Skip to content

equipter/mfkey32v2

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Mfkey32 Version 2

Mfkey32v2 is a tool used to calculate Mifare Classic Keys from encrypted nonces obtained from the reader.

Note: Nonce in computer terminology means "Number used once"

Acknowledgements

Disclaimer

No one involved in this project is responsible for how you use it. Always follow local laws and EULAs.

What is Mfkey32v2

Mfkey32v2 calculates Mifare Classic Sector keys from encrypted nonces collected by emulating the initial card and recording the interaction between the emulated card and the respective reader.

While performing authentication, the reader will send "nonces" to the card which can be decrypted into keys.

Mfkey32v2 is not magic it cannot create you a working credential without an initial card. The Keys generated are not keys to open the door, they are keys to unlock and read sectors from inside the card itself.

Collecting Nonces with the FlipperZero

  1. After scanning your mifare classic and verifying you do not have all sector keys, save the file.
  2. Navigate to NFC -> Saved -> [Your File] -> detect reader
  3. Approach reader with flipperzero and observe nonces being collected.
  4. Once collected you can move on to cracking, see below the different methods (NOTE: They all do the same thing just in different ways) image

Mfkey32v2 Implementations

MfKey32v2 has a few different implementations as time has progressed.

From the list below select the mfkey32v2 instructions best suited to you.

Datasheets

If you are interested in mfkey32v2 and/or mifare classic as a whole, below are links for mifare classic and other relevant datasheets.

Support

For support in using Mfkey32v2 message Equip on discord or file a github issue.