Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Mifare DESFire Emulate UID not working #3566

Open
Fabunator opened this issue Apr 3, 2024 · 4 comments
Open

Mifare DESFire Emulate UID not working #3566

Fabunator opened this issue Apr 3, 2024 · 4 comments
Assignees
Labels
Bug NFC NFC-related

Comments

@Fabunator
Copy link

Describe the bug.

I have a copy of my woking place badge from Version 0.97.x
In this version i could emulate the UID and use this to log into my work.
In version 0.99.1 this is not possible any more.
I also made a new copy with the current version but nothing changed.

The type of the Tag is ISO14443-3A (Mifare DESFire EV1 4k) in the nfc file the type is Mifare DESFire

Reproduction

Read NFC Mifare DESFire Tag
Emulate UID

Target

No response

Logs

No response

Anything else?

No response

@gornekich
Copy link
Member

Hello @Fabunator !
I can't reproduce any problems with UID emulation. We need more information here. The protocol below Mifare Desfire is ISO14443-4A, not 3-A. The UID emulation for iso-3a and iso-4a are different.

  1. Is it possible that your reader starts to read more than just UID? Does the emulation still works on 0.97 version?
  2. Do you have any Logs during emulation? If readers reads more than just UID, you will see Log button on the screen during emulation. After pressing OK, you will have a screen with raw data received from reader. If you have this, please share this raw command here

@Fabunator
Copy link
Author

I am sorry i made some mistakes in my description
The tag is of the Type ISO 14443-4 (Mifare DESFire EV1 4k)
NFC_Tag

I added 2 .nfc files from different Firmware Versions of the Flipper. (changed the UID for reasons)
The first one is from 0.93.0 the second from 0.99.1
In Version 0.93.0 the emulation of the UID works for both files and the reader can detect my badge
In Version 0.99.1 the reader is not detecting my emulated UID

Filetype: Flipper NFC device
Version: 3
# Nfc device type can be UID, Mifare Ultralight, Mifare Classic or ISO15693
Device type: Mifare DESFire
# UID is common for all formats
UID: 00 00 00 00 00 00 80
# ISO14443 specific fields
ATQA: 03 44
SAK: 20
# Mifare DESFire specific data
PICC Version: 04 01 01 01 00 18 05 04 01 01 01 04 18 05 04 50 53 CA E8 2E 80 BA 35 19 D5 10 49 12
PICC Free Memory: 3840
PICC Change Key ID: 00
PICC Config Changeable: true
PICC Free Create Delete: false
PICC Free Directory List: true
PICC Key Changeable: true
PICC Max Keys: 01
PICC Key 0 Version: 00
Application Count: 1
Application IDs: 00 21 F5
Application 0021f5 Change Key ID: 00
Application 0021f5 Config Changeable: true
Application 0021f5 Free Create Delete: false
Application 0021f5 Free Directory List: true
Application 0021f5 Key Changeable: true
Application 0021f5 Max Keys: 02
Application 0021f5 Key 0 Version: 00
Application 0021f5 Key 1 Version: 00
Application 0021f5 File IDs: 00 01 02 03
Application 0021f5 File 0 Type: 00
Application 0021f5 File 0 Communication Settings: 01
Application 0021f5 File 0 Access Rights: 00 10
Application 0021f5 File 0 Size: 32
Application 0021f5 File 1 Type: 04
Application 0021f5 File 1 Communication Settings: 00
Application 0021f5 File 1 Access Rights: 00 10
Application 0021f5 File 1 Size: 8
Application 0021f5 File 1 Max: 61
Application 0021f5 File 1 Cur: 0
Application 0021f5 File 2 Type: 00
Application 0021f5 File 2 Communication Settings: 01
Application 0021f5 File 2 Access Rights: 00 10
Application 0021f5 File 2 Size: 192
Application 0021f5 File 3 Type: 01
Application 0021f5 File 3 Communication Settings: 00
Application 0021f5 File 3 Access Rights: 00 E0
Application 0021f5 File 3 Size: 32
Application 0021f5 File 3: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Filetype: Flipper NFC device
Version: 4
# Device type can be ISO14443-3A, ISO14443-3B, ISO14443-4A, ISO14443-4B, ISO15693-3, FeliCa, NTAG/Ultralight, Mifare Classic, Mifare DESFire, SLIX, ST25TB
Device type: Mifare DESFire
# UID is common for all formats
UID: 00 00 00 00 00 00 80
# ISO14443-3A specific data
ATQA: 03 44
SAK: 20
# ISO14443-4A specific data
T0: 75
TA(1): 77
TB(1): 81
TC(1): 02
T1...Tk: 80
# Mifare DESFire specific data
PICC Version: 04 01 01 01 00 18 05 04 01 01 01 04 18 05 04 50 53 CA E8 2E 80 BA 35 19 D5 10 49 12
PICC Free Memory: 3840
PICC Change Key ID: 00
PICC Config Changeable: true
PICC Free Create Delete: false
PICC Free Directory List: true
PICC Key Changeable: true
PICC Flags: 00
PICC Max Keys: 01
PICC Key 0 Version: 00
Application Count: 1
Application IDs: 00 21 F5
Application 0021f5 Change Key ID: 00
Application 0021f5 Config Changeable: true
Application 0021f5 Free Create Delete: false
Application 0021f5 Free Directory List: true
Application 0021f5 Key Changeable: true
Application 0021f5 Flags: 00
Application 0021f5 Max Keys: 02
Application 0021f5 Key 0 Version: 00
Application 0021f5 Key 1 Version: 00
Application 0021f5 File IDs: 00 01 02 03
Application 0021f5 File 0 Type: 00
Application 0021f5 File 0 Communication Settings: 01
Application 0021f5 File 0 Access Rights: 00 10
Application 0021f5 File 0 Size: 32
Application 0021f5 File 1 Type: 04
Application 0021f5 File 1 Communication Settings: 00
Application 0021f5 File 1 Access Rights: 00 10
Application 0021f5 File 1 Size: 8
Application 0021f5 File 1 Max: 61
Application 0021f5 File 1 Cur: 0
Application 0021f5 File 2 Type: 00
Application 0021f5 File 2 Communication Settings: 01
Application 0021f5 File 2 Access Rights: 00 10
Application 0021f5 File 2 Size: 192
Application 0021f5 File 3 Type: 01
Application 0021f5 File 3 Communication Settings: 00
Application 0021f5 File 3 Access Rights: 00 E0
Application 0021f5 File 3 Size: 32
Application 0021f5 File 3: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00

I have also attached the logs while reading
Logs

@Fabunator Fabunator reopened this Apr 19, 2024
@Fabunator
Copy link
Author

Are there some news on this case?
Any more Information i can provide here?

@gornekich
Copy link
Member

Thanks for information, it should be enough. Still working on this issue.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Bug NFC NFC-related
Projects
None yet
Development

No branches or pull requests

3 participants