So, I bought the xM1+ and had it placed in my hand by a local body piercer about a month back.
(I’ll upload the video another time.)
Unfortunately, the chip under my skin can’t be read by the door scanners where I intended to use it. The LED Field Tester it came with lights up (dimly, I’ll admit). So, I assumed the xM1 Plus would also make contact. Though, it appears the door readers are simply not strong enough. Which is unfortunate, as this use case was the entire reason I decided to get my first implant. Oh well, life goes on.
Per @amal 's instructional article I purchased the ACR122U (as the proxmark3 was out of budget) and it arrived in the mail today! Pairing it with the recommended drivers and software, I went on a mission to crack a Mifare Classic card. The MiFare Offline Cracker tool worked great on the demo cards that arrived with the reader, giving me a dump of all the data in under 5 seconds. Though, the Mifare Classic card that I needed it to crack, didn’t have the same luck.
It ran for over an hour, before the program crashed. As I type, it has been running again for over two hours without making progress. It jumped directly to Sector 15, type A and it has been in the same spot. It has now made it past probe 285 of the same sector, but I expect it to crash before getting even this one key.
All this being said, I was initially under the impression that my use case only actually needs the card’s UID. Based on the trouble I’m having cracking the card, I may be wrong. Though, I thought it would be worth a try to only clone block 0. My problem is not knowing how to have the ACR122U give me block 0 without needing to crack the entire card. Also, how would I go about writing this information (without having to compile a full dump) using the recommended Card Recovery tool?
Thanks for any insight or suggestions @amal !