Research, development and trades concerning the powerful Proxmark3 device.
Remember; sharing is caring. Bring something back to the community.
"Learn the tools of the trade the hard way." +Fravia
You are not logged in.
Time changes and with it the technology
Proxmark3 @ discord
Users of this forum, please be aware that information stored on this site is not private.
Pages: 1
Hi, some mifare clone card always send same random number (nt), I tried hardnested attack, but they always get wrong key, so whether hardnested can crack this card? Anyone has idea about this type of mifare card?
Here is log:
I know the key is 0xFFFFFFFFFFFF, but hardnested get wrong key 0c00401045b7.
--target block no: 0, target key type:A, known target key: 0x000000000000 (not set), file action: read, Slow: No, Tests: 0
Using AVX2 SIMD core.
time | #nonces | Activity | expected to brute force
| | | #states | time
------------------------------------------------------------------------------------------------------
0 | 0 | Start using 4 threads and AVX2 SIMD core | |
0 | 0 | Brute force benchmark: 533 million (2^29.0) keys/s | 140737488355328 | 3d
1 | 0 | Using 235 precalculated bitflip state tables | 140737488355328 | 3d
3 | 0 | Reading nonces from file nonces.bin... | 140737488355328 | 3d
3 | 12096 | Read 12096 nonces from file. cuid=b94fda14 | 140737488355328 | 3d
3 | 12096 | Target Block=4, Keytype=A | 140737488355328 | 3d
3 | 12096 | (1. guess: Sum(a8) = 0) | 0 | 0s
12 | 12096 | Apply Sum(a8) and all bytes bitflip properties | nan | nand
12 | 12096 | Starting brute force... | 0 | 0s
12 | 12096 | Brute force phase completed. Key found: 0c00401045b7 | 0 | 0s
--target block no: 0, target key type:A, known target key: 0x000000000000 (not set), file action: read, Slow: No, Tests: 0
Using AVX2 SIMD core.
time | #nonces | Activity | expected to brute force
| | | #states | time
------------------------------------------------------------------------------------------------------
0 | 0 | Start using 4 threads and AVX2 SIMD core | |
0 | 0 | Brute force benchmark: 500 million (2^28.9) keys/s | 140737488355328 | 3d
1 | 0 | Using 235 precalculated bitflip state tables | 140737488355328 | 3d
3 | 0 | Reading nonces from file nonces.bin... | 140737488355328 | 3d
3 | 12096 | Read 12096 nonces from file. cuid=b94fda14 | 140737488355328 | 3d
3 | 12096 | Target Block=4, Keytype=A | 140737488355328 | 3d
3 | 12096 | (1. guess: Sum(a8) = 0) | 0 | 0s
12 | 12096 | Apply Sum(a8) and all bytes bitflip properties | nan | nand
12 | 12096 | Starting brute force... | 0 | 0s
12 | 12096 | Brute force phase completed. Key found: 0c00401045b7 | 0 | 0s
Recorded Activity (TraceLen = 39857 bytes)
Start = Start of Start Bit, End = End of last modulation. Src = Source of Transfer
iso14443a - All times are in carrier periods (1/13.56Mhz)
iClass - Timings are not as accurate
Start | End | Src | Data (! denotes parity error, ' denotes short bytes) | CRC | Annotation |
------------|------------|-----|-----------------------------------------------------------------|-----|--------------------|
0 | 992 | Rdr | 52' | | WUPA
2228 | 4596 | Tag | 04 00 | |
7040 | 9504 | Rdr | 93 20 | | ANTICOLL
10676 | 16564 | Tag | b9 4f da 14 38 | |
19072 | 29600 | Rdr | 93 70 b9 4f da 14 38 7d c1 | ok | SELECT_UID
30772 | 34292 | Tag | 08 b6 dd | |
35968 | 40672 | Rdr | 60 00 f5 7b | ok | AUTH-A(0)
42676 | 47412 | Tag | 01 20 01 45 | |
57088 | 66464 | Rdr | f3! 48 21! 0c a8! cb 46 c7 | !crc| ?
67636 | 72372 | Tag | a1! c1! 4f! cf! | |
78208 | 82912 | Rdr | 57 77 38 1e | !crc| ?
84916 | 89652 | Tag | 81! 90! c7! dc | |
90880 | 92128 | Rdr | 00 | | ?
106496 | 107488 | Rdr | 52' | | WUPA
108724 | 111092 | Tag | 04 00 | |
113664 | 124192 | Rdr | 93 70 b9 4f da 14 38 7d c1 | ok | SELECT_UID
125364 | 128884 | Tag | 08 b6 dd | |
130560 | 135264 | Rdr | 60 00 f5 7b | ok | AUTH-A(0)
137268 | 142004 | Tag | 01 20 01 45 | |
151680 | 161056 | Rdr | f3! 48 21! 0c a8! cb 46 c7 | !crc| ?
162228 | 166964 | Tag | a1! c1! 4f! cf! | |
172800 | 177504 | Rdr | 57 77 38 1e | !crc| ?
179508 | 184244 | Tag | 81! 90! c7! dc | |
185472 | 186720 | Rdr | 00 | | ?
201088 | 202080 | Rdr | 52' | | WUPA
203316 | 205684 | Tag | 04 00 | |
208256 | 218784 | Rdr | 93 70 b9 4f da 14 38 7d c1 | ok | SELECT_UID
219956 | 223476 | Tag | 08 b6 dd | |
225152 | 229856 | Rdr | 60 00 f5 7b | ok | AUTH-A(0)
231860 | 236596 | Tag | 01 20 01 45 | |
246272 | 255648 | Rdr | f3! 48 21! 0c a8! cb 46 c7 | !crc| ?
256820 | 261556 | Tag | a1! c1! 4f! cf! | |
267392 | 272096 | Rdr | 57 77 38 1e | !crc| ?
274100 | 278836 | Tag | 81! 90! c7! dc | |
280064 | 281312 | Rdr | 00 | | ?
295680 | 296672 | Rdr | 52' | | WUPA
297908 | 300276 | Tag | 04 00 | |
302848 | 313376 | Rdr | 93 70 b9 4f da 14 38 7d c1 | ok | SELECT_UID
314548 | 318068 | Tag | 08 b6 dd | |
319744 | 324448 | Rdr | 60 00 f5 7b | ok | AUTH-A(0)
326452 | 331188 | Tag | 01 20 01 45 | |
340864 | 350240 | Rdr | f3! 48 21! 0c a8! cb 46 c7 | !crc| ?
351412 | 356148 | Tag | a1! c1! 4f! cf! | |
361984 | 366688 | Rdr | 57 77 38 1e | !crc| ?
368692 | 373428 | Tag | 81! 90! c7! dc | |
374656 | 375904 | Rdr | 00 | | ?
390272 | 391264 | Rdr | 52' | | WUPA
392500 | 394868 | Tag | 04 00 | |
397440 | 407968 | Rdr | 93 70 b9 4f da 14 38 7d c1 | ok | SELECT_UID
409140 | 412660 | Tag | 08 b6 dd | |
414336 | 419040 | Rdr | 60 00 f5 7b | ok | AUTH-A(0)
421044 | 425780 | Tag | 01 20 01 45 | |
435456 | 444832 | Rdr | f3! 48 21! 0c a8! cb 46 c7 | !crc| ?
446004 | 450740 | Tag | a1! c1! 4f! cf! | |
456576 | 461280 | Rdr | 57 77 38 1e | !crc| ?
463284 | 468020 | Tag | 81! 90! c7! dc | |
469248 | 470496 | Rdr | 00 | | ?
484864 | 485856 | Rdr | 52' | | WUPA
487092 | 489460 | Tag | 04 00 | |
492032 | 502560 | Rdr | 93 70 b9 4f da 14 38 7d c1 | ok | SELECT_UID
503732 | 507252 | Tag | 08 b6 dd | |
508928 | 513632 | Rdr | 60 00 f5 7b | ok | AUTH-A(0)
515636 | 520372 | Tag | 01 20 01 45 | |
530048 | 539424 | Rdr | f3! 48 21! 0c a8! cb 46 c7 | !crc| ?
540596 | 545332 | Tag | a1! c1! 4f! cf! | |
551168 | 555872 | Rdr | 57 77 38 1e | !crc| ?
557876 | 562612 | Tag | 81! 90! c7! dc | |
563840 | 565088 | Rdr | 00 | | ?
579456 | 580448 | Rdr | 52' | | WUPA
581684 | 584052 | Tag | 04 00 | |
586624 | 597152 | Rdr | 93 70 b9 4f da 14 38 7d c1 | ok | SELECT_UID
598324 | 601844 | Tag | 08 b6 dd | |
603520 | 608224 | Rdr | 60 00 f5 7b | ok | AUTH-A(0)
610228 | 614964 | Tag | 01 20 01 45 | |
624640 | 634016 | Rdr | f3! 48 21! 0c a8! cb 46 c7 | !crc| ?
635188 | 639924 | Tag | a1! c1! 4f! cf! | |
645760 | 650464 | Rdr | 57 77 38 1e | !crc| ?
652468 | 657204 | Tag | 81! 90! c7! dc | |
658432 | 659680 | Rdr | 00 | | ?
674048 | 675040 | Rdr | 52' | | WUPA
676276 | 678644 | Tag | 04 00 | |
681216 | 691744 | Rdr | 93 70 b9 4f da 14 38 7d c1 | ok | SELECT_UID
692916 | 696436 | Tag | 08 b6 dd | |
698112 | 702816 | Rdr | 60 00 f5 7b | ok | AUTH-A(0)
704820 | 709556 | Tag | 01 20 01 45 | |
719232 | 728608 | Rdr | f3! 48 21! 0c a8! cb 46 c7 | !crc| ?
729780 | 734516 | Tag | a1! c1! 4f! cf! | |
740352 | 745056 | Rdr | 57 77 38 1e | !crc| ?
747060 | 751796 | Tag | 81! 90! c7! dc | |
753024 | 754272 | Rdr | 00 | | ?
768640 | 769632 | Rdr | 52' | | WUPA
770868 | 773236 | Tag | 04 00 | |
775808 | 786336 | Rdr | 93 70 b9 4f da 14 38 7d c1 | ok | SELECT_UID
787508 | 791028 | Tag | 08 b6 dd | |
792704 | 797408 | Rdr | 60 00 f5 7b | ok | AUTH-A(0)
799412 | 804148 | Tag | 01 20 01 45 | |
813824 | 823200 | Rdr | f3! 48 21! 0c a8! cb 46 c7 | !crc| ?
824372 | 829108 | Tag | a1! c1! 4f! cf! | |
834944 | 839648 | Rdr | 57 77 38 1e | !crc| ?
841652 | 846388 | Tag | 81! 90! c7! dc | |
847616 | 848864 | Rdr | 00 | | ?
863232 | 864224 | Rdr | 52' | | WUPA
865460 | 867828 | Tag | 04 00 | |
870400 | 880928 | Rdr | 93 70 b9 4f da 14 38 7d c1 | ok | SELECT_UID
882100 | 885620 | Tag | 08 b6 dd | |
887296 | 892000 | Rdr | 60 00 f5 7b | ok | AUTH-A(0)
894004 | 898740 | Tag | 01 20 01 45 | |
908416 | 917792 | Rdr | f3! 48 21! 0c a8! cb 46 c7 | !crc| ?
918964 | 923700 | Tag | a1! c1! 4f! cf! | |
929536 | 934240 | Rdr | 57 77 38 1e | !crc| ?
936244 | 940980 | Tag | 81! 90! c7! dc | |
942208 | 943456 | Rdr | 00 | | ?
957824 | 958816 | Rdr | 52' | | WUPA
960052 | 962420 | Tag | 04 00 | |
Last edited by mysx (2019-09-29 03:31:02)
Offline
I'm new to the forum and I need help
Hello you can tell me that you have to use commands with Prof Mark to be able to read the keys in a me make classic
Honestly I can not understand what commands you have to enter so that give me all the keys and all blocks do not know how to do you can help me please
Offline
Pages: 1