Research, development and trades concerning the powerful Proxmark3 device.
Remember; sharing is caring. Bring something back to the community.
"Learn the tools of the trade the hard way." +Fravia
You are not logged in.
Time changes and with it the technology
Proxmark3 @ discord
Users of this forum, please be aware that information stored on this site is not private.
TLDR : Get a Mifare Classic 1K, and PM3 seems to find some default keys, but block authentication failed for nested attack...
My card:
proxmark3> hf search
UID : 46 6a 03 6e
ATQA : 00 04
SAK : 08 [2]
TYPE : NXP MIFARE CLASSIC 1k | Plus 2k SL1
proprietary non iso14443-4 card found, RATS not supported
No chinese magic backdoor command detected
Prng detection: WEAK
Valid ISO14443A Tag Found - Quiting Search
Attack with default keys
proxmark3> hf mf chk *1 ? d
--chk keys. sectors:16, block no: 0, key type:B, eml:n, dmp=y checktimeout=471 us
No key specified, trying default keys
chk default key[ 0] ffffffffffff
chk default key[ 1] 000000000000
chk default key[ 2] a0a1a2a3a4a5
chk default key[ 3] b0b1b2b3b4b5
chk default key[ 4] aabbccddeeff
chk default key[ 5] 1a2b3c4d5e6f
chk default key[ 6] 123456789abc
chk default key[ 7] 010203040506
chk default key[ 8] 123456abcdef
chk default key[ 9] abcdef123456
chk default key[10] 4d3a99c351dd
chk default key[11] 1a982c7e459a
chk default key[12] d3f7d3f7d3f7
chk default key[13] 714c5c886e97
chk default key[14] 587ee5f9350f
chk default key[15] a0478cc39091
chk default key[16] 533cb6c723f6
chk default key[17] 8fd0a4f256e9
To cancel this operation press the button on the proxmark...
--o
|---|----------------|---|----------------|---|
|sec|key A |res|key B |res|
|---|----------------|---|----------------|---|
|000| 66616330322c | 1 | ffffffffffff | 0 |
|001| 0a230a232044 | 1 | ffffffffffff | 0 |
|002| 617461206672 | 1 | ffffffffffff | 0 |
|003| 6f6d20687474 | 1 | ffffffffffff | 0 |
|004| 70733a2f2f70 | 1 | ffffffffffff | 0 |
|005| 617374656269 | 1 | ffffffffffff | 0 |
|006| ffffffffffff | 0 | ffffffffffff | 0 |
|007| ffffffffffff | 0 | ffffffffffff | 0 |
|008| ffffffffffff | 0 | ffffffffffff | 0 |
|009| ffffffffffff | 0 | ffffffffffff | 0 |
|010| ffffffffffff | 0 | ffffffffffff | 0 |
|011| ffffffffffff | 0 | ffffffffffff | 0 |
|012| ffffffffffff | 0 | ffffffffffff | 0 |
|013| ffffffffffff | 0 | ffffffffffff | 0 |
|014| ffffffffffff | 0 | ffffffffffff | 0 |
|015| ffffffffffff | 0 | ffffffffffff | 0 |
|---|----------------|---|----------------|---|
Found keys have been dumped to file dumpkeys.bin. 0xffffffffffff has been inserted for unknown keys.
So i have some keys, but when trying to perform nested, it's unable to perform authentication
proxmark3> hf mf nested 1 0 a 66616330322c t
Can't authenticate to block: 0 key type:A key:66 61 63 30 32 2c
And darkside attack is not an option:
proxmark3> hf mf mifare
-------------------------------------------------------------------------
Executing command. Expected execution time: 25sec on average
Press button on the proxmark3 device to abort both proxmark3 and client.
-------------------------------------------------------------------------
.....................Card is not vulnerable to Darkside attack (doesn't send NACK on authentication requests).
Any idea?
Thanks
Offline
Updated client software without flashing the corresponding firmware? Or vice versa?
Offline
Please erase that...:-)
Last edited by Ollibolli (2019-05-22 23:03:22)
Offline