Research, development and trades concerning the powerful Proxmark3 device.
Remember; sharing is caring. Bring something back to the community.
"Learn the tools of the trade the hard way." +Fravia
You are not logged in.
Time changes and with it the technology
Proxmark3 @ discord
Users of this forum, please be aware that information stored on this site is not private.
Hey guys, I've got a question which I'm hoping someone can answer. First off, here's what I'm working with:
Proxmark3 Easy with the latest RRG firmware:
[ ARM ]
bootrom: RRG/Iceman/master/b7d412d2 2019-08-10 21:07:14
os: RRG/Iceman/master/b7d412d2 2019-08-10 21:07:21
compiled with GCC 7.3.1 20180622 (release) [ARM/embedded-7-branch revision 261907]
Chameleon Mini: RevE Rebooted
Latest firmware as per the flashing instructions located here
I've got a Mifare Classic 1k card containing a value. The card is vulnerable to the Darkside attack so I already have the A and B keys. My question is in regards to the key that is read from the reader by my Chameleon. It's definitely not my A or B key. It's different. I might be wrong but I understand this is the 'password' used to read the keys on my card. I tried following along with the lab401 Reader Attack here but I can't figure out how to use the key I obtain for a nested attack, or any other type of attack really.
Can anyone give me some hints? What is this key used for? How can I use it to attack my card?
Thanks!
Offline