Research, development and trades concerning the powerful Proxmark3 device.
Remember; sharing is caring. Bring something back to the community.
"Learn the tools of the trade the hard way." +Fravia
You are not logged in.
Time changes and with it the technology
Proxmark3 @ discord
Users of this forum, please be aware that information stored on this site is not private.
According to Nicolas Courtois, http://www.nicolascourtois.com/papers/mifare_all.pdf
and the different attacks, there should be possible to identify a "weak" classic tag.
Here on the forum there is always the questions about "how do I crack this or that tag, its a classic"... And the answer is use the "mifare" or check default keys, (or reader attack via sim x) but still its just the usual answers.
I suggest we create a function that checks for the "nack" bug. And we can use it to see if how tags react to it. Especially the newer ones with better prng.. And we can see if the copied/fake mifare classic tags reacts aswell, http://www.proxmark.org/forum/viewtopic.php?id=169
I must admit, i'm not that good at the inner workings of the "hf mf mifare" attack.
But would this be interesting?
Maybe other mifare products has strange behaviors, but we don't know how to fuzzy them?
Offline
I agree with iceman! This will be a good feature feasible reusing existing code!!
Offline
In this method,
https://github.com/Proxmark/proxmark3/b … 3a.c#L1960
A possible idea would be to have a counter increasing for every time it returns -99999 from this method.
when the counter reaches a limit (say 2000?) we can exit the original call, since none of the collected nonces is repeating within 65536 loop.
Offline
Great idea, iceman!
Regarding the limit: I would prefer a default limit (maybe 2000 is perfect)
but also a optional parameter to tamper with this value.
Offline
If we have a sample of a authentication request with correct parity and wrong bits, we should quite easy implement this identification.
Offline
I am working on this one.
The Darkside attack doesn't only require the "NACK bug" but in addition it needs predictable "random" numbers. The latter is also required for the nested attack. It isn't difficult to identify both.
Offline
on the forum there are some suggestions for different approaches to darkside attack.
The one that is imp is using some of them. If that is better or bad, when it comes to tags who only have one of the both faults is the question.
To be able to identify the predictable random numbers and NACK bug, would be indeed a great addition.
Some ppl did have a good way of atticking the mifare clones (like fudan), which would be nice to have. Seeing a snoop from Marshmellow from a Fudan tag, shows the extra byte..
Last edited by iceman (2015-06-24 08:58:12)
Offline
in my experience i think the nested already works on the fudan chips.
not sure about the mifare (darkside attack)
Offline