How to use Mfkey32v2

In contrast to Mfkey64, Mfkey32v2 can restore keys without the original tags, which is a significant advantage. This tutorial will cover how to use Mfkey32v2 with PN532Killer on the Windows Program and Android App.

What is Mfkey32v2

To put it simply, Mfkey32v2 is a tool that helps to generate a Mifare Classic Card’s sector keys. Here’s how it works:

Imagine you have a card and a reader (like a door lock and a key). Now, when the card interacts with the reader, there is a sort of “handshake” or interaction that occurs. The reader sends out what we call “nonces” – these are like secret codes.

Mfkey32v2’s job is to pretend to be the card and collect or record these “nonces” or secret codes sent by the reader. Once Mfkey32v2 has these nonces, it can work its magic and decrypt them or translate them into keys—the ones that are used on the Mifare Classic Card.

Mfkey32 vs Mfkey32v2

• Mfkey32

This is the original program. It needs two consecutive authentication attempts from the same time period. This means, that for it to successfully derive a key, it requires two instances of secret codes (nonces) sent by the reader to the card that occur one after the other without significant delay. It goes like a sequence in a stream.

• Mfkey32v2

Mfkey32v2 is an enhanced version of Mfkey32. Its primary improvement is that the two authentication attempts are not required to occur consecutively or within the same time period. This flexibility makes Mfkey32v2 a significant improvement over the original version as it eliminates the time constraint, thereby increasing efficiency and user friendliness.

Steps to sniff without tag

Step 1: Enter Sniff14A without Tag

Step 2: Set the UID of the Sniffer slot on the Windows Program or Android App

Step 3: Put PN532Killer on the reader over 2 times to get 8 nonces.

Recovering keys on Android

  1. Install MTools App from the Play Store.
  2. Connect PN532Killer with cable.
  3. Put the original tag on PN532Killer and choose Sniffer > MFC > Sniff with Tag.
  4. Enter the Detail of the Mifare card, choose Decode Mifare Keys.
  5. Select Mfkey32v2 – Without Tag to calculate keys.

Recovering keys on iOS

  1. Install MTools BLE from the App Store.
  2. Connect PN532Killer with Bluetooth.
    BLE Extension Board Required.
  3. Go to Tools > PN532Killer > Sniffer
  4. Choose Sniffer > Without Tag > Start
  5. Click Stop to exist Sniffer Mode
  6. Click MFKey64 to do calculation

Recover keys on Windows

  1. Connect PN532Killer to your Windows.
    Learn more on the tutorial: How to connect the PN532Killer Program on Windows
  2. Choose Sniff without tag and Click Read Data
  3. Click Calculate Key and get Mfkey32v2 results
  4. The sector, key type, and key will be shown in the group. The key type in 60 means the keyA and the key type in 61 means the keyB.

Recover keys on MacOS

Tutorial will be available soon


Comments

One response to “How to use Mfkey32v2”

  1. Perfect explanation ✨