A shortcut for obtaining card keys when we have physical access to the (legitimate) reader is to capture the communications between the tag and the reader. This is an straight forward process in Proxmark or alternative emulators like iCopy or Chameleon (AKA Reader Attack).
I was wondering if there are any plans for near future to improve the “detect reader” and support the same concept?
Alternatively, until that is implemented, it would be great to have an option to save traces when emulating a user defined or saved UID. This trace can be also used to extract the keys later on phone/computer.
Thanks for all the great work you’ve done so far!
It would be great to mention this in FZ’s documentation somewhere, as it would be unlikely to randomly find this. Looking forward to future mobile app updates.