equip paypal: [email protected] | bettse paypal: [email protected] | Discord |
---|
Mfkey32v2 extracts keys from nonces collected during the authentication process. These nonces can be collected by emulating the credential to allow the reader to begin despensing the necessary information to begin extraction.
GCC for compiling C (deb) make for utilising the makefile. build-essential contains both of these for you to use
sudo apt install build-essential
(For compiling on windows you'll need a C compiler or use MINGW to create a virtual environment to use GCC)
- Before compiling make sure your gcc is present and up to date
- Download code
git clone https://github.com/equipter/mfkey32v2
- Navigate into repo directory
cd mfkey32v2/
- Compile code with make
make mfkey32v2
(if make is for some reason non cooperative you can manually compile with gcc using this command gcc mfkey32v2.c include/crypto1.c include/crypto01.c include/bucketsort.c -o mfkey32v2 -Iinclude
command syntax for mfkey32v2 is ./mfkey32v2 <uid> <nt> <nr_0> <ar_0> <nt1> <nr_1> <ar_1>
if you've come from the flipper mfkey32v2 logging, instructions for your command structuring is below: if you arent comfortable or capable of running mfkey32v2 by yourself. Message your log output to bettse or equip on discord.
- On your FZ navigate to settings an enable debug.
- Then on log level, adjust to
Debug
- Scan your Mifare Classic and begin
read mifare classic
special action (NOTE: you do not need to have found any keys you just need have a base .nfc file from the output) - Save your credential on the flipper and begin the card emulation
- open your Flipper CLI instructions for CLI link to webcli
- start
log
- while still emulating the UID, approach your flipperzero to the reader
- your CLI should output logs see below for an example. find the lines like this
70795 [D][MfClassic]: 939be0d5 keyA block 3 nt/nr/ar: 4e70d691 b3a576be 02c1559b
77521 [D][MfClassic]: 939be0d5 keyA block 3 nt/nr/ar: c6efb126 d24dd966 03fc7386
now, on your external device where you have downloaded and compiled mfkey32v2
run ./mfkey32v2
with parameters like such
./mfkey32v2 [uid] [topline log] [bottomline log]
example: UID 939be0d5
your command should look like this:
./mfkey32v2 939be0d5 4e70d691 b3a576be 02c1559b c6efb126 d24dd966 03fc7386
your key should be output out like so
Found Key: [a0a1a2a3a4a5]
your keyA for Sector 3 is: a0a1a2a3a4a5
This project is used by the following Repositories:
- FlipperZero Offical firmware
- RogueMaster FlipperZero Firmware
- Credited in DJsime Awesome-Flipperzero
For support, Message Equip on discord Equip#1515 or join The discord server Link