Research, development and trades concerning the powerful Proxmark3 device.
Remember; sharing is caring. Bring something back to the community.
"Learn the tools of the trade the hard way." +Fravia
You are not logged in.
Time changes and with it the technology
Proxmark3 @ discord
Users of this forum, please be aware that information stored on this site is not private.
In reference to this topic
I feel a bit lost after my communications with marshmellow, who has been really kind with his support so far.
The only reason I purchased the Proxmark3 kit was to research on how my card actually worked and to be able to clone it. It was a challenge from one of the building engineers and I thought I could prove him wrong.
Therefore requesting all the experts out there, if there's anyone who can shed some light into it and perhaps guide me through. I will really appreciate all the help in this regard.
Thanks and looking forward to positive responses.
Last edited by OMDB (2015-07-01 15:24:37)
Offline
you are in very good hand, with Marshmellow and Iceman, Asper, 0xFFFF, Piwi, Rule etc. and many more already
Other people very competent already looked in... They don't say anything because there seems not to be the moment to solve it yet. So sometimes you got to be patient. There comes a time, a moment and technique... You can not press too much ahead if the power, the technique are not ready.
They say " A race had started..." or in German "Eines ist klar: Das Wettrennen ist eröffnet, die Sicherheitsmechanismen werden in Zukunft noch ausgefeilter. Industrie und Hacker werden mit immer größerem Aufwand versuchen, dem anderen zu beweisen, dass man besser ist." (cited from 'GIT Sicherheit', Jun 2010, 'Gehackte RFID-Leseverfahren –wie sicher ist sicher?')
Similar to WIFI encryption technique WEP/WPA/WPA2/WPA2-TKIP/WPA2-PSK/WPA2-AES at first people attempted at WEP, at that time no matter how much you cry or press on, it was impossible to tackle WPA/WPA2 until when GPU bring in the 100, 1000X processing power and technique and when programmers starting to use powerful GPU processing power, WPA/WPA2 with 4, 6, 8 chars security password is turned to a dead, dangerous thing of the past.
I remember the day I was able to crack WEB with 800 words a second I was so proud, even you can only run the technique on your own WIFI router password, because it would take about 1000 years or more to tackle an unknown 8-characters-passwords at that time. Nonetheless, I was proud and I was happy with that little knowledge to be able to crack your own password. Then the day came with SSE2, I could make 1200 words/ sec; then came AMD, then NVIDIA, ATI, then GPU programming technique , nowadays some people with one unit could hack 1,5 million words per sec... Even though, I still remember the day I was proud and happy when I increased the crack ability from 800 to 1200 words per second.
In the mean time with our issue here study it, find out everything related possible, I would capture much of possible trace over and over to be sure one day when the technique allows us to tackle this type of entry system and similar, we are ready and won't miss anything. Basically what ever they cover is only a communication.
I haven't got one system available like you, you are very lucky even when now it seems to be a mystery, otherwise I would happy capture trace until perfection, 10x 100x, it can not be hidden forever, to find its secret too.
A race had started... that is what it counts
Last edited by ntk (2015-07-05 17:31:04)
Offline