Skip to content

Instantly share code, notes, and snippets.

View rickdoesburg's full-sized avatar

Rick Doesburg rickdoesburg

  • The Netherlands
View GitHub Profile
@rickdoesburg
rickdoesburg / cloning-mfc-1k-7byte-uid-nfc-card.md
Last active January 6, 2024 23:14
Cloning Mifare Classic 1k 7-byte UID cards and the world of NFC magic cards for dummies

Cloning a 7-byte UID MFC (Mifare Classic) 1k card and more

This is a little blog about my trials of figuring out how to clone a 7-byte 1k MFC card and more I discovered. I'm not an expert, this is just what I found out. I'm writing it down because I couldn't find a single place where this info was grouped together.

A little while ago I bought a Flipper Zero because I was interested in the world of NFC/RFID tags and I wanted to figure out a way to clone my NFC card used to open the underground waste container in my neighbourhood.

Findings

  • It turns out most of my NFC cards used for various services are so called MIFARE Classic (MFC) 1K cards. These appear to be the most common card used for semi-secure things. The tag used to enter my office is a MIFARE DESfire card, which as far as I know, isn't clonable unless you have the decryption keys.
    • There is also a MIFARE Classic 4K version which can store more data. I haven't encountered this one yet so nothing I can tell you about it.
  • The MFC Classic

Keybase proof

I hereby claim:

  • I am rickdoesburg on github.
  • I am rick (https://keybase.io/rick) on keybase.
  • I have a public key ASDNHXmjesqlphG77vsQdMLzJNd5nx1c1KPL3lpQ-XGcoAo

To claim this, I am signing this object: