Mfkey32v2 is a tool used to calculate Mifare Classic Keys from encrypted nonces obtained from the reader.
Note: Nonce in computer terminology means "Number used once"
No one involved in this project is responsible for how you use it. Always follow local laws and EULAs.
Mfkey32v2 calculates Mifare Classic Sector keys from encrypted nonces collected by emulating the initial card and recording the interaction between the emulated card and the respective reader.
While performing authentication, the reader will send "nonces" to the card which can be decrypted into keys.
Mfkey32v2 is not magic it cannot create you a working credential without an initial card. The Keys generated are not keys to open the door, they are keys to unlock and read sectors from inside the card itself.
- After scanning your mifare classic and verifying you do not have all sector keys, save the file.
- Navigate to NFC -> Saved -> [Your File] -> detect reader
- Approach reader with flipperzero and observe nonces being collected.
- Once collected you can move on to cracking, see below the different methods (NOTE: They all do the same thing just in different ways)
MfKey32v2 has a few different implementations as time has progressed.
From the list below select the mfkey32v2 instructions best suited to you.
- Generic Standalone Mfkey32v2 Cli usage instructions
- FlipperZero Mfkey32v2 Cli instructions
- FlipperZero Mfkey32v2 Web App Instructions
- FlipperZero Mfkey32v2 Mobile companion app Instructions
If you are interested in mfkey32v2 and/or mifare classic as a whole, below are links for mifare classic and other relevant datasheets.
For support in using Mfkey32v2 message Equip on discord or file a github issue.