mfclassic urmet tag
UPDATE : it is more related to VIGIK V2 Reader that might detect chinese UID writable tag (backdoor)…
After 5 hours trying to copy vigik urmet here are my findings on my building reader :
- use keys.txt to quickly dump the urmet badge
- UID block 0 does not matter, you don’t need a perfect clone
- SAK difference does not matter 08 =Mifare NXP or 88 = Mifare Infineon
The most important is :
Vigik V2 detects backdoor tags so you will need to buy similar tag URMET VIGIK MEMOPROX OR use chinese without backdoor
Here are the steps assuming you are already familiar with Vigik cloning.
1. Dump Urmet badge (original)
First we need to find the correct keys so you can dump and there are 2 WAYS :
send a file containing many keys using -f
wget https://raw.githubusercontent.com/ikarus23/MifareClassicTool/master/Mifare%20Classic%20Tool/app/src/main/assets/key-files/extended-std.keys keys.txtmfoc -f keys.txt -P 500 -O urmet.dmp
OR
send the correct key -k
for my badge (and I believe many vigik badges) it is 8829DA9DAF76
mfoc -k 8829DA9DAF76 -P 500 -O urmet.dmp
2. Dump the copy (blank card)
mfoc -P 500 -O clone.dmp
Don’t forget that if you have a high frequency urmet (13.56mhz) it will only work on a high frequency mifare tag.
3. Clone the urmet
Place the tag to copy on the reader
IF you have a clone with UID block 0 writable
#perfect clone
nfc-mfclassic W a urmet.dmp clone.dmp
IF NOT :
#inperfect clone but worked for me
# do not change UID, only write few blocks and force !nfc-mfclassic w a urmet.dmp clone.dmp f
Notice the W (write the UID and data) and w (write only the data)