Mfkey32v2 is a tool used to calculate Mifare Classic Keys from encrypted nonces obtained from the reader.
Note: Nonce in computer terminology means "Number used once"
Github | equip paypal: [email protected] | bettse paypal: [email protected] | Discord |
---|
No one involved in this project is responsible for how you use it. Always follow local laws and EULAs.
Mfkey32v2 calculates Mifare Classic Sector keys from encrypted nonces collected by emulating the initial card and recording the interaction between the emulated card and the respective reader.
While performing authentication, the reader will send "nonces" to the card which can be decrypted into keys.
Mfkey32v2 is not magic it cannot create you a working credential without an initial card. The Keys generated are not keys to open the door, they are keys to unlock and read sectors from inside the card itself.
MfKey32v2 has a few different implementations as time has progressed.
From the list below select the mfkey32v2 instructions best suited to you.
- Generic Standalone Mfkey32v2 Cli usage instructions
- FlipperZero Mfkey32v2 Cli instructions
- FlipperZero Mfkey32v2 Web App Instructions
- FlipperZero Mfkey32v2 Mobile companion app Instructions
If you are interested in mfkey32v2 and/or mifare classic as a whole, below are links for mifare classic and other relevant datasheets.
For support in using Mfkey32v2 message Equip#1515 on discord, submit a github issue or join my discord.