Research, development and trades concerning the powerful Proxmark3 device.
Remember; sharing is caring. Bring something back to the community.
"Learn the tools of the trade the hard way." +Fravia
You are not logged in.
Time changes and with it the technology
Proxmark3 @ discord
Users of this forum, please be aware that information stored on this site is not private.
Hi to all,
I would like to publish my video guide for Recovering and Cloning UID: MIFARE Classic EV1 S50 1K at the forum, for newest peoples and give an directly instructions for actions.
Regards to IceMan who has helped me to optimize my code, and to Doegox who removed it from the repo.
Enjoy!
Last edited by Winds (2020-06-01 12:28:57)
Offline
Hi, i watched your videos on how to clone Mifare classic and i followed your instruction but no success.
Offline
I followed your instruction but it just doesn't work when i run mfc_gen3_writer.lua script.
Please check it and please please tell me what i did wrong
ubuntu@ubuntu:~/proxmark3$ pm3
[=] Session log /home/ubuntu/.proxmark3/log_20200605.txt
[=] Loading Preferences...
[+] loaded from JSON file /home/ubuntu/.proxmark3/preferences.json
[=] Using UART port /dev/ttyACM0
[=] Communicating with PM3 over USB-CDC
██████╗ ███╗ ███╗█████╗
██╔══██╗████╗ ████║╚═══██╗
██████╔╝██╔████╔██║ ████╔╝
██╔═══╝ ██║╚██╔╝██║ ╚══██╗ ❄️ iceman@icesql.net
██║ ██║ ╚═╝ ██║█████╔╝ https://github.com/rfidresearchgroup/proxmark3/
╚═╝ ╚═╝ ╚═╝╚════╝ bleeding edge ☕
[ Proxmark3 RFID instrument ]
[ CLIENT ]
client: RRG/Iceman/master/v4.9237-9-g888235cd 2020-05-22 01:42:05
compiled with GCC 9.3.0 OS:Linux ARCH:x86_64
[ PROXMARK3 RDV4 ]
external flash: present
smartcard reader: present
[ PROXMARK3 RDV4 Extras ]
FPC USART for BT add-on support: absent
[ ARM ]
bootrom: RRG/Iceman/master/v4.9237-9-g888235cd 2020-05-22 01:43:23
os: RRG/Iceman/master/v4.9237-9-g888235cd 2020-05-22 01:43:38
compiled with GCC 9.2.1 20191025 (release) [ARM/arm-9-branch revision 277599]
[ FPGA ]
LF image built for 2s30vq100 on 2020-02-22 at 12:51:14
HF image built for 2s30vq100 on 2020-01-12 at 15:31:16
[ Hardware ]
--= uC: AT91SAM7S512 Rev B
--= Embedded Processor: ARM7TDMI
--= Nonvolatile Program Memory Size: 512K bytes, Used: 288908 bytes (55%) Free: 235380 bytes (45%)
--= Second Nonvolatile Program Memory Size: None
--= Internal SRAM Size: 64K bytes
--= Architecture Identifier: AT91SAM7Sxx Series
--= Nonvolatile Program Memory Type: Embedded Flash Memory
[usb] pm3 --> hf mf autopwn * 1 f mfc_default_keys
[!] ⚠️ no known key was supplied, key recovery might fail
[+] loaded 920 keys from dictionary file /usr/local/bin/../share/proxmark3/dictionaries/mfc_default_keys.dic
[=] running strategy 1
[=] Chunk: 1.1s | found 0/32 keys (85)
[=] Chunk: 1.1s | found 0/32 keys (85)
[=] Chunk: 1.1s | found 0/32 keys (85)
[=] Chunk: 1.1s | found 0/32 keys (85)
[=] Chunk: 1.1s | found 32/32 keys (85)
[+] target sector: 0 key type: A -- found valid key [88 29 DA 9D AF 76 ] (used for nested / hardnested attack)
[+] target sector: 0 key type: B -- found valid key [88 29 DA 9D AF 76 ]
[+] target sector: 1 key type: A -- found valid key [88 29 DA 9D AF 76 ]
[+] target sector: 1 key type: B -- found valid key [88 29 DA 9D AF 76 ]
[+] target sector: 2 key type: A -- found valid key [88 29 DA 9D AF 76 ]
[+] target sector: 2 key type: B -- found valid key [88 29 DA 9D AF 76 ]
[+] target sector: 3 key type: A -- found valid key [88 29 DA 9D AF 76 ]
[+] target sector: 3 key type: B -- found valid key [88 29 DA 9D AF 76 ]
[+] target sector: 4 key type: A -- found valid key [88 29 DA 9D AF 76 ]
[+] target sector: 4 key type: B -- found valid key [88 29 DA 9D AF 76 ]
[+] target sector: 5 key type: A -- found valid key [88 29 DA 9D AF 76 ]
[+] target sector: 5 key type: B -- found valid key [88 29 DA 9D AF 76 ]
[+] target sector: 6 key type: A -- found valid key [88 29 DA 9D AF 76 ]
[+] target sector: 6 key type: B -- found valid key [88 29 DA 9D AF 76 ]
[+] target sector: 7 key type: A -- found valid key [88 29 DA 9D AF 76 ]
[+] target sector: 7 key type: B -- found valid key [88 29 DA 9D AF 76 ]
[+] target sector: 8 key type: A -- found valid key [88 29 DA 9D AF 76 ]
[+] target sector: 8 key type: B -- found valid key [88 29 DA 9D AF 76 ]
[+] target sector: 9 key type: A -- found valid key [88 29 DA 9D AF 76 ]
[+] target sector: 9 key type: B -- found valid key [88 29 DA 9D AF 76 ]
[+] target sector: 10 key type: A -- found valid key [88 29 DA 9D AF 76 ]
[+] target sector: 10 key type: B -- found valid key [88 29 DA 9D AF 76 ]
[+] target sector: 11 key type: A -- found valid key [88 29 DA 9D AF 76 ]
[+] target sector: 11 key type: B -- found valid key [88 29 DA 9D AF 76 ]
[+] target sector: 12 key type: A -- found valid key [88 29 DA 9D AF 76 ]
[+] target sector: 12 key type: B -- found valid key [88 29 DA 9D AF 76 ]
[+] target sector: 13 key type: A -- found valid key [88 29 DA 9D AF 76 ]
[+] target sector: 13 key type: B -- found valid key [88 29 DA 9D AF 76 ]
[+] target sector: 14 key type: A -- found valid key [88 29 DA 9D AF 76 ]
[+] target sector: 14 key type: B -- found valid key [88 29 DA 9D AF 76 ]
[+] target sector: 15 key type: A -- found valid key [88 29 DA 9D AF 76 ]
[+] target sector: 15 key type: B -- found valid key [88 29 DA 9D AF 76 ]
[+] found keys:
[+] |-----|----------------|---|----------------|---|
[+] | Sec | key A |res| key B |res|
[+] |-----|----------------|---|----------------|---|
[+] | 000 | 8829da9daf76 | D | 8829da9daf76 | D |
[+] | 001 | 8829da9daf76 | D | 8829da9daf76 | D |
[+] | 002 | 8829da9daf76 | D | 8829da9daf76 | D |
[+] | 003 | 8829da9daf76 | D | 8829da9daf76 | D |
[+] | 004 | 8829da9daf76 | D | 8829da9daf76 | D |
[+] | 005 | 8829da9daf76 | D | 8829da9daf76 | D |
[+] | 006 | 8829da9daf76 | D | 8829da9daf76 | D |
[+] | 007 | 8829da9daf76 | D | 8829da9daf76 | D |
[+] | 008 | 8829da9daf76 | D | 8829da9daf76 | D |
[+] | 009 | 8829da9daf76 | D | 8829da9daf76 | D |
[+] | 010 | 8829da9daf76 | D | 8829da9daf76 | D |
[+] | 011 | 8829da9daf76 | D | 8829da9daf76 | D |
[+] | 012 | 8829da9daf76 | D | 8829da9daf76 | D |
[+] | 013 | 8829da9daf76 | D | 8829da9daf76 | D |
[+] | 014 | 8829da9daf76 | D | 8829da9daf76 | D |
[+] | 015 | 8829da9daf76 | D | 8829da9daf76 | D |
[+] |-----|----------------|---|----------------|---|
[=] ( D:Dictionary / S:darkSide / U:User / R:Reused / N:Nested / H:Hardnested / A:keyA )
[+] Generating binary key file
[+] Found keys have been dumped to hf-mf-825B8E02-key-1.bin--> 0xffffffffffff has been inserted for unknown keys.
[+] transferring keys to simulator memory (Cmd Error: 04 can occur)
[=] downloading the card content from emulator memory
[+] saved 1024 bytes to binary file hf-mf-825B8E02-dump-1.bin
[+] saved 64 blocks to text file hf-mf-825B8E02-dump-1.eml
[+] saved to json file hf-mf-825B8E02-dump-1.json
[=] autopwn execution time: 8 seconds
[usb] pm3 --> script run mfc_gen3_writer
[+] executing lua mfc_gen3_writer.lua
[+] args ''
Waiting for card... press Enter to quit
----------------------------------------------------------------
1 | applypat
2 | ypatch-m
3 | brute/ob
4 | brute/ob
5 | /obj/buc
6 | /obj/buc
7 | c06_cons
8 | cipher_i
9 | tion_Ins
10 | ne/lf_pr
11 | ne/lf_em
12 | on-ask-m
13 | HIDemu-F
14 | on-ask-m
15 | on-manch
16 | on-ask-m
17 | ts/mifar
18 | ts/dumpt
19 | ts/test_
20 | ts/calc_
21 | ts/param
22 | ass/elit
23 | ass/ciph
24 | ass/elit
25 | ass/ciph
26 | and_form
27 | crypto_p
28 | crypto_p
29 | test/cry
30 | test/cry
31 | and_form
32 | sson/obj
33 | sson/obj
34 | sson/lib
35 | itool/li
36 | lua/obj/
37 | lua/obj/
38 | lua/obj/
39 | lua/obj/
40 | lua/obj/
41 | lua/obj/
42 | lua/obj/
43 | lua/obj/
44 | lua/obj/
45 | lua/obj/
46 | lua/obj/
47 | lua/obj/
48 | lua/obj/
49 | lua/obj/
50 | lua/obj/
51 | lua/obj/
52 | lua/obj/
53 | lua/obj/
find: ‘*dump.eml’: No such file or directory
54 | and_form
55 | ass/ciph
56 | ass/elit
57 | ass/elit
58 | ass/hash
59 | ass/hash
60 | ass/ciph
61 | crypto_p
62 | test/cry
63 | test/cry
64 | and_form
65 | s/iclass
----------------------------------------------------------------
Your card has UID 4A0B2815
Select which dump to write (1 until 65)
----------------------------------------------------------------
--> 1
----------------------------------------------------------------
You have been selected card dump No 1, with UID: applypat. Your card UID: 4A0B2815
mfc_gen3_writer.lua:294: ./hf-mf-applypat-dump.eml: No such file or directory
[+] finished mfc_gen3_writer
[usb] pm3 -->
Last edited by Mongol (2020-06-05 06:43:05)
Offline
Would you please upload video how to clone mifare PRNG: hard card? i really need to duplicate my fob
Offline
The script works only to Windows platform.
Plese find compiled distro at video discription with already included mfc_gen3_writer.lua if you have any problems.
To correct run it, you might have minimum one dump after autopown command.
Offline
Hi I think that the problem is with my blank mifare cards since they are some types of different card on the market Im gonna buy a some card from your link.
Can u pls tell me which one will work on my mifare card from below 3 options. I found one seller from ebay selling 3 different mifare key. My original fob is prng: Hardened 1k mifare
New UID Changeable MF Classic 1K 13.56Mhz Cards IC Cards
IMPORTANT: There are three different types of cards that you can choose from:
Type 1: Normal GEN1 UID Changeable Cards:
All blocks (including Block 0) can be re-written multiple times
Use ProxMark3 (Magic Chinese Guy function) or libnfc to change UID.
Uses "backdoor" technique to change/rewrite UID.
UID can be changed multiple times.
Not suitable for MCT Mi fare Classic Tool
Answers to chinese magic backdoor commands (GEN 1a): YES
Type 2: Special GEN2 CUID Cards:
All blocks (including Block 0) can be re-written multiple times
Not easily detectable by a system with "anti-clone" feature
IMPORTANT: Card will die if an invalid Block 0 is written
Use normal commands. eg. hf mf wrbl 0 B FFFFFFFFFFFF a473f601200804006263646566676869
Suitable for MCT Mi fare Classic Tool
Answers to chinese magic backdoor commands: NO
Type 3: Special GEN2 FUID Write-Once Cards:
Block 0 can only be written once.
Even greater protection from a system with "anti-clone" feature
Use normal commands. eg. hf mf wrbl 0 B FFFFFFFFFFFF a473f601200804006263646566676869
Suitable for MCT Mi fare Classic Tool
Answers to chinese magic backdoor commands: NO
Offline
I can't talk about other types cards. Please buy cards from link in description for get a same result like me.
Offline
You don't need to buy a gen3 card.
Just buy a gen1a, use the 'hf mf c*' commands, and see if it works on your setup. Gen1a is dirt cheap.
Offline
You don't need to buy a gen3 card.
Just buy a gen1a, use the 'hf mf c*' commands, and see if it works on your setup. Gen1a is dirt cheap.
Yeah the seller at AliExpress has changed a price, it was more less.
Offline
thank you so much for the reply iceman and winds. I successfully cloned my Mifare card on gen1a fob which i bought from online but reader doesn't accept my cloned fob.
here's what i did:
I used "hf mf autopwn" command and it successfully recovered all the key in A and B. but the recovered keys were all the same one key.
then i used restore command to copy the recovered keys to my new fob. after that, i used csetuid command to change the UID with original one. Now when i compare the original and clone fob, they all exactly shown same results(keys and UID)
Why is it not working on the reader??? i guess Gen1a card doesn't work with the reader. i've been trying to clone this fob for many months.
Please help me for this issue.
i can upload all the process here.
Offline
Here's the original fob result:
? Searching for ISO14443-A tag...
[+] UID: 82 5B 8E 02
[+] ATQA: 00 04
[+] SAK: 08 [2]
[+] POSSIBLE TYPE: MIFARE Classic 1K / Classic 1K CL2
[+] POSSIBLE TYPE: MIFARE Plus 2K / Plus EV1 2K
[+] POSSIBLE TYPE: MIFARE Plus CL2 2K / Plus CL2 EV1 2K
[=] proprietary non iso14443-4 card found, RATS not supported
[+] Prng detection: hard
[+] Valid ISO14443-A tag found
pm3 --> hf mf fchk 1 mfc_default_keys.dic
[+] Loaded 920 keys from mfc_default_keys.dic
[=] Running strategy 1
[=] Chunk: 1.4s | found 0/32 keys (85)
[=] Chunk: 1.1s | found 0/32 keys (85)
[=] Chunk: 1.1s | found 0/32 keys (85)
[=] Chunk: 1.1s | found 0/32 keys (85)
[=] Chunk: 1.0s | found 32/32 keys (85)
[=] Time in checkkeys (fast): 5.7s
[+] found keys:
[+] |-----|----------------|---|----------------|---|
[+] | Sec | key A |res| key B |res|
[+] |-----|----------------|---|----------------|---|
[+] | 000 | 8829da9daf76 | 1 | 8829da9daf76 | 1 |
[+] | 001 | 8829da9daf76 | 1 | 8829da9daf76 | 1 |
[+] | 002 | 8829da9daf76 | 1 | 8829da9daf76 | 1 |
[+] | 003 | 8829da9daf76 | 1 | 8829da9daf76 | 1 |
[+] | 004 | 8829da9daf76 | 1 | 8829da9daf76 | 1 |
[+] | 005 | 8829da9daf76 | 1 | 8829da9daf76 | 1 |
[+] | 006 | 8829da9daf76 | 1 | 8829da9daf76 | 1 |
[+] | 007 | 8829da9daf76 | 1 | 8829da9daf76 | 1 |
[+] | 008 | 8829da9daf76 | 1 | 8829da9daf76 | 1 |
[+] | 009 | 8829da9daf76 | 1 | 8829da9daf76 | 1 |
[+] | 010 | 8829da9daf76 | 1 | 8829da9daf76 | 1 |
[+] | 011 | 8829da9daf76 | 1 | 8829da9daf76 | 1 |
[+] | 012 | 8829da9daf76 | 1 | 8829da9daf76 | 1 |
[+] | 013 | 8829da9daf76 | 1 | 8829da9daf76 | 1 |
[+] | 014 | 8829da9daf76 | 1 | 8829da9daf76 | 1 |
[+] | 015 | 8829da9daf76 | 1 | 8829da9daf76 | 1 |
[+] |-----|----------------|---|----------------|---|
[+] ( 0:Failed / 1:Success)
Last edited by Mongol (2020-06-15 10:18:48)
Offline
here's the cloned fob used Gen1a. everything looks same on both card but doesn't work!
[usb] pm3 --> hf se
? Searching for ISO14443-A tag...
[+] UID: 82 5B 8E 02
[+] ATQA: 00 04
[+] SAK: 08 [2]
[+] POSSIBLE TYPE: MIFARE Classic 1K / Classic 1K CL2
[+] POSSIBLE TYPE: MIFARE Plus 2K / Plus EV1 2K
[+] POSSIBLE TYPE: MIFARE Plus CL2 2K / Plus CL2 EV1 2K
[=] proprietary non iso14443-4 card found, RATS not supported
[+] Magic capabilities : Gen 1a
[+] Prng detection: weak
[+] Valid ISO14443-A tag found
?
usb] pm3 --> hf mf fchk 1 mfc_default_keys.dic
[+] Loaded 920 keys from mfc_default_keys.dic
[=] Running strategy 1
[=] Chunk: 1.7s | found 0/32 keys (85)
[=] Chunk: 1.1s | found 0/32 keys (85)
[=] Chunk: 1.1s | found 0/32 keys (85)
[=] Chunk: 1.1s | found 0/32 keys (85)
[=] Chunk: 1.0s | found 32/32 keys (85)
[=] Time in checkkeys (fast): 5.9s
[+] found keys:
[+] |-----|----------------|---|----------------|---|
[+] | Sec | key A |res| key B |res|
[+] |-----|----------------|---|----------------|---|
[+] | 000 | 8829da9daf76 | 1 | 8829da9daf76 | 1 |
[+] | 001 | 8829da9daf76 | 1 | 8829da9daf76 | 1 |
[+] | 002 | 8829da9daf76 | 1 | 8829da9daf76 | 1 |
[+] | 003 | 8829da9daf76 | 1 | 8829da9daf76 | 1 |
[+] | 004 | 8829da9daf76 | 1 | 8829da9daf76 | 1 |
[+] | 005 | 8829da9daf76 | 1 | 8829da9daf76 | 1 |
[+] | 006 | 8829da9daf76 | 1 | 8829da9daf76 | 1 |
[+] | 007 | 8829da9daf76 | 1 | 8829da9daf76 | 1 |
[+] | 008 | 8829da9daf76 | 1 | 8829da9daf76 | 1 |
[+] | 009 | 8829da9daf76 | 1 | 8829da9daf76 | 1 |
[+] | 010 | 8829da9daf76 | 1 | 8829da9daf76 | 1 |
[+] | 011 | 8829da9daf76 | 1 | 8829da9daf76 | 1 |
[+] | 012 | 8829da9daf76 | 1 | 8829da9daf76 | 1 |
[+] | 013 | 8829da9daf76 | 1 | 8829da9daf76 | 1 |
[+] | 014 | 8829da9daf76 | 1 | 8829da9daf76 | 1 |
[+] | 015 | 8829da9daf76 | 1 | 8829da9daf76 | 1 |
[+] |-----|----------------|---|----------------|---|
[+] ( 0:Failed / 1:Success)
Offline
I think that your reader is detecting gen1a cards. Try using proxmark simulation mode - if it will work, you need little bit 'clever' tag
Offline
@Mongol
Now when i compare the original and clone fob, they all exactly shown same results(keys and UID)
What about the data on the card ?
Offline
Please tell me what type of mifare card should I use to clone this fob and what command i have to use. please tell me what to do to clone it to blank fob.
hello here's the result:
[usb] pm3 --> hf mf autopwn * 1 f mfc_default_keys
[!] no known key was supplied, key recovery might fail
[+] loaded 920 keys from dictionary file C:\Users\DeLL\Documents\swipe\proxmark3-64-20200602-6980429bd4c01a716c9168b05dd2f805b7e35940\win64\dictionaries/mfc_default_keys.dic
[=] running strategy 1
[=] Chunk: 1.1s | found 0/32 keys (85)
[=] Chunk: 1.1s | found 0/32 keys (85)
[=] Chunk: 1.1s | found 0/32 keys (85)
[=] Chunk: 1.1s | found 0/32 keys (85)
[=] Chunk: 1.0s | found 32/32 keys (85)
[+] target sector: 0 key type: A -- found valid key [88 29 DA 9D AF 76 ] (used for nested / hardnested attack)
[+] target sector: 0 key type: B -- found valid key [88 29 DA 9D AF 76 ]
[+] target sector: 1 key type: A -- found valid key [88 29 DA 9D AF 76 ]
[+] target sector: 1 key type: B -- found valid key [88 29 DA 9D AF 76 ]
[+] target sector: 2 key type: A -- found valid key [88 29 DA 9D AF 76 ]
[+] target sector: 2 key type: B -- found valid key [88 29 DA 9D AF 76 ]
[+] target sector: 3 key type: A -- found valid key [88 29 DA 9D AF 76 ]
[+] target sector: 3 key type: B -- found valid key [88 29 DA 9D AF 76 ]
[+] target sector: 4 key type: A -- found valid key [88 29 DA 9D AF 76 ]
[+] target sector: 4 key type: B -- found valid key [88 29 DA 9D AF 76 ]
[+] target sector: 5 key type: A -- found valid key [88 29 DA 9D AF 76 ]
[+] target sector: 5 key type: B -- found valid key [88 29 DA 9D AF 76 ]
[+] target sector: 6 key type: A -- found valid key [88 29 DA 9D AF 76 ]
[+] target sector: 6 key type: B -- found valid key [88 29 DA 9D AF 76 ]
[+] target sector: 7 key type: A -- found valid key [88 29 DA 9D AF 76 ]
[+] target sector: 7 key type: B -- found valid key [88 29 DA 9D AF 76 ]
[+] target sector: 8 key type: A -- found valid key [88 29 DA 9D AF 76 ]
[+] target sector: 8 key type: B -- found valid key [88 29 DA 9D AF 76 ]
[+] target sector: 9 key type: A -- found valid key [88 29 DA 9D AF 76 ]
[+] target sector: 9 key type: B -- found valid key [88 29 DA 9D AF 76 ]
[+] target sector: 10 key type: A -- found valid key [88 29 DA 9D AF 76 ]
[+] target sector: 10 key type: B -- found valid key [88 29 DA 9D AF 76 ]
[+] target sector: 11 key type: A -- found valid key [88 29 DA 9D AF 76 ]
[+] target sector: 11 key type: B -- found valid key [88 29 DA 9D AF 76 ]
[+] target sector: 12 key type: A -- found valid key [88 29 DA 9D AF 76 ]
[+] target sector: 12 key type: B -- found valid key [88 29 DA 9D AF 76 ]
[+] target sector: 13 key type: A -- found valid key [88 29 DA 9D AF 76 ]
[+] target sector: 13 key type: B -- found valid key [88 29 DA 9D AF 76 ]
[+] target sector: 14 key type: A -- found valid key [88 29 DA 9D AF 76 ]
[+] target sector: 14 key type: B -- found valid key [88 29 DA 9D AF 76 ]
[+] target sector: 15 key type: A -- found valid key [88 29 DA 9D AF 76 ]
[+] target sector: 15 key type: B -- found valid key [88 29 DA 9D AF 76 ]
[+] found keys:
[+] |-----|----------------|---|----------------|---|
[+] | Sec | key A |res| key B |res|
[+] |-----|----------------|---|----------------|---|
[+] | 000 | 8829da9daf76 | D | 8829da9daf76 | D |
[+] | 001 | 8829da9daf76 | D | 8829da9daf76 | D |
[+] | 002 | 8829da9daf76 | D | 8829da9daf76 | D |
[+] | 003 | 8829da9daf76 | D | 8829da9daf76 | D |
[+] | 004 | 8829da9daf76 | D | 8829da9daf76 | D |
[+] | 005 | 8829da9daf76 | D | 8829da9daf76 | D |
[+] | 006 | 8829da9daf76 | D | 8829da9daf76 | D |
[+] | 007 | 8829da9daf76 | D | 8829da9daf76 | D |
[+] | 008 | 8829da9daf76 | D | 8829da9daf76 | D |
[+] | 009 | 8829da9daf76 | D | 8829da9daf76 | D |
[+] | 010 | 8829da9daf76 | D | 8829da9daf76 | D |
[+] | 011 | 8829da9daf76 | D | 8829da9daf76 | D |
[+] | 012 | 8829da9daf76 | D | 8829da9daf76 | D |
[+] | 013 | 8829da9daf76 | D | 8829da9daf76 | D |
[+] | 014 | 8829da9daf76 | D | 8829da9daf76 | D |
[+] | 015 | 8829da9daf76 | D | 8829da9daf76 | D |
[+] |-----|----------------|---|----------------|---|
[=] ( D:Dictionary / S:darkSide / U:User / R:Reused / N:Nested / H:Hardnested / A:keyA )
[usb] pm3 --> hf mf rdbl 0 a 8829da9daf76
--block no:0, key type:A, key:88 29 DA 9D AF 76
data: 82 5B 8E 02 55 88 04 00 C8 49 00 20 00 00 00 17
[usb] pm3 --> hf mf rdbl 1 a 8829da9daf76
--block no:1, key type:A, key:88 29 DA 9D AF 76
data: 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[usb] pm3 --> hf mf rdbl 2 a 8829da9daf76
--block no:2, key type:A, key:88 29 DA 9D AF 76
data: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[usb] pm3 --> hf mf rdbl 3 a 8829da9daf76
--block no:3, key type:A, key:88 29 DA 9D AF 76
data: 00 00 00 00 00 00 7F 07 88 00 00 00 00 00 00 00
Trailer decoded:
Access block 0: rdAB wrAB incAB dectrAB
Access block 1: rdAB wrAB incAB dectrAB
Access block 2: rdAB wrAB incAB dectrAB
Access block 3: wrAbyB rdCbyAB wrCbyB wrBbyB
UserData: 00
Offline