MF Classic 32/32 Keys 14/16 Sectors Read, Emulation not working

Wondering if anyone has experienced this as well. I have been able to successfully save my Mifare Classic 1K NFC card it doesn’t read all of the sectors, but it does find all of the keys.

I have tried to manually edit the “??” to follow suite with the rest of the sectors, but that has not worked either. Curious as to why it is unable to read these two sectors?

Block 4: ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ??
Block 5: ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ??
Block 6: ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ??
Block 7: FF FF FF FF FF FF ?? ?? ?? ?? FF FF FF FF FF FF
Block 8: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Block 9: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Block 10: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Block 11: A0 A1 A2 A3 A4 A5 0F 00 FF AA 00 00 01 4B 5C 31
Block 12: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Block 13: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Block 14: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Block 15: FF FF FF FF FF FF FF 07 80 69 FF FF FF FF FF FF
Block 16: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Block 17: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Block 18: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Block 19: FF FF FF FF FF FF FF 07 80 69 FF FF FF FF FF FF
Block 20: 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30
Block 21: 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30 30
Block 22: 30 30 30 30 30 00 00 00 00 00 00 00 00 00 00 00
Block 23: FF FF FF FF FF FF FF 07 80 69 FF FF FF FF FF FF
Block 24: ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ??
Block 25: ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ??
Block 26: ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ?? ??
Block 27: FF FF FF FF FF FF ?? ?? ?? ?? 36 08 0E 5D 47 6A

Looks like nested auth - not yet supported on Flipper. Do you have Proxmark?

2 Likes

Not at the moment, but I have one on its way. I will post some logs when I get it

1 Like

The proxmark was able to get the missing information and I am now able to successfully emulate my NFC key.

It would be cool if flipper could have retrieved the corrected full data to start with …

Yeah I agree it would be cool if it could run the attacks that the proxmark could, but I do understand there are limitations.

The issue with my particular case was it said I had 32/32 keys, but I was actually missing 3 keys. Not sure how that happened though… Afterwards I used the proxmark to find the 3 missing keys which I manually added to the flipper. So I guess if I had a larger database of keys I wouldn’t have needed the proxmark.

Flipper shouldn’t then say it got the key if in fact it didn’t.