuring out what exactly MrKeyFob uses for its own proprietary DRM. Also interesting how MKF explicitly violates the pm3 open source license by not publishing the code.
Pm’d you - also have more information in terms of sniffing the transaction from pm3 running MKF software and iClass tag. Not too much useful information but the more info we have on this the better.