I succesfully did an HF autopwn of my tag with below output:
" pm3 → hf search
[-] Searching for ISO14443-A tag…
[+] UID: 04 XX XX XX XX XX XX
[+] ATQA: 00 44
[+] SAK: 08 [2]
[+] MANUFACTURER: NXP Semiconductors Germany
[+] Possible types:
[+] MIFARE Classic 1K CL2
[=] proprietary non iso14443-4 card found, RATS not supported
[+] Prng detection: hard
[=]
[=] — Tag Signature
[=] IC signature public key name: NXP Mifare Classic MFC1C14_x
[=] IC signature public key value: 044F6D3F294DEA5737F0F46FFEE88A356EED95695DD7E0C27A591E6F6F65962BAF
[=] Elliptic curve parameters: NID_secp128r1
[=] TAG IC Signature: 13503AFF5FB4BCBCD324909BC63C7CAD55AE3885899CAFFCF1C703FC4242885E
[+] Signature verification: successful
[?] Hint: try hf mf commands
"
I tried the cload command on a changeable UID tag, it works but afterwards i get no reaction from HF search. I tried the same process with an gen1 and gen2 card.
On the last 2 cards i get “Card doesn’t support standard iso14443-3 anticollision”
I already tried to search on this forum and the www. but to no avail.
Can you send a link of the magic tag that you tried to write to? What you have is a 7 byte UID mifare classic card. If you attempted to load that dump onto a 4 byte UID magic tag, you soft bricked it.
AliExpress can be difficult to be certain of anything as they are pretty lose with their wording.
In my experience on AliExpress,
UID = gen1a CUID = gen2
Looking at your links, this is my best guess
They are all 4Byte UID’s ( What you want )
mO0BXsY = gen2
mOFl0sU = not 100% but think its gen1a
mtdB3w8 = ??gen1a??
mqK0bWM = T5577 + gen1a ( Basically an xMagic in key fob form factor)
To answer shortly to make a spare of my tag for charging my electric car.
I’m someone who loses his stuff very easily.
No, i don’t use implants. Preferably i would like to have a spare tag above the card.
I already bought a 7byte tag from above mentioned link.