What to do when no key is found by pm3 when cloning Mifare Classic 1k?

Hi guys I just got a Proxmark3 Easy and I wish to clone my library entrance card. I am a newbie to pm3. I tried to follow this tutorial but hf mf autopwn did not give me any valid key like in the video.

Here is the partial output of hf search -

[usb] pm3 --> hf search
 🕕  Searching for ISO14443-A tag...          
[+]  UID: 
[+] ATQA: 00 04
[+]  SAK: 08 [2]
[+] Possible types:
[+]    MIFARE Classic 1K
[=] proprietary non iso14443-4 card found, RATS not supported
[+] Prng detection: hard
[=] 
[=] --- Tag Signature
[=]  IC signature public key name: NXP Mifare Classic MFC1C14_x
[=] IC signature public key value:
[=]     Elliptic curve parameters: NID
[=]              TAG IC Signature:
[+]        Signature verification: successful
[?] Hint: try `hf mf` commands

Here is the output of hf mf fchk -

[+] No key specified, trying default keys
[ 0] ffffffffffff
[ 1] 000000000000
[ 2] a0a1a2a3a4a5
[ 3] b0b1b2b3b4b5
[ 4] c0c1c2c3c4c5
[ 5] d0d1d2d3d4d5
[ 6] aabbccddeeff
[ 7] 1a2b3c4d5e6f
[ 8] 123456789abc
[ 9] 010203040506
[10] 123456abcdef
[11] abcdef123456
[12] 4d3a99c351dd
[13] 1a982c7e459a
[14] d3f7d3f7d3f7
[15] 714c5c886e97
[16] 587ee5f9350f
[17] a0478cc39091
[18] 533cb6c723f6
[19] 8fd0a4f256e9
[20] 0000014b5c31
[21] b578f38a5c61
[22] 96a301bce267
[=] Running strategy 1
[=] Chunk 1.8s | found 0/32 keys (23)
[=] Running strategy 2
[=] ..
[=] Chunk 4.0s | found 0/32 keys (23)
[=] time in checkkeys (fast) 5.8s

[!] ⚠️  No keys found

Here’s the output of hf mf chk --1k -k FFFFFFFFFFFF -

[usb] pm3 --> hf mf chk --1k -k FFFFFFFFFFFF
[ 0] key FF FF FF FF FF FF 
[=] Start check for keys...
[=] .................................
[=] time in checkkeys 2 seconds

[=] testing to read key B...

[+] found keys:

[+] |-----|----------------|---|----------------|---|
[+] | Sec | key A          |res| key B          |res|
[+] |-----|----------------|---|----------------|---|
[+] | 000 | ------------   | 0 | ------------   | 0 |
[+] | 001 | ------------   | 0 | ------------   | 0 |
[+] | 002 | ------------   | 0 | ------------   | 0 |
[+] | 003 | ------------   | 0 | ------------   | 0 |
[+] | 004 | ------------   | 0 | ------------   | 0 |
[+] | 005 | ------------   | 0 | ------------   | 0 |
[+] | 006 | ------------   | 0 | ------------   | 0 |
[+] | 007 | ------------   | 0 | ------------   | 0 |
[+] | 008 | ------------   | 0 | ------------   | 0 |
[+] | 009 | ------------   | 0 | ------------   | 0 |
[+] | 010 | ------------   | 0 | ------------   | 0 |
[+] | 011 | ------------   | 0 | ------------   | 0 |
[+] | 012 | ------------   | 0 | ------------   | 0 |
[+] | 013 | ------------   | 0 | ------------   | 0 |
[+] | 014 | ------------   | 0 | ------------   | 0 |
[+] | 015 | ------------   | 0 | ------------   | 0 |
[+] |-----|----------------|---|----------------|---|
[+] ( 0:Failed / 1:Success )

I cannot seem to find any tutorial that deals with this situation. Does it mean I am out of luck? Is there any way that I could do a brute force search for the keys? Or simply some links to useful resources are really appreciated!

Please let me know if other info is needed. Thanks!

That is not any old stinky 1K that’s the mighty MIFARE Classic EV1 1K.

As much as I know you can’t just guess without bruteforcing it. And that takes time.
But: You can sniff some keys if you can. Then go around and nest attack the rest.
Or if it’s not a new deployment you can try and find an older card that is a classic Classic 1K.