Research, development and trades concerning the powerful Proxmark3 device.
Remember; sharing is caring. Bring something back to the community.
"Learn the tools of the trade the hard way." +Fravia
You are not logged in.
Time changes and with it the technology
Proxmark3 @ discord
Users of this forum, please be aware that information stored on this site is not private.
Pages: 1
Hello everyone and Dear Administrators,
I have a card whose SAK is 0x28. So the card has the M1 part(another is CPU part). And I have known one key of the one sector. When I perform the hardnested command and after waiting for a long time, it failed to work. But I asked other person to crack this card(M1 part), he can do it and it seems that he also uses the hardnested command(not very sure). Is there any secret / not open firmware which can do it or I use the wrong hardnested command parameters?
**************************************************************************************************
hw version:
Prox/RFID mark3 RFID instrument
bootrom: /-suspect 2018-04-03 01:44:09
os: /-suspect 2018-04-03 01:44:16
LF FPGA image built for 2s30vq100 on 2015/03/06 at 07:38:04
HF FPGA image built for 2s30vq100 on 2017/10/27 at 08:30:59
uC: AT91SAM7S256 Rev C
Embedded Processor: ARM7TDMI
Nonvolatile Program Memory Size: 256K bytes. Used: 199639 bytes (76%). Free: 62505 bytes (24%).
Second Nonvolatile Program Memory Size: None
Internal SRAM Size: 64K bytes
Architecture Identifier: AT91SAM7Sxx Series
Nonvolatile Program Memory Type: Embedded Flash Memory
****************************************************************************************************
hf mf hardnested 0 A FFFFFFFFFFFF 32 A
(the A key of the zero block is FFFFFFFFFFFF. And I want to crack the A key of the 32nd block. Should I add any parameters?)
Offline
Can you give us the output of
hf search
for that tag?
Can you give us the version info on what your other person has loaded? What are the differences in the two versions?
Last edited by dontlook (2018-04-03 14:40:03)
Offline
Pages: 1