MIFARE Classic® Compatible 1K, UID Changeable One Time (Gen2a) - FPC Stickers - Pack of 5
The absolute smallest MIFARE Classic® Compatible 1K chips on the market. At just 8mm (1/32") across, these tags can be placed anywhere. Despite their tiny size, they have perfectly tuned antennas for optimised performance. There are five tags per pack.
More and more access control systems (notably VIGIK® compatible systems in Europe) use detection routines to determine if a badge is Gen1a or Gen2 - and will refuse access to prevent cloned badges being used.
The solution is Gen2a MIFARE Classic® Compatible 1K UID One-Time-Write tags. The UID of the tag can be written one time only. Once written, it cannot be changed - the tag is indistinguishable from an original tag.
| Feature | Information | Notes |
|---|---|---|
| Chipset | MIFARE Classic® Compatible | |
| Memory Size | 1K | |
| UID Size | 4 Byte | |
| UID Modifiable | ✔️ | UID can be modified one time only |
| Chip Generation | Gen 2a (OTW) | Chipset Generation Guide |
| Packaging | 5 per pack | Delivered in an anti-static bag |
| UID Modifiable | Unlock Required | DirectWrite / Block 0 | One Time Write | Notes |
|---|---|---|---|---|
| ✔️ | ✔️ | ✔️ |
| Compatibility | UID | R/W | Config | Notes |
|---|---|---|---|---|
| Flipper Zero | ✔️ | ✔️ | ✔️ | |
| Proxmark / iCopy-X | ✔️ | ✔️ | ✔️ | |
| Android & iOS | ✔️ | ✔️ | ✔️ | Via MTools app |
| LibNFC | ✔️ | ✔️ | ✔️ | |
| ChameleonUltra | ✔️ | ✔️ | ✔️ | Via MTools app |
Hands on: See the card in action
The MIFARE Classic® Compatible 1K UID One-Time-Write can be used with several tools:
LibNFC - change UID
To update the UID of the badge, simply write the dump contents to the badge.
nfc-mfclassic w a u /tmp/1K.dmp
Proxmark - change UID
To update the UID of the badge, simply write the dump contents to the badge. When using wrbl - you are directly modifying the card's configuration. Ensure that all data is correct including BCC - otherwise you will brick your card.
hf mf wrbl --blk 0 -k FFFFFFFFFFFF -d 11223344440804006263646566676869 # Where 11223344 is the UID, 08 is the BCC
Live Demonstration : LibNFC & Proxmark
Unbricking
"Soft-bricking" refers to when a magic card has been configured in a way that prevents it from being detected. Ways of soft-bricking tags include:
- Incorrect BCC
- Incorrect SAK
- Incorrect ATQA
- Incorrect ATS
- Incorrect ACL (Access Control) Values
Some "soft-brick" situations can be resolved with special commands. If your MIFARE Classic® Compatible 1K UID Modifiable is "soft-bricked", you can try recovering it with the following methods:
With Proxmark / iCopy-X
hf 14a config --atqa force --bcc ignore --cl2 skip --rats skip
# for 1k
hf mf wrbl --blk 0 -k FFFFFFFFFFFF -d 11223344440804006263646566676869 --force
hf 14a config --std
hf 14a reader
Via external reader/writer and MTOOLS
Select the "UID Changer" function in MTools, select "bricked" and run the task
IMPORTANT:
Lab401 cannot provide refunds under any circumstances for cards that were 'bricked' due to incorrect configurations.