2) Even given a correct blank magic uid card from my store, you probably need the 3des password to first extract the data and after which clone such a tag
3) i believe the mifare_autopwn is for mifare classic not the mifare desfire.
4) the height isn't the issue
I guess I will be the only one replying to this trend as your question is pretty wrong to start with.
]]>I am trying emulate a iso14443a DESfire key. WHen I type HF SEARCH command I get the below.
====================================
proxmark3> hf search
UID : 04 4b 0c ea 3b 38 80
ATQA : 03 44
SAK : 20 [1]
TYPE : NXP MIFARE DESFire 4k | DESFire EV1 2k/4k/8k | Plus 2k/4k SL3 | JCOP 31/41
MANUFACTURER : NXP Semiconductors Germany
ATS : 06 75 77 81 02 80 02 f0
- TL : length is 6 bytes
- T0 : TA1 is present, TB1 is present, TC1 is present, FSCI is 5 (FSC = 64)
- TA1 : different divisors are supported, DR: [2, 4, 8], DS: [2, 4, 8]
- TB1 : SFGI = 1 (SFGT = 8192/fc), FWI = 8 (FWT = 1048576/fc)
- TC1 : NAD is NOT supported, CID is supported
- HB : 80
Answers to chinese magic backdoor commands: NO
Valid ISO14443A Tag Found - Quiting Search
=================================
for cloning it I used the command - script run mifare_autopwn
which return the error saying card cannot be detected. I tried raising the height but same result. Can someone help me with the command I can use to copy this type of key.
Thanks.
]]>