Step 1: On the U disk, locate the following file: keys\mf1\mf_user_key.dic.TIPS: If interrupted by an accidental error, click “Read Card” to reread the card to continue from the breakpoint.Manually add frequently used secret keys to the password library. Step 4: After the analysis is completed, the password is automatically saved you can then exit PC Mode on the iCopy-X and click “Auto Copy” again.Step 3: Click “Read Card” and the analysis will start automatically.A program will open and should automatically connect to the iCopy if it doesn’ t, you will need to manually connect using the connect button and by typing in the appropriate COM port. Open the drive and then right click on “AUTO-Hardnest. Step 2: A USB flash drive will appear on the computer.Step 1: Connect to your computer and then enter PC-MODE on the iCopy-X select Start and wait for the iCopy-X to say “PC mode Running…”.Once connected to a windows PC via the USB Type C cable supplied.You can access a hardnested attack to crack the unknown keys of a MIFARE token. Option 4: Go into PC Mode to perform hardnest.įor details about these four options, please see “Advance Use”.Option 3: Force read to get partial data.(Ignore the encrypted sector, read only the unencrypted area to make a copy card).Option 2: Enter known keys manually.(Enter a known secret key to assist in reading the card).Option 1: Go to the reader to sniff keys.(Take the original card to the card reader to sniff, obtain the secret key, and assist in reading the card).Some cards with encryption will automatically prompt multiple options. TIP: When encountering an unsupported card, you will not be able to proceed to the next step. Step 5: When the prompt “Write and verify successful!” appears, it means that you have copied a card perfectly.Step 4: Click the “S/R/W” button again will automatically write the card.Step 3: When the prompt “Read successful!” appears, take the original card, and put the UID card card.Step 2: Click the “S/R/W” button or select “Auto Copy” in themenu to start the automatic copy process.Used to adjust the volume of voice prompts and button selection ĭisplays serial number, firmware and hardware information CLONING 101 ON ICOPY-X Simulation of Low and High Frequency RFID TagsĮnters PC-Mode, used with the supplied USB cable for advanced command line functions and Mifare crackingĭiagnosis has two modes:User Test: Checks internal memory and both LF/HF antennasnFactory Test: Used by the factory before sale Sniffing of locked sector keys for MIFARE cards/tag. Reading of all available information of tag (including blocks and sectors). Scanning of tag and getting the basic information of the tag type. GETTING STARTEDĪutomatic scanning, reading, and writing of all information of the original RFID Tag to a new UID card/tag. TIPS: The transparent cover is used to load keyfob small-size cards, which will not slide when reading the card, and you can carry the device around. If it is an keyfob size card, it is recommended to put the card in the blue area of the transparent cover for operation.If it is a full-size white card, it can be placed directly on the transparent cover or read on the back. The blue area as shown in the figure is the 13.56mhz high frequency card identification area. If it is a small keyfob card, it is recommended to put the card in the red area of the transparent cover for the operation. The red area as shown in the figure is the 125k low-frequency card identification area. Long press for 15 seconds to force reset. Cancel/Switch/Reset button: used to return to the previous page, cancel the operation, long press for 3 seconds to turn on,and long press for 3 seconds to turn off.Scan/read card/write card button: One-key automatic copy button, press it to quickly return to the “AUTO COPY” page.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |