Research, development and trades concerning the powerful Proxmark3 device.
Remember; sharing is caring. Bring something back to the community.
"Learn the tools of the trade the hard way." +Fravia
You are not logged in.
Time changes and with it the technology
Proxmark3 @ discord
Users of this forum, please be aware that information stored on this site is not private.
Pages: 1
Hey guys
I'm kinda new to this RFID section. I read this badge. It has like 5 entries. Is there any way to manipulate it and add more entries?
[=] Checking for known tags...
[-] Searching for ISO14443-A tag... UID : 10 5C DD 76
ATQA : 00 04
SAK : 08 [2]
TYPE : NXP MIFARE CLASSIC 1k | Plus 2k SL1 | 1k Ev1
[=] proprietary non iso14443-4 card found, RATS not supported
[=] Answers to magic commands: NO
[+] Prng detection: WEAK
[+] Valid ISO14443-A tag found
Later I used the command ''hf mf autopwn'' and I got this .json file:
{
"Created": "proxmark3",
"FileType": "mfcard",
"blocks": {
"0": "105CDD76E7880400468F755559803011",
"1": "EA00C02E000000000000000000000000",
"2": "00000000000000000000000000000000",
"3": "A0A1A2A3A4A5787788C1B0B1B2B3B4B5",
"4": "0FC000000620C3000000000000000000",
"5": "0000000080FFFFAA0000000000000000",
"6": "00000000000000000000000000000000",
"7": "A0A1A2A3A4A50F00FFAA00008627C10A",
"8": "00000000000000000000000000000000",
"9": "00000000000000000000000000000000",
"10": "00000000000000000000000000000000",
"11": "FFFFFFFFFFFF00000000FFFFFFFFFFFF",
"12": "00000000000000000000000000000000",
"13": "00000000000000000000000000000000",
"14": "00000000000000000000000000000000",
"15": "FFFFFFFFFFFF00000000FFFFFFFFFFFF",
"16": "00000000000000000000000000000000",
"17": "00000000000000000000000000000000",
"18": "00000000000000000000000000000000",
"19": "FFFFFFFFFFFF00000000FFFFFFFFFFFF",
"20": "00000000000000000000000000000000",
"21": "00000000000000000000000000000000",
"22": "00000000000000000000000000000000",
"23": "FFFFFFFFFFFF00000000FFFFFFFFFFFF",
"24": "00000000000000000000000000000000",
"25": "00000000000000000000000000000000",
"26": "00000000000000000000000000000000",
"27": "FFFFFFFFFFFF00000000FFFFFFFFFFFF",
"28": "00000000000000000000000000000000",
"29": "00000000000000000000000000000000",
"30": "00000000000000000000000000000000",
"31": "FFFFFFFFFFFF00000000FFFFFFFFFFFF",
"32": "00000000000000000000000000000000",
"33": "00000000000000000000000000000000",
"34": "00000000000000000000000000000000",
"35": "FFFFFFFFFFFF00000000FFFFFFFFFFFF",
"36": "00000000000000000000000000000000",
"37": "00000000000000000000000000000000",
"38": "00000000000000000000000000000000",
"39": "FFFFFFFFFFFF00000000FFFFFFFFFFFF",
"40": "00000000000000000000000000000000",
"41": "00000000000000000000000000000000",
"42": "00000000000000000000000000000000",
"43": "FFFFFFFFFFFF00000000FFFFFFFFFFFF",
"44": "00000000000000000000000000000000",
"45": "00000000000000000000000000000000",
"46": "00000000000000000000000000000000",
"47": "FFFFFFFFFFFF00000000FFFFFFFFFFFF",
"48": "00000000000000000000000000000000",
"49": "00000000000000000000000000000000",
"50": "00000000000000000000000000000000",
"51": "FFFFFFFFFFFF00000000FFFFFFFFFFFF",
"52": "00000000000000000000000000000000",
"53": "00000000000000000000000000000000",
"54": "00000000000000000000000000000000",
"55": "FFFFFFFFFFFF00000000FFFFFFFFFFFF",
"56": "00000000000000000000000000000000",
"57": "00000000000000000000000000000000",
"58": "00000000000000000000000000000000",
"59": "FFFFFFFFFFFF00000000FFFFFFFFFFFF",
"60": "00000000000000000000000000000000",
"61": "00000000000000000000000000000000",
"62": "00000000000000000000000000000000",
"63": "FFFFFFFFFFFF00000000FFFFFFFFFFFF"
},
"Card": {
"UID": "105CDD76",
"SAK": "88",
"ATQA": "0400"
},
"SectorKeys": {
"0": {
"KeyA": "A0A1A2A3A4A5",
"KeyB": "B0B1B2B3B4B5",
"AccessConditions": "787788C1",
"AccessConditionsText": {
"block0": "rdAB wrB",
"block1": "rdAB wrB",
"block2": "rdAB wrB",
"block3": "wrAbyB rdCbyAB wrCbyB wrBbyB",
"UserData": "C1"
}
},
"1": {
"KeyA": "A0A1A2A3A4A5",
"KeyB": "00008627C10A",
"AccessConditions": "0F00FFAA",
"AccessConditionsText": {
"block4": "rdB wrB",
"block5": "rdB wrB",
"block6": "rdB wrB",
"block7": "wrAbyB rdCbyAB wrCbyB wrBbyB",
"UserData": "AA"
}
},
"2": {
"KeyA": "FFFFFFFFFFFF",
"KeyB": "FFFFFFFFFFFF",
"AccessConditions": "00000000",
"AccessConditionsText": {
"block8": "rdAB wrAB incAB dectrAB",
"block9": "rdAB wrAB incAB dectrAB",
"block10": "rdAB wrAB incAB dectrAB",
"block11": "rdAbyA rdCbyA rdBbyA wrBbyA",
"UserData": "00"
}
},
"3": {
"KeyA": "FFFFFFFFFFFF",
"KeyB": "FFFFFFFFFFFF",
"AccessConditions": "00000000",
"AccessConditionsText": {
"block12": "rdAB wrAB incAB dectrAB",
"block13": "rdAB wrAB incAB dectrAB",
"block14": "rdAB wrAB incAB dectrAB",
"block15": "rdAbyA rdCbyA rdBbyA wrBbyA",
"UserData": "00"
}
},
"4": {
"KeyA": "FFFFFFFFFFFF",
"KeyB": "FFFFFFFFFFFF",
"AccessConditions": "00000000",
"AccessConditionsText": {
"block16": "rdAB wrAB incAB dectrAB",
"block17": "rdAB wrAB incAB dectrAB",
"block18": "rdAB wrAB incAB dectrAB",
"block19": "rdAbyA rdCbyA rdBbyA wrBbyA",
"UserData": "00"
}
},
"5": {
"KeyA": "FFFFFFFFFFFF",
"KeyB": "FFFFFFFFFFFF",
"AccessConditions": "00000000",
"AccessConditionsText": {
"block20": "rdAB wrAB incAB dectrAB",
"block21": "rdAB wrAB incAB dectrAB",
"block22": "rdAB wrAB incAB dectrAB",
"block23": "rdAbyA rdCbyA rdBbyA wrBbyA",
"UserData": "00"
}
},
"6": {
"KeyA": "FFFFFFFFFFFF",
"KeyB": "FFFFFFFFFFFF",
"AccessConditions": "00000000",
"AccessConditionsText": {
"block24": "rdAB wrAB incAB dectrAB",
"block25": "rdAB wrAB incAB dectrAB",
"block26": "rdAB wrAB incAB dectrAB",
"block27": "rdAbyA rdCbyA rdBbyA wrBbyA",
"UserData": "00"
}
},
"7": {
"KeyA": "FFFFFFFFFFFF",
"KeyB": "FFFFFFFFFFFF",
"AccessConditions": "00000000",
"AccessConditionsText": {
"block28": "rdAB wrAB incAB dectrAB",
"block29": "rdAB wrAB incAB dectrAB",
"block30": "rdAB wrAB incAB dectrAB",
"block31": "rdAbyA rdCbyA rdBbyA wrBbyA",
"UserData": "00"
}
},
"8": {
"KeyA": "FFFFFFFFFFFF",
"KeyB": "FFFFFFFFFFFF",
"AccessConditions": "00000000",
"AccessConditionsText": {
"block32": "rdAB wrAB incAB dectrAB",
"block33": "rdAB wrAB incAB dectrAB",
"block34": "rdAB wrAB incAB dectrAB",
"block35": "rdAbyA rdCbyA rdBbyA wrBbyA",
"UserData": "00"
}
},
"9": {
"KeyA": "FFFFFFFFFFFF",
"KeyB": "FFFFFFFFFFFF",
"AccessConditions": "00000000",
"AccessConditionsText": {
"block36": "rdAB wrAB incAB dectrAB",
"block37": "rdAB wrAB incAB dectrAB",
"block38": "rdAB wrAB incAB dectrAB",
"block39": "rdAbyA rdCbyA rdBbyA wrBbyA",
"UserData": "00"
}
},
"10": {
"KeyA": "FFFFFFFFFFFF",
"KeyB": "FFFFFFFFFFFF",
"AccessConditions": "00000000",
"AccessConditionsText": {
"block40": "rdAB wrAB incAB dectrAB",
"block41": "rdAB wrAB incAB dectrAB",
"block42": "rdAB wrAB incAB dectrAB",
"block43": "rdAbyA rdCbyA rdBbyA wrBbyA",
"UserData": "00"
}
},
"11": {
"KeyA": "FFFFFFFFFFFF",
"KeyB": "FFFFFFFFFFFF",
"AccessConditions": "00000000",
"AccessConditionsText": {
"block44": "rdAB wrAB incAB dectrAB",
"block45": "rdAB wrAB incAB dectrAB",
"block46": "rdAB wrAB incAB dectrAB",
"block47": "rdAbyA rdCbyA rdBbyA wrBbyA",
"UserData": "00"
}
},
"12": {
"KeyA": "FFFFFFFFFFFF",
"KeyB": "FFFFFFFFFFFF",
"AccessConditions": "00000000",
"AccessConditionsText": {
"block48": "rdAB wrAB incAB dectrAB",
"block49": "rdAB wrAB incAB dectrAB",
"block50": "rdAB wrAB incAB dectrAB",
"block51": "rdAbyA rdCbyA rdBbyA wrBbyA",
"UserData": "00"
}
},
"13": {
"KeyA": "FFFFFFFFFFFF",
"KeyB": "FFFFFFFFFFFF",
"AccessConditions": "00000000",
"AccessConditionsText": {
"block52": "rdAB wrAB incAB dectrAB",
"block53": "rdAB wrAB incAB dectrAB",
"block54": "rdAB wrAB incAB dectrAB",
"block55": "rdAbyA rdCbyA rdBbyA wrBbyA",
"UserData": "00"
}
},
"14": {
"KeyA": "FFFFFFFFFFFF",
"KeyB": "FFFFFFFFFFFF",
"AccessConditions": "00000000",
"AccessConditionsText": {
"block56": "rdAB wrAB incAB dectrAB",
"block57": "rdAB wrAB incAB dectrAB",
"block58": "rdAB wrAB incAB dectrAB",
"block59": "rdAbyA rdCbyA rdBbyA wrBbyA",
"UserData": "00"
}
},
"15": {
"KeyA": "FFFFFFFFFFFF",
"KeyB": "FFFFFFFFFFFF",
"AccessConditions": "00000000",
"AccessConditionsText": {
"block60": "rdAB wrAB incAB dectrAB",
"block61": "rdAB wrAB incAB dectrAB",
"block62": "rdAB wrAB incAB dectrAB",
"block63": "rdAbyA rdCbyA rdBbyA wrBbyA",
"UserData": "00"
}
}
}
}
Last edited by Dranked (2019-09-17 16:27:53)
Offline
Hello,
i do not know, if you can use "autopwn" for a "WEAK"-tag!
Try "hf mf nested 1 0 A a0a1a2a3a4a5 d" to get a dump of your tag!
Offline
Hello,
i do not know, if you can use "autopwn" for a "WEAK"-tag!
Try "hf mf nested 1 0 A a0a1a2a3a4a5 d" to get a dump of your tag!
Hey, thanks for the commands. I'm gonna test them out and give you output.
Last edited by Dranked (2019-09-18 12:25:28)
Offline
Could someone instruct me where to find the entry amount and manipulate it? Thanks
Offline
Does dumping folded?
Offline
Does dumping folded?
I'm finding it out will give you an output. Btw could you maybe help me to compile the EMV and Smartcard feature?
Thanks
Offline
Sorry, i can not compile anything...
Offline
Sorry, i can not compile anything...
I meant to install the EMV and Smartcard feature.
Offline
What do you exactly mean?
Offline
I can't use those features.
Offline
Where to install?
Offline
To use the feature on the proxmark, because it gives me errors.
Offline
Pages: 1