Hi,
I am trying to clone or modify this card that I have. I do not have the keys. Is it possible? What can I do with it?
I am basically trying to clone it so it works with my phone case as it is too thick.. I'm open to melting the card and taking the internals out just to get it to work too, any suggestions?
See below for the dump:
** TagInfo scan (version 4.11.59 [β4011059]) 2016-01-04 11:09:14 **
-- INFO ------------------------------
# IC manufacturer:
NXP Semiconductors
# IC type:
MIFARE DESFire EV1 (MF3ICD41)
# DESFire Applications:
1 unknown application
-- NDEF ------------------------------
# NFC data set storage not present:
Maximum NDEF storage size after format: 4094 bytes
-- EXTRA ------------------------------
# Memory information:
Size: 4 kB
Available: 4.0 kB
# IC detailed information:
Capacitance: 17 pF
# Version information:
Vendor ID: NXP
Hardware info:
* Type/subtype: 0x01/0x01
* Version: 1.0
* Storage size: 4096 bytes
* Protocol: ISO/IEC 14443-2 and -3
Software info:
* Type/subtype: 0x01/0x01
* Version: 1.4
* Storage size: 4096 bytes
* Protocol: ISO/IEC 14443-3 and -4
Batch no: 0xBA4450B120
Production date: week 10, 2013
-- TECH ------------------------------
# Technologies supported:
ISO/IEC 7816-4 compatible
Native DESFire APDU framing
ISO/IEC 14443-4 (Type A) compatible
ISO/IEC 14443-3 (Type A) compatible
ISO/IEC 14443-2 (Type A) compatible
# Android technology information:
Tag description:
* TAG: Tech [android.nfc.tech.IsoDep, android.nfc.tech.NfcA, android.nfc.tech.NdefFormatable]
android.nfc.tech.NdefFormatable
android.nfc.tech.IsoDep
* Maximum transceive length: 261 bytes
* Default maximum transceive time-out: 618 ms
* Extended length APDUs not supported
android.nfc.tech.NfcA
* Maximum transceive length: 253 bytes
* Default maximum transceive time-out: 618 ms
# Detailed protocol information:
ID: 04:43:8B:5A:56:2C:80
ATQA: 0x4403
SAK: 0x20
ATS: 0x06757781028000
* Max. accepted frame size: 64 bytes (FSCI: 5)
* Supported receive rates:
- 106, 212, 424, 848 kbit/s (DR: 1, 2, 4, 8)
* Supported send rates:
- 106, 212, 424, 848 kbit/s (DS: 1, 2, 4, 8)
* Different send and receive rates supported
* SFGT: 604.1 us (SFGI: 1)
* FWT: 77.33 ms (FWI: 8)
* NAD not supported
* CID supported
* Historical bytes: 0x80 |.|
# Memory content:
PICC level (Application ID 0x000000)
* PICC key configuration:
- AES key
- PICC key changeable
- PICC key required for:
~ directory list access: no
~ create/delete applications: yes
- Configuration changeable
- PICC key version: 129
Application ID 0x000001
* Key configuration:
- 14 (3)DES keys
- Master key changeable
- Master key required for:
~ directory list access: no
~ create/delete files: yes
- Configuration changeable
- Key itself required for changing a key
* 1 file present
- File ID 0x00: Standard data, 384 bytes
~ Communication: with MAC
~ Read key: key #1
~ Write key: key #2
~ Read/Write key: key #2
~ Change key: master key
~ (No access)
--------------------------------------
As application 0x000001 is using 3DES keys, it may be possible (I'm curious too) to crack the read/write key because its using 3DES and not something stronger like AES
lawonga said:
Hi,
I am trying to clone or modify this card that I have. I do not have the keys. Is it possible? What can I do with it?
I am basically trying to clone it so it works with my phone case as it is too thick.. I'm open to melting the card and taking the internals out just to get it to work too, any suggestions?
See below for the dump:
** TagInfo scan (version 4.11.59 [β4011059]) 2016-01-04 11:09:14 **
-- INFO ------------------------------
# IC manufacturer:
NXP Semiconductors
# IC type:
MIFARE DESFire EV1 (MF3ICD41)
# DESFire Applications:
1 unknown application
-- NDEF ------------------------------
# NFC data set storage not present:
Maximum NDEF storage size after format: 4094 bytes
-- EXTRA ------------------------------
# Memory information:
Size: 4 kB
Available: 4.0 kB
# IC detailed information:
Capacitance: 17 pF
# Version information:
Vendor ID: NXP
Hardware info:
* Type/subtype: 0x01/0x01
* Version: 1.0
* Storage size: 4096 bytes
* Protocol: ISO/IEC 14443-2 and -3
Software info:
* Type/subtype: 0x01/0x01
* Version: 1.4
* Storage size: 4096 bytes
* Protocol: ISO/IEC 14443-3 and -4
Batch no: 0xBA4450B120
Production date: week 10, 2013
-- TECH ------------------------------
# Technologies supported:
ISO/IEC 7816-4 compatible
Native DESFire APDU framing
ISO/IEC 14443-4 (Type A) compatible
ISO/IEC 14443-3 (Type A) compatible
ISO/IEC 14443-2 (Type A) compatible
# Android technology information:
Tag description:
* TAG: Tech [android.nfc.tech.IsoDep, android.nfc.tech.NfcA, android.nfc.tech.NdefFormatable]
android.nfc.tech.NdefFormatable
android.nfc.tech.IsoDep
* Maximum transceive length: 261 bytes
* Default maximum transceive time-out: 618 ms
* Extended length APDUs not supported
android.nfc.tech.NfcA
* Maximum transceive length: 253 bytes
* Default maximum transceive time-out: 618 ms
# Detailed protocol information:
ID: 04:43:8B:5A:56:2C:80
ATQA: 0x4403
SAK: 0x20
ATS: 0x06757781028000
* Max. accepted frame size: 64 bytes (FSCI: 5)
* Supported receive rates:
- 106, 212, 424, 848 kbit/s (DR: 1, 2, 4, 8)
* Supported send rates:
- 106, 212, 424, 848 kbit/s (DS: 1, 2, 4, 8)
* Different send and receive rates supported
* SFGT: 604.1 us (SFGI: 1)
* FWT: 77.33 ms (FWI: 8)
* NAD not supported
* CID supported
* Historical bytes: 0x80 |.|
# Memory content:
PICC level (Application ID 0x000000)
* PICC key configuration:
- AES key
- PICC key changeable
- PICC key required for:
~ directory list access: no
~ create/delete applications: yes
- Configuration changeable
- PICC key version: 129
Application ID 0x000001
* Key configuration:
- 14 (3)DES keys
- Master key changeable
- Master key required for:
~ directory list access: no
~ create/delete files: yes
- Configuration changeable
- Key itself required for changing a key
* 1 file present
- File ID 0x00: Standard data, 384 bytes
~ Communication: with MAC
~ Read key: key #1
~ Write key: key #2
~ Read/Write key: key #2
~ Change key: master key
~ (No access)
--------------------------------------
Click to expand...
Click to collapse
If you get it, please tell us.
I guess no one manage to do this and my EV3 would be even harder to do so ...so no luck I suppose
My application ID is 0x000000 (PICC)
Related
NOTE: the log below pertains to KB5...I haven't had time yet to look into KB6.
http://www.samfirmware.com/WEBPROTECT-p1010.htm
ro.build.display.id=FROYO.XWKB5
ro.build.version.sdk=8
ro.build.version.release=2.2.1
ro.build.date=Thu Feb 17 19:34:43 KST 2011
I'm going to unpack the various RFS archives, to see what's new. I've got a GT-P1000 Galaxy Tab (wifi+3G), so I'm not going to flash with Heimdall (let alone Odin ).
I made backups for factoryfs.rfs / dbdata.rfs etc. using the usual bit-by-bit "dd" -based method, and I've got a trusty TitaniumBackup archive ready, just in case
I notice that TV-out seems to be gone, and FM radio appears to be available. Hardware DSP support seems more present too. (read content logs below for more information)
TAR contents:
Code:
p1wifi_20110128_r10_00.pit (4 KB) (see PIT-info dumped below)
GT-P1010-CSC-SERKB3/
cache.rfs (10.9 MB) (see content listing below)
movinand.mst (51MB) (can be extracted with [URL="http://movitool.ntd.homelinux.org/trac/movitool/"]MoviTool[/URL], based on [URL="http://forum.xda-developers.com/showpost.php?p=9481702&postcount=30"]Volker1's method[/URL])
P1010XWKB5-REV03-ALL-low-CL913814/
boot.bin (256 KB)
cache.rfs (672 KB)
normalboot.img (4.3 MB)
param.lfs (612 KB)
recovery.img (4.3 MB)
Sbl.bin (1.2 MB)
system.rfs (331 MB)
userdata.rfs (1.2 MB)
Output from Volker1's PIT-info utility:
Code:
Contents of PIT file: p1wifi_20110128_r10_00.pit
---------------------------------------------------------------------------
file magic = 0x12349876 (expected value)
Unknown data: 0 0 0 0 0
Number of partitions = 13 (usual value)
Partition #1
Usual content: boot.bin, the primary boot loader (low-level hardware initialization)
partition entry type: 0 0 (normal partition)
ID = 0; flags = 0; unknown: 0
size = 1 blocks of 256 * 512 bytes = 131072 B = 128 kB = 0 MB
unknown string: [........]
partition name = [IBL+PBL.........................]
file name = [boot.bin........................................................]
Partition #2
Usual content: partition information table (PIT)
partition entry type: 0 0 (normal partition)
ID = 0x1; flags = 0; unknown: 0
size = 1 blocks of 256 * 512 bytes = 131072 B = 128 kB = 0 MB
unknown string: [........]
partition name = [PIT.............................]
file name = [p1wifi.pit......................................................]
Partition #3
Usual content: efs.rfs
partition entry type: 0 0 (normal partition)
ID = 0x14; flags = 0x2 (rfs file system); unknown: 0
size = 40 blocks of 256 * 512 bytes = 5242880 B = 5120 kB = 5 MB
unknown string: [........]
partition name = [EFS.............................]
file name = [efs.rfs.........................................................]
Partition #4
Usual content: Sbl.bin, the secondary boot loader (loads linux kernel)
partition entry type: 0 0 (normal partition)
ID = 0x3; flags = 0; unknown: 0
size = 5 blocks of 256 * 512 bytes = 655360 B = 640 kB = 0 MB
unknown string: [........]
partition name = [SBL.............................]
file name = [sbl.bin.........................................................]
Partition #5
Usual content: backup of secondary boot loader
partition entry type: 0 0 (normal partition)
ID = 0x4; flags = 0; unknown: 0
size = 5 blocks of 256 * 512 bytes = 655360 B = 640 kB = 0 MB
unknown string: [........]
partition name = [SBL2............................]
file name = [sbl.bin.........................................................]
Partition #6
Usual content: param.lfs /mnt/.lfs j4fs
partition entry type: 0 0 (normal partition)
ID = 0x15; flags = 0x2 (rfs file system); unknown: 0
size = 20 blocks of 256 * 512 bytes = 2621440 B = 2560 kB = 2 MB
unknown string: [........]
partition name = [PARAM...........................]
file name = [param.lfs.......................................................]
Partition #7
Usual content: zImage, the linux kernel
partition entry type: 0 0 (normal partition)
ID = 0x5; flags = 0; unknown: 0
size = 30 blocks of 256 * 512 bytes = 3932160 B = 3840 kB = 3 MB
unknown string: [........]
partition name = [NORMALBOOT......................]
file name = [normalboot.img..................................................]
Partition #8
Usual content: recovery.bin, the backup copy of zImage/initramfs
partition entry type: 0 0 (normal partition)
ID = 0x8; flags = 0; unknown: 0
size = 30 blocks of 256 * 512 bytes = 3932160 B = 3840 kB = 3 MB
unknown string: [........]
partition name = [RECOVERY........................]
file name = [recovery.img....................................................]
Partition #9
Usual content: factoryfs.rfs
partition entry type: 0 0 (normal partition)
ID = 0x16; flags = 0x2 (rfs file system); unknown: 0
size = 1430 blocks of 256 * 512 bytes = 187432960 B = 183040 kB = 178 MB
unknown string: [........]
partition name = [SYSTEM..........................]
file name = [system.rfs......................................................]
Partition #10
Usual content: dbdata.rfs
partition entry type: 0 0 (normal partition)
ID = 0x17; flags = 0x2 (rfs file system); unknown: 0
size = 302 blocks of 256 * 512 bytes = 39583744 B = 38656 kB = 37 MB
unknown string: [........]
partition name = [USERDATA........................]
file name = [userdata.rfs....................................................]
Partition #11
Usual content: cache.rfs
partition entry type: 0 0 (normal partition)
ID = 0x18; flags = 0x2 (rfs file system); unknown: 0
size = 140 blocks of 256 * 512 bytes = 18350080 B = 17920 kB = 17 MB
unknown string: [........]
partition name = [CACHE...........................]
file name = [cache.rfs.......................................................]
Partition #12
Usual content: modem.bin
partition entry type: 0 2 (unknown value)
ID = 0x3; flags = 0x1; unknown: 0
size = 0 blocks of 0 * 512 bytes = 0 B = 0 kB = 0 MB
unknown string: [........]
partition name = [HIDDEN.D........................]
file name = [hidden.rfs.t....................................................]
Partition #13
Usual content: Unknown
partition entry type: 0 2 (unknown value)
ID = 0; flags = 0x1; unknown: 0
size = 0 blocks of 0 * 512 bytes = 0 B = 0 kB = 0 MB
unknown string: [........]
partition name = [MOVINAND........................]
file name = [movinand.mst....................................................]
The usual CSC cache.rfs content:
Code:
/dbdata/svox/de-DE_gl0_sg.bin
/dbdata/svox/de-DE_ta.bin
/dbdata/svox/en-GB_kh0_sg.bin
/dbdata/svox/en-GB_ta.bin
/dbdata/svox/en-US_lh0_sg.bin
/dbdata/svox/en-US_ta.bin
/dbdata/svox/es-ES_ta.bin
/dbdata/svox/es-ES_zl0_sg.bin
/dbdata/svox/fr-FR_nk0_sg.bin
/dbdata/svox/fr-FR_ta.bin
/dbdata/svox/it-IT_cm0_sg.bin
/dbdata/svox/it-IT_ta.bin
/system/csc/feature.xml
/system/csc/contents.db
/system/csc/others.xml
/system/csc/sales_code.dat
/system/csc/customer.xml
/system/app/MusicODC.apk
/system/T9DB/qwerty_fi.kdb
/system/T9DB/phonepad_cs.kdb
/system/T9DB/qwerty_da.kdb
/system/T9DB/Samsung_400_PLlsUN_xt9.ldb
/system/T9DB/phonepad_lt.kdb
/system/T9DB/Samsung_400_TRlsUN_xt9.ldb
/system/T9DB/Samsung_400_DEusUN_xt9.ldb
/system/T9DB/Samsung_400_ETlsUN_xt9.ldb
/system/T9DB/Samsung_400_ENubUN_xt9.ldb
/system/T9DB/Samsung_400_SVusUN_xt9.ldb
/system/T9DB/qwerty_sv.kdb
/system/T9DB/Samsung_400_DAlsUN.ldb
/system/T9DB/phonepad_uk.kdb
/system/T9DB/phonepad_it.kdb
/system/T9DB/phonepad_el.kdb
/system/T9DB/qwerty_hu.kdb
/system/T9DB/qwerty_es.kdb
/system/T9DB/Samsung_400_UKlsUN_xt9.ldb
/system/T9DB/qwerty_fr.kdb
/system/T9DB/qwerty_et.kdb
/system/T9DB/Samsung_400_SKlsUN_xt9.ldb
/system/T9DB/phonepad_no.kdb
/system/T9DB/qwerty_nl.kdb
/system/T9DB/qwerty_lt.kdb
/system/T9DB/Samsung_400_LVlsUN_xt9.ldb
/system/T9DB/Samsung_400_ITlsUN_xt9.ldb
/system/T9DB/Samsung_400_PTlsUN_xt9.ldb
/system/T9DB/phonepad_da.kdb
/system/T9DB/Samsung_400_HUlsUN_xt9.ldb
/system/T9DB/Samsung_400_ELlsUN_xt9.ldb
/system/T9DB/phonepad_et.kdb
/system/T9DB/Samsung_400_KKlsUN_xt9.ldb
/system/T9DB/phonepad_es.kdb
/system/T9DB/qwerty_sk.kdb
/system/T9DB/phonepad_nl.kdb
/system/T9DB/qwerty_pt.kdb
/system/T9DB/Samsung_400_ESlsUN_xt9.ldb
/system/T9DB/Samsung_400_CSlsUN_xt9.ldb
/system/T9DB/phonepad_ru.kdb
/system/T9DB/phonepad_tr.kdb
/system/T9DB/qwerty_tr.kdb
/system/T9DB/phonepad_de.kdb
/system/T9DB/Samsung_400_FIlsUN_xt9.ldb
/system/T9DB/phonepad_ko.kdb
/system/T9DB/phonepad_fr.kdb
/system/T9DB/phonepad_fi.kdb
/system/T9DB/qwerty_ru.kdb
/system/T9DB/phonepad_en.kdb
/system/T9DB/qwerty_en.kdb
/system/T9DB/qwerty_cs.kdb
/system/T9DB/qwerty_el.kdb
/system/T9DB/Samsung_400_NOlsUN.ldb
/system/T9DB/Samsung_400_RUlsUN_xt9.ldb
/system/T9DB/qwerty_kk.kdb
/system/T9DB/qwerty_no.kdb
/system/T9DB/qwerty_uk.kdb
/system/T9DB/phonepad_lv.kdb
/system/T9DB/phonepad_pl.kdb
/system/T9DB/Samsung_400_NLlsUN_xt9.ldb
/system/T9DB/phonepad_sv.kdb
/system/T9DB/phonepad_sk.kdb
/system/T9DB/Samsung_400_LTlsUN_xt9.ldb
/system/T9DB/qwerty_pl.kdb
/system/T9DB/qwerty_de.kdb
/system/T9DB/Samsung_400_FRlsUN_xt9s.ldb
/system/T9DB/qwerty_ko.kdb
/system/T9DB/qwerty_lv.kdb
/system/T9DB/phonepad_pt.kdb
/system/T9DB/qwerty_it.kdb
/system/T9DB/phonepad_hu.kdb
/system/CSCFiles.txt
/system/SW_Configuration.xml
Changes in /system/app/ :
Removed DailyBriefing, Ebook, Mms, MobileTrackerEngineTwo, MobileTrackerUI, OtaProvisioningService, SamsungWidget_WeatherClock, SoundRecorder, signin, syncmldm, wipereceiver, wssomacp
Added PhoneCrashNotifier, PopupuiReceiverf, qik, qikhelp, skype
Changes in /system/bin/ :
Too many to list, but here are some notable ones:
Removed BCM4329B1_002.002.023.0534.0590.hcd (the driver for the multi-function Broadcom BCM-4329 chipset, also removed in /etc/wifi/ etc.), akmd2 (the multi-sensor driver, now split into several sub-daemons: geomagnetic, gyroscope, temperature, light, orientation, pressure, proximity, etc.)
Notable changes in /system/etc/ :
Added audio/codec/FMRadioEar.ini, audio/codec/FMRadioSpk.ini, and FM-radio stuff in /etc/firmware/ and /lib/libfmradio_jni.so (the Texas Intruments BRF6350 chip supports FM radio...but I don't think that /system/app/ contains an FM tuner application).
Notable addition: /lib/dsp/ + /lib/libOMX*.so + /lib/libVendor_ti_OMX*.so + lib/libaomx_*.so (Texas Intruments OMX/DSP, hardware encoding/decoding of 720p AMR, WB-AMR, AAC, h264, WMA, WMV, MP3, MPEG4, Flac, AC3, S263, etc.)
Code:
720p_h264vdec_sn.dll64P
720p_mp4vdec_sn.dll64P
720p_mp4venc_sn.dll64P
baseimage.dof
baseimage.map
chromasuppress.l64p
conversions.dll64P
dctn_dyn.dll64P
ddspbase_tiomap3430.dof64P
dfgm.dll64P
dynbase_tiomap3430.dof64P
eenf_ti.l64P
h264vdec_sn.dll64P
h264venc_sn.dll64P
ipp_sn.dll64P
jpegdec_sn.dll64P
jpegenc_sn.dll64P
m4venc_sn.dll64P
monitor_tiomap3430.dof64P
mp3dec_sn.dll64P
mp4v720parcdec_sn.dll64P
mp4varcdec_sn.dll64P
mp4vdec_sn.dll64P
mpeg4aacdec_sn.dll64P
mpeg4aacenc_sn.dll64P
mpeg4aridec_sn.dll64P
nbamrdec_sn.dll64P
nbamrenc_sn.dll64P
postprocessor_dualout.dll64P
qosdyn_3430.dll64P
ringio.dll64P
star.l64P
usn.dll64P
vpp_sn.dll64P
wbamrdec_sn.dll64P
wbamrenc_sn.dll64P
wmadec_sn.dll64P
wmv9dec_sn.dll64P
yuvconvert.l64p
Wifi access point doesn't seem very well protected (/etc/wifi/softap/hostapd.conf):
SSID = AndroidAP (not broadcast)
IP = 192.168.43.1
PASS = "password" (WPA)
By the way, the Wifi interface is different than on the fully-featured Tab: tiwlan0 (the access point is tiap0)
Nice let us know what's new and how you make out
This is great news and I am looking forward to your project, thanks!!!
Heads-up: original post updated with PIT partition structure and TAR contents.
Original post updated with further information (FM radio, DSP, etc.). None of this is authoritative, obviously. I am just making plain observations. I haven't even seen the manufacturer's specifications yet for this device.
Splice/combine the ROM with a P1000 ROM?
Cool. Does this mean that your aim to splice/combine the ROM with a P1000 ROM to create a custom Android 2.2.1 ROM WITH 3G capabilities, that is compatible with P1000?
And in that case, it sure would be nice to keep most of what has been removed from /system/* in the P1010 ROM, of course.
Very interesting, thanks for posting the analysis.
I wonder whether GL drivers are any newer than from P1000 ROMs.
And GPS daemon?
Also, interesting about these split sensor drivers.
edit
hmm, interesting, the GL drivers are for SGX530 not 540 like in normal tab.
And the CPU in 1010 is OMAP3 not Hummingbird.
KB6 now online @ Samfirmware.
I'm too busy to look into it though.
Hi,
I just got the Wifi version. How can I check the ROM version?
does the P1010 still have a gps radio?
jackfrostn said:
does the P1010 still have a gps radio?
Click to expand...
Click to collapse
Yes. Only differences between 3g and wifi model:
- no 3G radio
- less powerful CPU/GPU on wifi model (thus can't play HD/Full HD video)
- and off course, wifi model is cheaper
could someone try getting the skype and qik files working
any update on the ROMs progress?
bthoven said:
Yes. Only differences between 3g and wifi model:
- no 3G radio
- less powerful CPU/GPU on wifi model (thus can't play HD/Full HD video)
- and off course, wifi model is cheaper
Click to expand...
Click to collapse
Actually it CAN play HD video. It can record 720p movies so it would only make sense it'd be able to play them. I watch 720p episodes of Breaking Bad on mine.
Sent from my GT-P1010 using XDA Premium App
himmelhauk said:
Actually it CAN play HD video. It can record 720p movies so it would only make sense it'd be able to play them. I watch 720p episodes of Breaking Bad on mine.
Sent from my GT-P1010 using XDA Premium App
Click to expand...
Click to collapse
Yes, it can play 720p lower bitrate whilst the 3G version can play higher bit rate, and also 1080p.
bthoven said:
Yes, it can play 720p lower bitrate whilst the 3G version can play higher bit rate, and also 1080p.
Click to expand...
Click to collapse
Actually it is worth making a correction here as well, it plays 1080 just fine as well, at least for me.
Out of curiousity, where did you see that the wifi has a different CPU/GPU than the GSM/CDMA versions? I'm not finding that info anywhere.
chrisliphart said:
Out of curiousity, where did you see that the wifi has a different CPU/GPU than the GSM/CDMA versions? I'm not finding that info anywhere.
Click to expand...
Click to collapse
In all the TI OMAP libraries and kernel in the ROM?
skype for p1010 wifi
Skype will work with regular rom.i used it all day today
Yes, it does have gps radio on there. Well mine does anyway (in the uk)
Hi Everyone,
If you're looking for something to do with your GN's NFC radio, check out FareBot.
https://market.android.com/details?id=com.codebutler.farebot
I just released an updated version designed for Android 4.0 with support for Japanese cards.
http://codebutler.com/farebot-visits-japan
Hope you find it useful!
Any chance we could get Melbourne Myki implemented? More than happy to feed through details.
insty said:
Any chance we could get Melbourne Myki implemented? More than happy to feed through details.
Click to expand...
Click to collapse
I +1 this! Happy to help with some info if you need it!
ditto with Brisbane''s go card - happy to send you any data you need to include..
Hi,
Can't read a Singapore ezLink card, and it didn't work with a different tool (mobSenz), too. Could it be that different card standards are used?
Sent from my Galaxy Nexus using xda premium
Would be awesome if this worked with Londons Oyster Cards
azazin said:
Would be awesome if this worked with Londons Oyster Cards
Click to expand...
Click to collapse
+1
Sent from Mobile..
jrjunior said:
Hi,
Can't read a Singapore ezLink card, and it didn't work with a different tool (mobSenz), too. Could it be that different card standards are used?
Sent from my Galaxy Nexus using xda premium
Click to expand...
Click to collapse
There seems to be something funny with ezlink cards. Try placing the card on a flat surface, launching FareBot, setting the phone down on top of the card, and waiting 30 seconds.
Really nice application! Very handy to see travel history / balance straight of the card
It would nice if I could use it here in The Netherlands using the "OV-chipkaart"
Here is some technical information (if usefull):
# IC manufacturer:
NXP Semiconductors
# IC type:
MIFARE Classic (MF1ICS70)
# Application information:
OV-chipkaart
* Personal card
* Valid until 26-04-2016
# Memory size:
4 kB
* 32 sectors of 4 blocks and 8 sectors of 16 blocks
* 256 blocks, with 16 bytes per block
# Technologies supported:
MIFARE Classic compatible
ISO/IEC 14443-3 (Type A) compatible
ISO/IEC 14443-2 (Type A) compatible
# Detailed protocol information:
ID: 2D:87:99:XX
ATQA: 0x0200
SAK: 0x18
Click to expand...
Click to collapse
Does this mean I can use my Phone as a clipper card?
Can WMATA cards be supported (Washington, DC)? Shows as unsupported
Technologies:
MifareClassic
NfcA
.... edit
actually this was a Rio De Janeiro Metrorio card.... I get no response from the WMATA Smartcard
Would love to have support for the norwegian flexus system aswell!
Does this do RFID card emulation?
codebutler said:
There seems to be something funny with ezlink cards. Try placing the card on a flat surface, launching FareBot, setting the phone down on top of the card, and waiting 30 seconds.
Click to expand...
Click to collapse
This works with EZ-Link! I opened Farebot and kept the phone on the card for about 10 seconds. The phone beeped 3 or 4 times before Farebot read the card.
I used to be able to just tap the card without launching the Farebot app on my Nexus S though. Maybe it's something to do with ICS?
MiKA7 said:
Would love to have support for the norwegian flexus system aswell!
Click to expand...
Click to collapse
+1 to this, but I fear that Ruter has encrypted everything and you need access/master keys to access the data.
Code:
# IC manufacturer:
NXP Semiconductors
# IC type:
MIFARE DESFire (MF3ICD40)
# DESFire Applications:
NORTIC transport application
NORTIC card issuer application
# Application information:
Norway public transport card
* Card no: ******
* Valid till: Sunday May 31 2015
-----------------------------------------------
# NFC data set storage not present:
-----------------------------------------------
# Memory size:
4 kB
# IC detailed information:
Capacitance: 17 pF
# DESFire version information:
Vendor ID: NXP
Hardware info:
* type/subtype: 0x01/0x01
* version: 0.2
* storage size: 4096 bytes
* protocol: ISO/IEC 14443-2 and -3
Software info:
* type/subtype: 0x01/0x01
* version: 0.6
* storage size: 4096 bytes
* protocol: ISO/IEC 14443-3 and -4
Batch no: 0x8E45515660
Production date: week 45, 2004
-----------------------------------------------
# Technologies supported:
ISO/IEC 7816-4 compatible
Native DESFire APDU framing
ISO/IEC 14443-4 (Type A) compatible
ISO/IEC 14443-3 (Type A) compatible
ISO/IEC 14443-2 (Type A) compatible
# Android technology classes supported:
android.nfc.tech.IsoDep
android.nfc.tech.NfcA
Tag.toString() result:
* TAG: Tech [android.nfc.tech.IsoDep, android.nfc.tech.NfcA]
# Detailed protocol information:
ID: 04:2F:39:71:45:1D:80
ATQA: 0x4403
SAK: 0x20
ATS Historical bytes: 0x80 |.|
# Memory content:
PICC level (Application ID 0x000000)
* PICC key configuration: (0x0B 01)
- PICC key required for:
~ directory list access: no
~ create/delete applications: yes
- Configuration changeable
* Master key version: 0
Application ID 0x578001 (NORTIC transport application)
* Master key configuration: (0x12 08)
- Master key required for:
~ directory list access: no
~ create/delete files: yes
- Configuration frozen
- Max. 8 (3)DES keys
* Master key version: 131
* 8 file(s) present
- File ID 0x0A: Standard data, 32 bytes
~ Communication: plain
~ Read key: key #7
~ Write key: blocked
~ Read/Write key: key #2
~ Change key: key #1
- File ID 0x0C: Standard data, 32 bytes
~ Communication: plain
~ Read key: key #7
~ Write key: blocked
~ Read/Write key: key #3
~ Change key: key #1
- File ID 0x01: Backup data, 384 bytes
~ Communication: with MAC
~ Read key: key #7
~ Write key: blocked
~ Read/Write key: key #4
~ Change key: key #1
- File ID 0x02: Backup data, 128 bytes
~ Communication: with MAC
~ Read key: key #7
~ Write key: key #6
~ Read/Write key: key #4
~ Change key: key #1
- File ID 0x03: Backup data, 288 bytes
~ Communication: with MAC
~ Read key: key #7
~ Write key: key #6
~ Read/Write key: key #4
~ Change key: key #1
- File ID 0x04: Value data
~ Lower limit: 0
~ Upper limit: 2147483647
~ Limited credit not allowed
~ Communication: with MAC
~ Read key: key #7
~ Write key: blocked
~ Read/Write key: key #5
~ Change key: key #1
- File ID 0x05: Cyclic record file, 8 records
~ Record size: 36 bytes
~ Max. no. of records: 9
~ Communication: plain
~ Read key: key #7
~ Write key: key #6
~ Read/Write key: blocked
~ Change key: key #1
- File ID 0x06: Cyclic record file, 2 records
~ Record size: 32 bytes
~ Max. no. of records: 3
~ Communication: plain
~ Read key: key #7
~ Write key: key #5
~ Read/Write key: blocked
~ Change key: key #1
Application ID 0x578000 (NORTIC card issuer application)
* Master key configuration: (0x12 04)
- Master key required for:
~ directory list access: no
~ create/delete files: yes
- Configuration frozen
- Max. 4 (3)DES keys
* Master key version: 197
* 1 file(s) present
- File ID 0x0C: Standard data, 16 bytes
~ Communication: plain
~ Read key: free access
~ Write key: blocked
~ Read/Write key: blocked
~ Change key: key #1
~ Contents:
[0000] 90 80 00 02 00 08 9E 39 |.......9|
[0008] 69 14 00 00 40 00 0C 40 |[email protected]@|
-----------------------------------------------
azazin said:
Would be awesome if this worked with Londons Oyster Cards
Click to expand...
Click to collapse
+2
10char
edit: sorry wrong thread
I have one I'd like to add to the list, if the dev is taking suggestions:
Konami eAmusement pass - it's a card used for arcade games that stores your information on their network
Unsupported tag
Identifier: 84696808000104e0
Technologies: NfcV, NdefFormatable
edit: while I think about it, here we all sit and ask for things, but I'd like to say thanks for putting work into this app that reads outside-the-box NFC tags
Farebot
Hi Mr Eric,
Does Farebot supports writing? Is overwriting possible without losing its current data? I want to try adding extra command to be written in my ezlink card also.
Thanks
+1 for Oyster card support
Anyone have a good list of MMI codes for the TMO T989?
Device: Samsung Tmobile S2 [SGH-T989]
ROM: BlackEdition R7 ICS Rom
Radio: Blaze 4g ICS Radio
Tweak Script: Newest Supercharger V6 ICS with modified services.jar, KAK, 3G Turbocharger
Did you try that thing called Google?
xsteven77x said:
Did you try that thing called Google?
Click to expand...
Click to collapse
Google? What's that? Btw yes I have the results are some codes here some codes there. I was looking for a good list of all or atleast many in one area.
Device: Samsung Tmobile S2 [SGH-T989]
ROM: BlackEdition R7 ICS Rom
Radio: Blaze 4G ICS Radio
Tweak Script: Newest Supercharger V6 ICS with modified services.jar, KAK, 3G Turbocharger
Samsung Mobile Codes. - - - Global Codes.
*#1234# = Firmware Version.
*#2222# = H/W Version.
*#8999*8376263# = All Versions Together.
*#8999*8378# = Test Menu.
*#4777*8665# = GPSR Tool.
*#8999*523# = LCD Brightness.
*#8999*377# = Error Menu.
*#8999*327# = EEP Menu.
*#8999*667# = Debug Mode.
*#92782# = PhoneModel. (Wap)
#*5737425# = JAVA Mode.
*#2255# = Call List.
*#232337# = Bluetooth MAC Adress.
*#5282837# = Java Version.
#*4773# = Incremental Redundancy.
#*7752# = 8 PSK uplink capability bit.
#*7785# = Reset wakeup & RTK timer cariables/variables.
#*7200# = Tone Generator Mute.
#*3888# = BLUETOOTH Test mode.
#*7828# = Task screen.
#*#8377466# = S/W Version & H/W Version.
#*2562# = Restarts Phone.
#*2565# = No Blocking? General Defense.
#*3353# = General Defense, Code Erased.
#*3837# = Phone Hangs on White screen.
#*3849# = Restarts Phone.
#*3851# = Restarts Phone.
#*3876# = Restarts Phone.
#*7222# = Operation Typ: (Class C GSM)
#*7224# = !!! ERROR !!!
#*7252# = Operation Typ: (Class B GPRS)
#*7271# = CMD: (Not Available)
#*7274# = CMD: (Not Available)
#*7337# = Restarts Phone. (Resets Wap Settings)
#*2787# = CRTP ON/OFF.
#*2886# = AutoAnswer ON/OFF.
#*3737# = L1 AFC.
#*5133# = L1 HO Data.
#*7288# = GPRS Detached/Attached.
#*7287# = GPRS Attached.
#*7666# = White Screen.
#*7693# = Sleep Deactivate/Activate.
#*7284# = L1 HO Data.
#*2256# = Calibration info? (For CMD set DEBUGAUTONOMY in cihard.opt)
#*2286# = Databattery.
#*2527# = GPRS switching set to (Class 4, 8, 9, 10)
#*2679# = Copycat feature Activa/Deactivate.
#*3940# = External looptest 9600 bps.
#*4263# = Handsfree mode Activate/Deactivate.
#*4700# = Please use function 2637.
#*7352# = BVMC Reg value (LOW_SWTOFF, NOMINAL_SWTOFF)
#*2558# = Time ON.
#*3370# = Same as 4700.
#*3941# = External looptest 115200 bps
#*5176# = L1 Sleep.
#*7462# = SIM Phase.
#*7983# = Voltage/Freq.
#*7986# = Voltage.
#*8466# = Old Time.
#*2255# = Call Failed.
#*5187# = L1C2G trace Activate/Deactivate.
#*5376# = DELETE ALL SMS!!!!.
#*6837# = Official Software Version: (0003000016000702)
#*7524# = KCGPRS: (FF FF FF FF FF FF FF FF 07)
#*7562# = LOCI GPRS: (FF FF FF FF FF FF FF FF FF FF FF FE FF 01)
#*2337# = Permanent Registration Beep.
#*2474# = Charging Duration.
#*2834# = Audio Path. (Handsfree)
#*3270# = DCS Support Activate/Deactivate.
#*3282# = Data Activate/Deactivate.
#*3476# = EGSM Activate/Deactivate.
#*3676# = FORMAT FLASH VOLUME!!!
#*4760# = GSM Activate/Deactivate.
#*4864# = White Screen.
#*5171# = L1P1.
#*5172# = L1P2.
#*5173# = L1P3.
#*7326# = Accessory.
#*7683# = Sleep variable.
#*8465# = Time in L1.
#*2252# = Current CAL.
#*2836# = AVDDSS Management Activate/Deactivate.
#*3877# = Dump of SPY trace.
#*7728# = RSAV.
#*2677# = Same as 4700.
#*3728# = Time 2 Decod.
#*3725# = B4 last off.
#*7372# = Resetting the time to DPB variables.
#*7732# = Packet flow context bit Activate/Deactivate.
#*6833# = New uplink establishment Activate/Deactivate.
#*3273# = EGPRS multislot. (Class 4, 8, 9, 10)
#*7722# = RLC bitmap compression Activate/Deactivate.
#*2351# = Blinks 1347E201 in RED.
#*4472# = Hysteresis of serving cell: 3 dB
#*2775# = Switch to 2 inner speaker.
#*9270# = Force WBS.
#*7878# = FirstStartup. (0=NO, 1=YES)
#*3757# = DSL UART speed set to. (LOW, HIGH)
#*8726# = Switches USBACM to Normal.
#*8724# = Switches USBACM to Generator mode.
#*8727# = Switches USBACM to Slink mode.
#*8725# = Switches USBACM to Loop-back mode.
#*3838# = Blinks 3D030300 in RED.
#*2077# = GPRS Switch.
#*2027# = GPRS Switch.
#*0227# = GPRS Switch.
#*0277# = GPRS Switch.
#*8370# = Tfs4.0 Test 0.
#*8371# = Tfs4.0 Test 1.
#*8372# = Tfs4.0 Test 2.
#*8373# = Tfs4.0 Test 3.
#*8374# = Tfs4.0 Test 4.
#*8375# = Tfs4.0 Test 5.
#*8376# = Tfs4.0 Test 6.
#*8377# = Tfs4.0 Test 7.
#*8378# = Tfs4.0 Test 8.
#*8379# = Tfs4.0 Test 9.
#*7878# = FirstStartup. (0=NO, 1=YES)
#*3838# = Blinks 3D030300 in RED.
#*2077# = GPRS Switch.
#*2027# = GPRS Switch.
#*0227# = GPRS Switch.
#*0277# = GPRS Switch.
#*22671# = AMR REC START.
#*22672# = Stop AMR REC. (File name: /a/multimedia/sounds/voice list/ENGMODE.amr)
#*22673# = Pause REC.
#*22674# = Resume REC.
#*22675# = AMR Playback.
#*22676# = AMR Stop Play.
#*22677# = Pause Play.
#*22678# = Resume Play.
#*77261# = PCM Rec Req.
#*77262# = Stop PCM Rec.
#*77263# = PCM Playback.
#*77264# = PCM Stop Play.
#*22679# = AMR Get Time.
*#8999*364# = Watchdog ON/OFF.
*#8999*427# = WATCHDOG signal route setup.
*2767*226372# = Camera Reset. (deletes photos)
*2767*3855# = E2P Full Reset.
*2767*2878# = E2P Custom Reset.
*2767*927# = E2P Wap Reset.
*2767*226372# = E2P Camera Reset.
*2767*688# = Reset Mobile TV.
#7263867# = RAM Dump. (On or Off)
samsung mobile code. - - - wap / mms code.
*2767*43927# = Austria WAP Settings.
*2767*420927# = Czech WAP Settings.
*2767*33927# = France WAP Settings.
*2767*49927# = Germany WAP Settings.
*2767*30927# = Greece WAP Settings.
*2767*39927# = Italy WAP Settings.
*2767*31927# = Netherlands WAP Settings.
*2767*351927# = Portugal WAP Settings.
*2767*7927# = Russia WAP Settings.
*2767*34927# = Spain WAP Settings.
*2767*46927# = Sweden WAP Settings.
*2767*44927# = UK WAP Settings.
*2767*380927# = Ukraine WAP Settings.
*2767*73738927# = WAP Settings Reset.
*2767*43667# = Austria MMS Settings.
*2767*420667# = Czech MMS Settings.
*2767*33667# = France MMS Settings.
*2767*49667# = Germany MMS Settings.
*2767*30667# = Greece MMS Settings.
*2767*39667# = Italy MMS Settings.
*2767*31667# = Netherlands MMS Settings.
*2767*351667# = Portugal MMS Settings.
*2767*7667# = Russia MMS Settings.
*2767*34667# = Spain MMS Settings.
*2767*46667# = Sweden MMS Settings.
*2767*44667# = UK MMS Settings.
*2767*380667# = Ukraine MMS Settings.
samsung mobile code. - - - email code.
#*36245# Turns Email TestMenu on.
*2767*22236245# Email EPP set (....)!
*2767*837836245# Email Test Account!
*2767*29536245# Email Test2 Account!
*2767*036245# Email EPP reset!
*2767*136245# Email EPP set (1)!
*2767*736245# Email EPP set (7)!
*2767*3036245# Email...
*2767*3136245# Email...
*2767*3336245# Email...
*2767*3436245# Email...
*2767*3936245# Email...
*2767*4136245# Email...
*2767*4336245# Email...
*2767*4436245# Email...
*2767*4536245# Email...
*2767*4636245# Email...
*2767*4936245# Email...
*2767*6036245# Email...
*2767*6136245# Email...
*2767*6236245# Email...
*2767*6336245# Email...
*2767*6536245# Email...
*2767*6636245# Email...
*2767*8636245# Email...
*2767*85236245# Email...
samsung mobile code. - - - lock code.
*#7465625# = Check the locks.
*7465625*638*Code# = Enables Network lock.
#7465625*638*Code# = Disables Network lock.
*7465625*782*Code# = Enables Subset lock.
#7465625*782*Code# = Disables Subset lock.
*7465625*77*Code# = Enables SP lock.
#7465625*77*Code# = Disables SP lock.
*7465625*27*Code# = Enables CP lock.
#7465625*27*Code# = Disables CP lock.
*7465625*746*Code# = Enables SIM lock.
#7465625*746*Code# = Disables SIM lock.
*7465625*228# = Activa lock ON.
#7465625*228# = Activa lock OFF.
*7465625*28638# = Auto Network lock ON.
#7465625*28638# = Auto Network lock OFF.
*7465625*28782# = Auto subset lock ON.
#7465625*28782# = Auto subset lock OFF.
*7465625*2877# = Auto SP lock ON.
#7465625*2877# = Auto SP lock OFF.
*7465625*2827# = Auto CP lock ON.
#7465625*2827# = Auto CP lock OFF.
*7465625*28746# = Auto SIM lock ON.
#7465625*28746# = Auto SIM lock OFF.
samsung mobile code. - - - sound code.
Samsung phones.
Dial *#6984125*#
Test menu dial *#9072641*# (You need this one i think.)
Click 5 Audio - 2 AP volume config
Now you see zie je 4 things:
1 RCV config
2 EAR config
3 SPK config
4 BTH config
Now you see this:
1 MP volume
2 Keytone volume
3 Ringtone volume
4 Rec volume
5 FM radio volume
6 Camera volume
7 Voice call volume
8 Vt call volume
9 Voice memo volume
( SPK = Speaker )( Ear = Headset )
Tune Headset volume:
*#9072641*# - 2 EAR config - 3 Ringtone volume - Stap 6 tune it to 10
Tune movie volume:
*#9072641*# - 3 SPK config - 3 Ringtone volume - Stap 6 tune it to 10
Note it works but don't forget to type somewhere your old settings.
And These:
* # * # 4636 # * # * Details of your battery: - Phone Information - Battery Information - Battery History - Usage Statistics
* # * # 7780 # * # * This code is to do a factory reset .
Delete the following: - The settings of your Google account on the phone - system settings and applications - Applications you download to SD (downloaded, not installed) does not delete: - The software and applications you have installed - Files the SD.
* 2767 * 3855 # Warning: This code will make us a full factory reset (wipe total). Deleting all files in internal memory and reinstall the firmware.
* # * # 34971539 # * # * About your camera. - Update the camera firmware (Do not take this option) - Update the camera firmware in the SD - Release the camera firmware
* # * # 7594 # * # * This code directly off your phone, without going through the menu.
* # * # 273283 * 255 * 663 282 * # * # * It opens a screen that lets you copy your media.
* # * # 197328640 # * # * To access the service mode (used for deiferentes tests) and use the following code * # * # 232339 # * # * Or * # * # 526 # * # * O * # * # 528 # * # * - WLAN test * # * # 232338 # * # * - Show the current MAC address * # * # 1472365 # * # * - GPS test * # * # 1575 # * # * - Other GPS test * # * # 232331 # * # * - Bluetooth Test * # * # 232337 # * # - Displays the Bluetooth terminal address * # * # 8255 # * # * You open the monitor Gtalk. Codes Firmware for information: * # * # 4986 * 2650468 # * # * - PDA, Phone, H / W, RFCallDate * # * # 1234 # * # * - PDA and Phone * # * # 1111 # * # * - FTA SW Version * # * # * # * 2222 # - FTA HW Version * # * # * # * 44336 # - PDA, Phone, CSC, Build Time, changelist number codes to run different tests at the factory: * # * # 0283 # * # * - Packet Loopback * # * # 0 * # * # * - LCD Test * # * # 0673 # * # * O * # * # 0289 # * # * - Melody test * # * # 0842 # * # * - Device test (Vibration test and BackLight test) * # * # 2663 # * # * - Touch screen version * # * # 2664 # * # * - Touch screen test * # * # 0588 # * # * - Proximity sensor test * # * # 3264 # * # * - RAM version
Where in the heck did you find that listing. That's a hella list than the one I got.
Device: Samsung Tmobile S2 [SGH-T989]
ROM: BlackEdition R7 ICS Rom
Radio: Blaze 4G ICS Radio
Tweak Script: Newest Supercharger V6 ICS with modified services.jar, KAK, 3G Turbocharger
To choose specific network band
*#2263#
falcon67 said:
To choose specific network band
*#2263#
Click to expand...
Click to collapse
Yeah. I've played with that one alot in different areas where 3G is faster than HSPA in some area that im in.
Device: Samsung Tmobile S2 [SGH-T989]
ROM: BlackEdition R7 ICS Rom
Radio: Blaze 4G ICS Radio
Tweak Script: Newest Supercharger V6 ICS with modified services.jar, KAK, 3G Turbocharger
falcon67 said:
To choose specific network band
*#2263#
Click to expand...
Click to collapse
easy way to remember is *#band#
DriftorX said:
Where in the heck did you find that listing. That's a hella list than the one I got.
Device: Samsung Tmobile S2 [SGH-T989]
ROM: BlackEdition R7 ICS Rom
Radio: Blaze 4G ICS Radio
Tweak Script: Newest Supercharger V6 ICS with modified services.jar, KAK, 3G Turbocharger
Click to expand...
Click to collapse
You're welcome....
I tried out the "band" code yesterday, but I was unsure as to what the choices meant...Can someone explain what each choice means? thanks
Thanks for this complete list of codes. Really handy!
Sent from Jelly Bean'd T989 using Tapatalk 4 Beta 6.
dave2metz said:
I tried out the "band" code yesterday, but I was unsure as to what the choices meant...Can someone explain what each choice means? thanks
Click to expand...
Click to collapse
This code was working when I was on ICS. Now I'm on JB and this same dead end screen appears on my phone too.
Yes JB has borked the codes for me too...
Sent from Jelly Bean'd T989 using Tapatalk 4 Beta 6.
Hello
i want to clone a smartcard member card. Another Cards i solve to cloning. But the another member card not. I use acr122u with kali linux and nfc-list and mfoc and mfuk
Here the ssh session output:
nfc-list -t
nfc-list uses libnfc 1.7.1
NFC device: ACS / ACR122U PICC Interface opened
1 ISO14443A passive target(s) found:
ISO/IEC 14443A (106 kbps) target:
ATQA (SENS_RES): 00 48
UID (NFCID1): 0e 45 xx xx xx xx xx
SAK (SEL_RES): 20
ATS: 37 33 91 xx xx xx xx xx
[email protected]:~# nfc-list -v
nfc-list uses libnfc 1.7.1
NFC device: ACS / ACR122U PICC Interface opened
1 ISO14443A passive target(s) found:
ISO/IEC 14443A (106 kbps) target:
ATQA (SENS_RES): 00 48
* UID size: double
* bit frame anticollision supported
UID (NFCID1): 0e 45 xx xx xx xx xx
SAK (SEL_RES): 20
* Compliant with ISO/IEC 14443-4
* Not compliant with ISO/IEC 18092
ATS: 37 33 91 xx xx xx xx xx
* Max Frame Size accepted by PICC: 128 bytes
* Bit Rate Capability:
* PICC to PCD, DS=2, bitrate 212 kbits/s supported
* PICC to PCD, DS=4, bitrate 424 kbits/s supported
* PCD to PICC, DR=2, bitrate 212 kbits/s supported
* PCD to PICC, DR=4, bitrate 424 kbits/s supported
* Frame Waiting Time: 154.7 ms
* Start-up Frame Guard Time: 0.6041 ms
* Historical bytes Tk: 5a 43 56 XX XX
* Proprietary format
Fingerprinting based on MIFARE type Identification Procedure:
* SmartMX with 7 Byte UID
Other possible matches based on ATQA & SAK values:
* JCOP31 v2.4.1
* JCOP31 v2.2
0 Felica (212 kbps) passive target(s) found.
0 Felica (424 kbps) passive target(s) found.
0 ISO14443B passive target(s) found.
0 ISO14443B' passive target(s) found.
0 ISO14443B-2 ST SRx passive target(s) found.
0 ISO14443B-2 ASK CTx passive target(s) found.
0 Jewel passive target(s) found.
[email protected]:~# mfoc -O output.mfd
mfoc: ERROR: only Mifare Classic is supported
Did anybody know this problem? can i clone this mifare card??
greats
i have a teclast M20 4G M3K4 and I would like to root it found a link on the internet that explains how to do this would like your opinions
canot post link because i have no rights
AIDA64 for Android v1.66 Repo
<<< System >>>
Device Model: Teclast M20 4G
Device Type: Tablet
Manufacturer: techain
Model: M20_4G
Brand: Teclast
Board: mt6797
Device: M20_4G
Hardware: mt6797
Platform: mt6797
Product: M20_4G
Installed RAM: 4 GB LPDDR3
Total Memory: 3682 MB
Available Memory: 1887 MB
Internal Storage Total Space: 53.43 GB
Internal Storage Free Space: 49.40 GB
External Storage Total Space: 29.80 GB
External Storage Free Space: 21.95 GB
Bluetooth Version: 4.0
Device Features: android.hardware.audio.low_latency
android.hardware.audio.output
android.hardware.bluetooth
android.hardware.bluetooth_le
android.hardware.camera
android.hardware.camera.any
android.hardware.camera.autofocus
android.hardware.camera.front
android.hardware.faketouch
android.hardware.location
android.hardware.location.gps
android.hardware.location.network
android.hardware.microphone
android.hardware.opengles.aep
android.hardware.screen.landscape
android.hardware.screen.portrait
android.hardware.sensor.accelerometer
android.hardware.telephony
android.hardware.telephony.cdma
android.hardware.telephony.gsm
android.hardware.touchscreen
android.hardware.touchscreen.multitouch
android.hardware.touchscreen.multitouch.distinct
android.hardware.touchscreen.multitouch.jazzhand
android.hardware.usb.accessory
android.hardware.usb.host
android.hardware.vulkan.level
android.hardware.vulkan.version
android.hardware.wifi
android.hardware.wifi.direct
android.software.activities_on_secondary_displays
android.software.app_widgets
android.software.autofill
android.software.backup
android.software.companion_device_setup
android.software.connectionservice
android.software.cts
android.software.device_admin
android.software.home_screen
android.software.input_methods
android.software.live_wallpaper
android.software.managed_users
android.software.midi
android.software.picture_in_picture
android.software.print
android.software.voice_recognizers
android.software.webview
<<< CPU >>>
SoC Model: MediaTek Helio X20 (MT6797)
Core Architecture: 4x ARM Cortex-A53 @ 1391 MHz
4x ARM Cortex-A53
2x ARM Cortex-A72
Manufacturing Process: 20 nm
Instruction Set: 64-bit ARMv8-A
CPU Revision: r0p1
CPU Cores: 10
CPU Clock Range: 221 - 1391 MHz
Core 1 Clock: 1118 MHz
Core 2 Clock: 1118 MHz
Core 3 Clock: 1118 MHz
Core 4 Clock: (sleeping)
Core 5 Clock: (sleeping)
Core 6 Clock: (sleeping)
Core 7 Clock: (sleeping)
Core 8 Clock: (sleeping)
Core 9 Clock: (sleeping)
Core 10 Clock: (sleeping)
Scaling Governor: interactive
Supported ABIs: arm64-v8a, armeabi-v7a, armeabi
Supported 32-bit ABIs: armeabi-v7a, armeabi
Supported 64-bit ABIs: arm64-v8a
AES: Supported
NEON: Supported
SHA1: Supported
SHA2: Supported
<<< Display >>>
Screen Resolution: 2560 × 1600
Technology: IPS LCD
Screen Size: 218 mm × 136 mm
Screen Diagonal: 10.1 inches
Pixel Density: 299 dpi (xhdpi)
xdpi / ydpi: 320 / 320 dpi
GPU Vendor: ARM
GPU Renderer: Mali-T880
Refresh Rate: 57 Hz
Default Orientation: Landscape
OpenGL ES Version: 3.2
GPU Version: OpenGL ES 3.2 v1.r20p0-01rel0.d174d1328b67c542941eec67baa38e6a
OpenGL ES Extensions: GL_EXT_debug_marker
GL_ARM_rgba8
GL_ARM_mali_shader_binary
GL_OES_depth24
GL_OES_depth_texture
GL_OES_depth_texture_cube_map
GL_OES_packed_depth_stencil
GL_OES_rgb8_rgba8
GL_EXT_read_format_bgra
GL_OES_compressed_paletted_texture
GL_OES_compressed_ETC1_RGB8_texture
GL_OES_standard_derivatives
GL_OES_EGL_image
GL_OES_EGL_image_external
GL_OES_EGL_image_external_essl3
GL_OES_EGL_sync
GL_OES_texture_npot
GL_OES_vertex_half_float
GL_OES_required_internalformat
GL_OES_vertex_array_object
GL_OES_mapbuffer
GL_EXT_texture_format_BGRA8888
GL_EXT_texture_rg
GL_EXT_texture_type_2_10_10_10_REV
GL_OES_fbo_render_mipmap
GL_OES_element_index_uint
GL_EXT_shadow_samplers
GL_OES_texture_compression_astc
GL_KHR_texture_compression_astc_ldr
GL_KHR_texture_compression_astc_hdr
GL_KHR_texture_compression_astc_sliced_3d
GL_KHR_debug
GL_EXT_occlusion_query_boolean
GL_EXT_disjoint_timer_query
GL_EXT_blend_minmax
GL_EXT_discard_framebuffer
GL_OES_get_program_binary
GL_OES_texture_3D
GL_EXT_texture_storage
GL_EXT_multisampled_render_to_texture
GL_OES_surfaceless_context
GL_OES_texture_stencil8
GL_EXT_shader_pixel_local_storage
GL_ARM_shader_framebuffer_fetch
GL_ARM_shader_framebuffer_fetch_depth_stencil
GL_ARM_mali_program_binary
GL_EXT_sRGB
GL_EXT_sRGB_write_control
GL_EXT_texture_sRGB_decode
GL_EXT_texture_sRGB_R8
GL_EXT_texture_sRGB_RG8
GL_KHR_blend_equation_advanced
GL_KHR_blend_equation_advanced_coherent
GL_OES_texture_storage_multisample_2d_array
GL_OES_shader_image_atomic
GL_EXT_robustness
GL_EXT_draw_buffers_indexed
GL_OES_draw_buffers_indexed
GL_EXT_texture_border_clamp
GL_OES_texture_border_clamp
GL_EXT_texture_cube_map_array
GL_OES_texture_cube_map_array
GL_OES_sample_variables
GL_OES_sample_shading
GL_OES_shader_multisample_interpolation
GL_EXT_shader_io_blocks
GL_OES_shader_io_blocks
GL_EXT_tessellation_shader
GL_OES_tessellation_shader
GL_EXT_primitive_bounding_box
GL_OES_primitive_bounding_box
GL_EXT_geometry_shader
GL_OES_geometry_shader
GL_ANDROID_extension_pack_es31a
GL_EXT_gpu_shader5
GL_OES_gpu_shader5
GL_EXT_texture_buffer
GL_OES_texture_buffer
GL_EXT_copy_image
GL_OES_copy_image
GL_EXT_shader_non_constant_global_initializers
GL_EXT_color_buffer_half_float
GL_EXT_color_buffer_float
GL_EXT_YUV_target
GL_OVR_multiview
GL_OVR_multiview2
GL_OVR_multiview_multisampled_render_to_texture
GL_KHR_robustness
GL_KHR_robust_buffer_access_behavior
GL_EXT_draw_elements_base_vertex
GL_OES_draw_elements_base_vertex
<<< Network >>>
<< Telephony >>
Phone Type: GSM
Network Operator Name: Oi
Network Operator Code: 72431
Network Operator Country: Brazil
SIM Provider Name: Oi
SIM Provider Code: 72431
SIM Provider Country: Brazil
SIM State: Ready
Network Type: EDGE
Data Connection State: Disconnected
Data Activity: None
Device Is Roaming: No
ICC Card: Present
<< Wi-Fi >>
State: Enabled
SSID: "casa1"
BSSID: ec:08:6b:e0:3e:e7
Hidden SSID: No
IPv4 Address: 192.168.1.102
IPv6 Address: fe80::200:3ff:fe22:28f9
Signal Strength: -70 dBm (Good)
Link Speed: 52 Mbps
Frequency: 2457 MHz
Network ID: 0
Gateway: 192.168.1.1
Netmask: 255.255.255.0
DNS1: 8.8.8.8
DNS2: 8.8.4.4
DHCP Lease Duration: 24 hours
5 GHz Band: Supported
Wi-Fi Aware: Not Supported
Wi-Fi Direct: Supported
<<< Battery >>>
Power Source: Battery
Level: 50 %
Status: Not Charging
Health: Good
Technology: Li-ion
Temperature: 25.0°C
Voltage: 3.765 V
Charge Counter: 6400 mAh
Discharge Rate: 533 mA
Capacity: 6600 mAh
<<< Android >>>
Android Version: 8.0.0 (Oreo)
API Level: 26
Android Security Patch Level: 2018-06-05
Rooted Device: No
Android ID: b640aeefa323aa7e
Baseband: MOLY.LR11.W1630.MD.MP.V67.2, 2018/04/02 17:50
Build ID: V1.02_20190223
Codename: REL
Fingerprint: CHUWI/Hi9Air/Hi9Air:8.0.0/O00623/1520042099:user/release-keys
ID: O00623
Incremental: 1520042099
Java Runtime Version: Android Runtime 0.9
Java VM Version: ART 2.1.0
Java VM Heap Size: 384 MB
Kernel Architecture: aarch64
Kernel Version: 3.18.60
Tags: release-keys
Type: user
Google Play Services Version: 19.6.29 (040406-278422107)
Huawei Mobile Services Version: < Not Present >
OpenSSL Version: OpenSSL 1.0.2 (compatible; BoringSSL)
ZLib Version: 1.2.8
ICU CLDR Version: 30.0.3
ICU Library Version: 58.2
ICU Unicode Version: 9.0
Android Language: English (United States)
Configured Time Zone: Brasilia Standard Time (UTC-03:00)
UpTime: 01:08:50
<<< Devices >>>
<< Rear-Facing Camera >>
Resolution: 5.0 MP (2592 × 1944)
Focal Length: 3.50 mm
Focus Modes: auto, macro, infinity, continuous-picture, continuous-video
Video Stabilization: Supported
Zoom: Supported
Auto Exposure Locking: Supported
Auto White Balance Locking: Supported
Flash: Not Supported
<< Front-Facing Camera >>
Resolution: 2.1 MP (1920 × 1088)
Focal Length: 3.50 mm
Focus Modes: fixed, infinity
Video Stabilization: Supported
Zoom: Supported
Auto Exposure Locking: Supported
Auto White Balance Locking: Supported
Flash: Not Supported
<< Vulkan Device - Mali-T880 >>
Device Name: Mali-T880
Device Type: Integrated GPU
Device UUID: C5-18-34-CB-95-43-3E-BE-3B-53-73-BF-A4-4B-EC-E2
Device ID: 000013B5-08801008
Memory Size: 3768076 KB
Max 1D Image Size: 8192
Max 2D Image Size: 8192 x 8192
Max 3D Image Size: 4096 x 4096 x 4096
Max Cube Image Size: 8192 x 8192
Max Image Layers: 256
Max Texel Buffer Elements: 65536
Max Uniform Buffer Range: 65536
Max Storage Buffer Range: 134217728
Max Push Constants Size: 128 bytes
Buffer Image Granularity: 4 KB
Max Bound Descriptor Sets: 4
Max Per-Stage Descriptor Samplers: 128
Max Per-Stage Descriptor Uniform Buffers: 12
Max Per-Stage Descriptor Storage Buffers: 4
Max Per-Stage Descriptor Sampled Images: 16
Max Per-Stage Descriptor Storage Images: 4
Max Per-Stage Descriptor Input Attachments: 4
Max Per-Stage Resources: 44
Max Descriptor Set Samplers: 768
Max Descriptor Set Uniform Buffers: 72
Max Descriptor Set Dynamic Uniform Buffers: 8
Max Descriptor Set Storage Buffers: 24
Max Descriptor Set Dynamic Storage Buffers: 4
Max Descriptor Set Sampled Images: 96
Max Descriptor Set Storage Images: 24
Max Descriptor Set Input Attachments: 4
Max Vertex Input Attributes: 16
Max Vertex Input Bindings: 16
MaxVertex Input Attribute Offset: 2047
Max Vertex Input Binding Stride: 2048
Max Vertex Output Components: 128
Max Tesselation Generation Level: 64
Max Tesselation Patch Size: 32
Max Tesselation Control Per-Vertex Input Components: 64
Max Tesselation Control Per-Vertex Output Components: 64
Max Tesselation Control Per-Patch Output Components: 120
Max Tesselation Control Total Output Components: 2048
Max Tesselation Evaluation Input Components: 64
Max Tesselation Evaluation Output Components: 64
Max Geometry Shader Invocations: 32
Max Geometry Input Components: 64
Max Geometry Output Components: 128
Max Geometry Output Vertices: 256
Max Geometry Total Output Components: 1024
Max Fragment Input Components: 128
Max Fragment Output Attachments: 4
Max Fragment Combined Output Resources: 12
Max Compute Shared Memory Size: 32 KB
Max Compute Work Group Count: X: 65536, Y: 65536, Z: 65536
Max Compute Work Group Invocations: 256
Max Compute Work Group Size: X: 256, Y: 256, Z: 256
Subpixel Precision Bits: 8
Subtexel Precision Bits: 8
Mipmap Precision Bits: 8
Max Draw Indexed Index Value: 4294967295
Max Draw Indirect Count: 1
Max Sampler LOD Bias: 2.000000
Max Sampler Anisotropy: 1.000000
Max Viewports: 1
Max Viewport Size: 8192 x 8192
Viewport Bounds Range: -16384.000000 ... 16383.000000
Min Memory Map Alignment: 64 bytes
Min Texel Buffer Offset Alignment: 256 bytes
Min Uniform Buffer Offset Alignment: 16 bytes
Min Storage Buffer Offset Alignment: 256 bytes
Min / Max Texel Offset: -8 / 7
Min / Max Texel Gather Offset: -8 / 7
Min / Max Interpolation Offset: -0.500000 / 0.500000
Subpixel Interpolation Offset Bits: 4
Max Framebuffer Size: 8192 x 8192
Max Framebuffer Layers: 256
Framebuffer Color Sample Counts: 0x00000005
Framebuffer Depth Sample Counts: 0x00000005
Framebuffer Stencil Sample Counts: 0x00000005
Framebuffer No Attachments Sample Counts: 0x00000005
Max Color Attachments: 4
Sampled Image Color Sample Counts: 0x00000005
Sampled Image Integer Sample Counts: 0x00000001
Sampled Image Depth Sample Counts: 0x00000005
Sampled Image Stencil Sample Counts: 0x00000005
Storage Image Sample Counts: 0x00000001
Max Sample Mask Words: 1
Discrete Queue Priorities: 2
Point Size Range: 1.000000 ... 1024.000000
Line Width Range: 1.000000 ... 1.000000
Point Size Granularity: 0.062500
Optimal Buffer Copy Offset Alignment: 64 bytes
Optimal Buffer Copy Row Pitch Alignment: 64 bytes
Non-Coherent Atom Size: 64 bytes
Driver Version: 313.546.569
API Version: 1.0.52
Vulkan Library: /system/lib64/libvulkan.so
Alpha To One: Not Supported
Anisotropic Filtering: Not Supported
ASTC LDR Texture Compression: Supported
BC Texture Compression: Not Supported
Depth Bias Clamping: Supported
Depth Bounds Tests: Not Supported
Depth Clamping: Not Supported
Draw Indirect First Instance: Supported
Dual Source Blend Operations: Not Supported
ETC2 and EAC Texture Compression: Supported
Fragment Stores and Atomics: Supported
Full Draw Index Uint32: Supported
Geometry Shader: Supported
Image Cube Array: Supported
Independent Blend: Supported
Inherited Queries: Not Supported
Large Points: Supported
Logic Operations: Not Supported
Multi-Draw Indirect: Not Supported
Multi Viewport: Not Supported
Occlusion Query Precise: Supported
Pipeline Statistics Query: Not Supported
Point and Wireframe Fill Modes: Not Supported
Robust Buffer Access: Supported
Sample Rate Shading: Supported
Shader Clip Distance: Not Supported
Shader Cull Distance: Not Supported
Shader Float64: Not Supported
Shader Image Gather Extended: Supported
Shader Int16: Supported
Shader Int64: Not Supported
Shader Resource Min LOD: Not Supported
Shader Resource Residency: Not Supported
Shader Sampled Image Array Dynamic Indexing: Supported
Shader Storage Buffer Array Dynamic Indexing: Supported
Shader Storage Image Array Dynamic Indexing: Supported
Shader Storage Image Extended Formats: Not Supported
Shader Storage Image Multisample: Not Supported
Shader Storage Image Read Without Format: Supported
Shader Storage Image Write Without Format: Supported
Shader Tesselation and Geometry Point Size: Not Supported
Shader Uniform Buffer Array Dynamic Indexing: Supported
Sparse Binding: Not Supported
Sparse Residency 2 Samples: Not Supported
Sparse Residency 4 Samples: Not Supported
Sparse Residency 8 Samples: Not Supported
Sparse Residency 16 Samples: Not Supported
Sparse Residency Aliased: Not Supported
Sparse Residency Aligned Mip Size: No
Sparse Residency Buffer: Not Supported
Sparse Residency Image 2D: Not Supported
Sparse Residency Image 3D: Not Supported
Sparse Residency Non-Resident Strict: No
Sparse Residency Standard 2D Block Shape: No
Sparse Residency Standard 2D Multisample Block Shape: No
Sparse Residency Standard 3D Block Shape: No
Standard Sample Locations: Yes
Strict Line Rasterization: Yes
Tesselation Shader: Supported
Timestamps on All Graphics and Compute Queues: Not Supported
Variable Multisample Rate: Not Supported
Vertex Pipeline Stores and Atomics: Not Supported
Wide Lines: Not Supported
Device Extensions: VK_KHR_incremental_present
VK_GOOGLE_display_timing
VK_KHR_maintenance1
VK_KHR_shader_draw_parameters
VK_KHR_swapchain
Instance Extensions: VK_KHR_surface
VK_KHR_android_surface
VK_EXT_swapchain_colorspace
VK_KHR_get_surface_capabilities2
VK_EXT_debug_report
VK_KHR_get_physical_device_properties2
No USB devices found.
No OpenCL devices found.
No CUDA devices found.
No PCI devices found.
<<< Thermal >>>
Battery: 25.0°C
<<< Sensors >>>
ACCELEROMETER:
<<< Apps >>>
AIDA64: com.finalwire.aida64(v1.66)
AnimeDLR: net.android.adm(v6.0.1)
Dashlane: com.dashlane(v6.1946.2-arm64-v8a)
Firefox Nightly: org.mozilla.fenix.nightly(vNightly 191117 06:00)
Rastreador: app.rmayrink.Rastreador_de_Encomendas(v1.9.9)
TuneIn Radio Pro: radiotime.player(v23.2)
WhatsApp: com.whatsapp(v2.19.333)
<<< Codecs >>>
OMX.MTK.AUDIO.DECODER.MP3: audio/mpeg
OMX.MTK.AUDIO.DECODER.GSM: audio/gsm
OMX.MTK.AUDIO.DECODER.RAW: audio/raw
OMX.MTK.AUDIO.DECODER.G711.ALAW: audio/g711-alaw
OMX.MTK.AUDIO.DECODER.G711.MLAW: audio/g711-mlaw
OMX.MTK.AUDIO.DECODER.ADPCM.MS: audio/x-adpcm-ms
OMX.MTK.AUDIO.DECODER.ADPCM.DVI: audio/x-adpcm-dvi-ima
OMX.MTK.AUDIO.DECODER.APE: audio/ape
OMX.MTK.AUDIO.DECODER.ALAC: audio/alac
OMX.MTK.VIDEO.DECODER.HEVC: video/hevc
OMX.MTK.VIDEO.DECODER.MPEG4: video/mp4v-es
OMX.MTK.VIDEO.DECODER.H263: video/3gpp
OMX.MTK.VIDEO.DECODER.AVC: video/avc
OMX.MTK.VIDEO.DECODER.VPX: video/x-vnd.on2.vp8
OMX.MTK.VIDEO.DECODER.VP9: video/x-vnd.on2.vp9
OMX.MTK.VIDEO.DECODER.DIVX: video/divx
OMX.MTK.VIDEO.DECODER.DIVX3: video/divx3
OMX.MTK.VIDEO.DECODER.XVID: video/xvid
OMX.MTK.VIDEO.DECODER.VC1: video/x-ms-wmv
OMX.MTK.VIDEO.DECODER.MPEG2: video/mpeg2
OMX.MTK.VIDEO.ENCODER.MPEG4: video/mp4v-es
OMX.MTK.VIDEO.ENCODER.H263: video/3gpp
OMX.MTK.VIDEO.ENCODER.AVC: video/avc
OMX.MTK.VIDEO.ENCODER.HEVC: video/hevc
OMX.MTK.VIDEO.ENCODER.VPX: video/x-vnd.on2.vp8
OMX.google.mp3.decoder: audio/mpeg
OMX.google.amrnb.decoder: audio/3gpp
OMX.google.amrwb.decoder: audio/amr-wb
OMX.google.aac.decoder: audio/mp4a-latm
OMX.google.g711.alaw.decoder: audio/g711-alaw
OMX.google.g711.mlaw.decoder: audio/g711-mlaw
OMX.google.vorbis.decoder: audio/vorbis
OMX.google.opus.decoder: audio/opus
OMX.google.raw.decoder: audio/raw
OMX.google.aac.encoder: audio/mp4a-latm
OMX.google.amrnb.encoder: audio/3gpp
OMX.google.amrwb.encoder: audio/amr-wb
OMX.google.flac.encoder: audio/flac
OMX.google.mpeg4.decoder: video/mp4v-es
OMX.google.h263.decoder: video/3gpp
OMX.google.h264.decoder: video/avc
OMX.google.hevc.decoder: video/hevc
OMX.google.vp8.decoder: video/x-vnd.on2.vp8
OMX.google.vp9.decoder: video/x-vnd.on2.vp9
OMX.google.h263.encoder: video/3gpp
OMX.google.h264.encoder: video/avc
OMX.google.mpeg4.encoder: video/mp4v-es
OMX.google.vp8.encoder: video/x-vnd.on2.vp8
<<< Directories >>>
Data: /data
Root: /system
Java Home: /system
Download/Cache Content: /data/cache
<< External Storage >>
Primary External Storage: /storage/emulated/0
External Files #1: /storage/emulated/0/Android/data/com.finalwire.aida64/files
External Files #2: /storage/C2E0-1DEA/Android/data/com.finalwire.aida64/files
Alarms: /storage/emulated/0/Alarms
DCIM: /storage/emulated/0/DCIM
Downloads: /storage/emulated/0/Download
Movies: /storage/emulated/0/Movies
Music: /storage/emulated/0/Music
Notifications: /storage/emulated/0/Notifications
Pictures: /storage/emulated/0/Pictures
Podcasts: /storage/emulated/0/Podcasts
Ringtones: /storage/emulated/0/Ringtones
<< Mount Points >>
/: Device: rootfs
File System: rootfs
Read-Only
/dev: Device: tmpfs
File System: tmpfs
Read-Write
/dev/pts: Device: devpts
File System: devpts
Read-Write
/dev/cpuctl: Device: none
File System: cgroup
Read-Write
/dev/cpuset: Device: none
File System: cgroup
Read-Write
/dev/usb-ffs/adb: Device: adb
File System: functionfs
Read-Write
/proc: Device: proc
File System: proc
Read-Write
/sys: Device: sysfs
File System: sysfs
Read-Write
/sys/fs/selinux: Device: selinuxfs
File System: selinuxfs
Read-Write
/sys/kernel/debug: Device: debugfs
File System: debugfs
Read-Write
/sys/kernel/debug/tracing: Device: tracefs
File System: tracefs
Read-Write
/sys/fs/pstore: Device: pstore
File System: pstore
Read-Write
/system: Device: /dev/block/dm-0
File System: ext4
Read-Only
/vendor: Device: /dev/block/dm-1
File System: ext4
Read-Only
/acct: Device: none
File System: cgroup
Read-Write
/mnt: Device: tmpfs
File System: tmpfs
Read-Write
/mnt/runtime/default/emulated: Device: /data/media
File System: sdcardfs
Read-Write
/mnt/runtime/read/emulated: Device: /data/media
File System: sdcardfs
Read-Write
/mnt/runtime/write/emulated: Device: /data/media
File System: sdcardfs
Read-Write
/mnt/media_rw/C2E0-1DEA: Device: /dev/block/vold/public:179,129
File System: vfat
Read-Write
/mnt/runtime/default/C2E0-1DEA: Device: /mnt/media_rw/C2E0-1DEA
File System: sdcardfs
Read-Write
/mnt/runtime/read/C2E0-1DEA: Device: /mnt/media_rw/C2E0-1DEA
File System: sdcardfs
Read-Write
/mnt/runtime/write/C2E0-1DEA: Device: /mnt/media_rw/C2E0-1DEA
File System: sdcardfs
Read-Write
/config: Device: none
File System: configfs
Read-Write
/cache: Device: /dev/block/platform/mtk-msdc.0/11230000.msdc0/by-name/cache
File System: ext4
Read-Write
/protect_f: Device: /dev/block/platform/mtk-msdc.0/11230000.msdc0/by-name/protect1
File System: ext4
Read-Write
/protect_s: Device: /dev/block/platform/mtk-msdc.0/11230000.msdc0/by-name/protect2
File System: ext4
Read-Write
/nvdata: Device: /dev/block/platform/mtk-msdc.0/11230000.msdc0/by-name/nvdata
File System: ext4
Read-Write
/nvcfg: Device: /dev/block/platform/mtk-msdc.0/11230000.msdc0/by-name/nvcfg
File System: ext4
Read-Write
/data: Device: /dev/block/dm-2
File System: ext4
Read-Write
/storage: Device: tmpfs
File System: tmpfs
Read-Write
/storage/emulated: Device: /data/media
File System: sdcardfs
Read-Write
/storage/C2E0-1DEA: Device: /mnt/media_rw/C2E0-1DEA
File System: sdcardfs
Read-Write
/storage/self: Device: tmpfs
File System: tmpfs
Read-Write
<<< System Files >>>
Buddy Info: /proc/buddyinfo
Build Properties: /system/build.prop
Character & Block Devices: /proc/devices
Command Line: /proc/cmdline
CPU Information: /proc/cpuinfo
Default Properties: /default.prop
Execution Domains: /proc/execdomains
File Systems: /proc/filesystems
Frame Buffer Devices: /proc/fb
Hosts: /system/etc/hosts
Interrupts: /proc/interrupts
Input Devices: /proc/bus/input/devices
I/O Ports: /proc/ioports
Kernel Version: /proc/version
Load Average: /proc/loadavg
Locked Files: /proc/locks
Memory Information: /proc/meminfo
Memory Map: /proc/iomem
Misc Drivers: /proc/misc
Partitions: /proc/partitions
Statistics: /proc/stat
Swap Spaces: /proc/swaps
serial number:SN811SN8112H184641652