This is what I did.
By removing bleeding edge - you'll stop it from updating back to newer version (which is broken)
root@kali ~$ vim /etc/apt/sources.list
root@kali ~$ tail /etc/apt/sources.list
deb http://http.kali.org/kali kali main non-free contrib
deb-src http://http.kali.org/kali kali main non-free contrib
## Security updates
deb http://security.kali.org/kali-security kali/updates main contrib non-free
## Bleeding edge
#deb http://repo.kali.org/kali kali-bleeding-edge main
root@kali ~$ apt-get update
Get:1 http://security.kali.org kali/updates Release.gpg [836 B]
Hit http://http.kali.org kali Release.gpg
Get:2 http://security.kali.org kali/updates Release [10.9 kB]
Hit http://http.kali.org kali Release
Get:3 http://security.kali.org kali/updates/main i386 Packages [103 kB]
Hit http://http.kali.org kali/main Sources
Hit http://security.kali.org kali/updates/contrib i386 Packages
Hit http://http.kali.org kali/non-free Sources
Hit http://security.kali.org kali/updates/non-free i386 Packages
Hit http://http.kali.org kali/contrib Sources
Hit http://http.kali.org kali/main i386 Packages
Hit http://http.kali.org kali/non-free i386 Packages
Hit http://http.kali.org kali/contrib i386 Packages
Ign http://security.kali.org kali/updates/contrib Translation-en_GB
Ign http://security.kali.org kali/updates/contrib Translation-en
Ign http://security.kali.org kali/updates/main Translation-en_GB
Ign http://security.kali.org kali/updates/main Translation-en
Ign http://security.kali.org kali/updates/non-free Translation-en_GB
Ign http://security.kali.org kali/updates/non-free Translation-en
Ign http://http.kali.org kali/contrib Translation-en_GB
Ign http://http.kali.org kali/contrib Translation-en
Ign http://http.kali.org kali/main Translation-en_GB
Ign http://http.kali.org kali/main Translation-en
Ign http://http.kali.org kali/non-free Translation-en_GB
Ign http://http.kali.org kali/non-free Translation-en
Fetched 114 kB in 7s (16.3 kB/s)
Reading package lists... Done
root@kali ~$ apt-cache showpkg mfcuk
Package: mfcuk
Versions:
0.3.7+0~svn93+ts1371102184-1 (/var/lib/dpkg/status)
Description Language:
File: /var/lib/apt/lists/http.kali.org_kali_dists_kali_main_binary-i386_Packages
MD5: c5a6a25bd86fa6eafcd9ae6dc9f4f571
0.3.7-0kali1 (/var/lib/apt/lists/http.kali.org_kali_dists_kali_main_binary-i386_Packages)
Description Language:
File: /var/lib/apt/lists/http.kali.org_kali_dists_kali_main_binary-i386_Packages
MD5: c5a6a25bd86fa6eafcd9ae6dc9f4f571
Reverse Depends:
kali-linux,mfcuk
Dependencies:
0.3.7+0~svn93+ts1371102184-1 -
0.3.7-0kali1 - libc6 (2 2.1) libnfc4 (2 1.7.0~rc6-0) libusb-0.1-4 (2 2:0.1.12)
Provides:
0.3.7+0~svn93+ts1371102184-1 -
0.3.7-0kali1 -
Reverse Provides:
root@kali ~$ apt-get install mfcuk
Reading package lists... Done
Building dependency tree
Reading state information... Done
mfcuk is already the newest version.
0 upgraded, 0 newly installed, 0 to remove and 9 not upgraded.
root@kali ~$ apt-get install mfcuk=0.3.7-0kali1
Reading package lists... Done
Building dependency tree
Reading state information... Done
The following packages will be DOWNGRADED:
mfcuk
0 upgraded, 0 newly installed, 1 downgraded, 0 to remove and 9 not upgraded.
Need to get 24.4 kB of archives.
After this operation, 43.0 kB of additional disk space will be used.
Do you want to continue [Y/n]? y
Get:1 http://http.kali.org/kali/ kali/main mfcuk i386 0.3.7-0kali1 [24.4 kB]
Fetched 24.4 kB in 0s (25.9 kB/s)
dpkg: warning: downgrading mfcuk from 0.3.7+0~svn93+ts1371102184-1 to 0.3.7-0kali1
(Reading database ... 308274 files and directories currently installed.)
Preparing to replace mfcuk 0.3.7+0~svn93+ts1371102184-1 (using .../mfcuk_0.3.7-0kali1_i386.deb) ...
Unpacking replacement mfcuk ...
Setting up mfcuk (0.3.7-0kali1) ...
root@kali ~$ mfcuk
mfcuk - 0.3.7
Mifare Classic DarkSide Key Recovery Tool - 0.3
by Andrei Costin,
[email protected], http://andreicostin.com
Usage:
-C - require explicit connection to the reader. Without this option, the connection is not made and recovery will not occur
-i mifare.dmp - load input mifare_classic_tag type dump
-I mifare_ext.dmp - load input extended dump specific to this tool, has several more fields on top of mifare_classic_tag type dump
-o mifare.dmp - output the resulting mifare_classic_tag dump to a given file
-O mifare_ext.dmp - output the resulting extended dump to a given file
-V sector[:A/B/any_other_alphanum[:fullkey]] - verify key for specified sector, -1 means all sectors
After first semicolon key-type can specified: A verifies only keyA, B verifies only keyB, anything else verifies both keys
After second semicolon full 12 hex-digits key can specified - this key will override any loaded dump key for the given sector(s) and key-type(s)
-R sector[:A/B/any_other_alphanum] - recover key for sector, -1 means all sectors.
After first semicolon key-type can specified: A recovers only keyA, B recovers only keyB, anything else recovers both keys
-U UID - force specific UID. If a dump was loaded with -i, -U will overwrite the in the memory where dump was loaded
-M tagtype - force specific tagtype. 8 is 1K, 24 is 4K, 32 is DESFire
-D - for sectors and key-types marked for verification, in first place use default keys to verify (maybe you are lucky)
-d key - specifies additional full 12 hex-digits default key to be checked. Multiple -d options can be used for more additional keys
-s - milliseconds to sleep for SLEEP_AT_FIELD_OFF (Default: 10 ms)
-S - milliseconds to sleep for SLEEP_AFTER_FIELD_ON (Default: 50 ms)
-P hex_literals_separated - try to recover the key from a conversation sniffed with Proxmark3 (mifarecrack.c based). Accepts several options:
Concatenated string in hex literal format of form uid:tag_chal:nr_enc:reader_resp:tag_resp
Example -P 0x5c72325e:0x50829cd6:0xb8671f76:0xe00eefc9:0x4888 964f would find key FFFFFFFFFFFF
-p proxmark3_full.log - tries to parse the log file on it's own (mifarecrack.py based), get the values for option -P and invoke it
-F - tries to fingerprint the input dump (-i) against known cards' data format
-v verbose_level - verbose level (default is O)
Usage examples:
Recove all keys from all sectors:
mfcuk -C -R -1
Recove the sector #0 key with 250 ms for all delays (delays could give more results):
mfcuk -C -R 0 -s 250 -S 250
root@kali ~$