Hi I am new to this world so this is prob a newb question but I have a few questions regarding whether a Proxmark3 Easy from DT vs a Proxmark3 RVD4 from HW is the right tool to solve my problem which is to copy a Mifare Classic 1K fob (I think? photos below).
After sifting thru the internet I can’t find the exact answers and it seems like this community has a lot of knowledge. Here is my question let me know if anyone can help:
I was trying to copy the Fob in this photo below with my flipper zero
I tried loading on the Xtreme Firmware and running the MFKey32 but no luck finding more keys.
I have access to my key and the reader and from all the searching it seems like the best tool to get these missing keys is the Proxmark3 but not sure which one is the better one for this specific job. Also I am Mac based so just want to make sure there is an easy solution for using the Proxmark3 on a Mac.
Let me know if anyone can help or if you need more info or photos to help me make this decision
@Pmjens extreme has been dead for 9 months seriously stop using it. update to latest momentum there is a wealth of key recovery tools for mifare classic that have been implemented this year. follow this guide when you have updated
if you do want a proxmark, you do not need an rdv4 for the simple task of copying a mifare classic.
Blockquote[quote=“Equipter, post:4, topic:23789, full:true”]
unlock wih reader is for mifare ultralight
@Pmjens extreme has been dead for 9 months seriously stop using it. update to latest momentum there is a wealth of key recovery tools for mifare classic that have been implemented this year. follow this guide when you have updated
if you do want a proxmark, you do not need an rdv4 for the simple task of copying a mifare classic.
[/quote]
Great thank you so much for the info–have gone and updated to Momentum already and will report back if that was enough to get the job done. Thanks again!
Here is what I got back with Flipper with updated Momentum firmware.
I first read the card/fob using the flipper Nfc “read” feature and then went to the saved file and used the “extract MF Keys” and tapped the flipper up against the actual reader (see photo below) which said it read nonces.
Then I attempted to Read the card again to see if it had any more sectors or keys available and it was still:
Keys Found: 28/32
Sectors Read: 14/16
Let me know if this is as far as the flipper can take me with this specific key? If so I am willing to buy the Proxmark3 to crack this thing–just want to make sure it can be done using the Proxmark3
Have you tried a nested attack? If you go to apps → NFC → Mifare Nested.
Edit: whoops apparently the app no longer works on new fw versions. Anyway you should be able to downgrade, crack the key, then go back to a newer version.
Did you manage to figure this out? I just realized that the nested attack is built into the newest version of the NFC app.
I tested writing a random key to a card, read it using NFC → Read, then used the Flipper MFKey app to crack the nonces and was able to successfully find the key, though I used a 1k card and not a 4k.
Noting that I didn’t use the “Extract MFC keys” feature or access a reader.
Not sure if this is different from what you tried or not though.