Research, development and trades concerning the powerful Proxmark3 device.
Remember; sharing is caring. Bring something back to the community.
"Learn the tools of the trade the hard way." +Fravia
You are not logged in.
Time changes and with it the technology
Proxmark3 @ discord
Users of this forum, please be aware that information stored on this site is not private.
Hi,
I am facing an issue while retrieving keys on MIFARE Classic 1k (4 Bytes UID).
I just run the MFOC command for many hours (days ?!) but it does not retrieve all my 5 UNKNOWS_KEY
Did you have heard about this issue (https://code.google.com/p/mfoc/issues/detail?id=11)?
I posted the #2 comment on the MFOC issue #11 tracking system.
How to retrieve these keys ?
Here is my card summary :
[== Undefined ==]
ISO/IEC 14443A (106 kbps) target:
ATQA (SENS_RES): 00 04
* UID size: single
* bit frame anticollision supported
UID (NFCID1): 70 3a 06 df
SAK (SEL_RES): 08
* Not compliant with ISO/IEC 14443-4
* Not compliant with ISO/IEC 18092
Fingerprinting based on MIFARE type Identification Procedure:
* MIFARE Classic 1K
* MIFARE Plus (4 Byte UID or 4 Byte RID) 2K, Security level 1
* SmartMX with MIFARE 1K emulation
Other possible matches based on ATQA & SAK values:
Try to authenticate to all sectors with default keys...
Symbols: '.' no key found, '/' A key found, '\' B key found, 'x' both keys found
[Key: ffffffffffff] -> [................]
[Key: a0a1a2a3a4a5] -> [////////////////]
[Key: d3f7d3f7d3f7] -> [////////////////]
[Key: 000000000000] -> [////////////////]
[Key: b0b1b2b3b4b5] -> [x/////xxxxxxxxxx]
[Key: 4d3a99c351dd] -> [x/////xxxxxxxxxx]
[Key: 1a982c7e459a] -> [x/////xxxxxxxxxx]
[Key: aabbccddeeff] -> [x/////xxxxxxxxxx]
[Key: 714c5c886e97] -> [x/////xxxxxxxxxx]
[Key: 587ee5f9350f] -> [x/////xxxxxxxxxx]
[Key: a0478cc39091] -> [x/////xxxxxxxxxx]
[Key: 533cb6c723f6] -> [x/////xxxxxxxxxx]
[Key: 8fd0a4f256e9] -> [x/////xxxxxxxxxx]
If you have any tips for me, I'm stuck on it
Offline
Up
Nobody can help me ?
Offline
questions about running other software like MFOC,/MFUC usually don't get so much attention around here.
If you have an pm3, you could try running the mifare_autopwn lua script that Holiman wrote.
or try the "hf mf nested" command with different inputkeys.
Offline
Thanks for your response ICeman.
Are you sure that the Proxmark3 can retrieve these keys using hf mf nested at 100%?
Offline
There is new cards with different (higher) entrophy in the randonnumbergenerator and those cards you can't get the keys from a PM3. I doubt that you can get it from any normal software but if you find a one please let me know.
If you got a key from mfoc/mfuc and just got stuck in a "nested" situation i.e. got more keys but the 5keys, then my guess is that you can most likely get the rest of the keys with a pm3.
There is no such thing as 100% sure in the pm3 world. sadley.
But from your answer I guess its a money issue of buying a expensive device like a pm3 for only 5 b-keys on one card. I would think twice also.
there is always the alternative to send your card to a member here on the forum and ask them to run some test for you. That would be the cheapest way.
Offline
Don't forget that you can sniff communication between your card and valid reader then decrypt it with crapto1.
Offline
If you want to, I can check your cards so you don't have to get a pm3 yourself.
Offline
mail me at
iceman at iuse se
there we can exchange adresses.
Offline
I got your email, you got an answer.
Offline