Research, development and trades concerning the powerful Proxmark3 device.
Remember; sharing is caring. Bring something back to the community.
"Learn the tools of the trade the hard way." +Fravia
You are not logged in.
Time changes and with it the technology
Proxmark3 @ discord
Users of this forum, please be aware that information stored on this site is not private.
Hello,
I have done it (cracked mifare) a few times successfully in the past but with this card was trying many times but I don't get it. I find some key using "hf mf mifare" command, but that key can't be used on any sector of the card...? Also the attack finds 26 possible keys, maybe it would be useful to try all of them, not just the first working one - is it possible to list those?
This really sucks, can You advice? If I end up not finding any valid key - is there some way to brute force? And if comm with reader will be needed, what are the set of commands that I can use near reader so I recover some key?
proxmark3> hf search
UID : f1 c4 3a 69
ATQA : 00 04
SAK : 08 [2]
TYPE : NXP MIFARE CLASSIC 1k | Plus 2k SL1
proprietary non iso14443-4 card found, RATS not supported
No chinese magic backdoor command detected
Prng detection: WEAK
Valid ISO14443A Tag Found - Quiting Search
proxmark3> hf mf mifare
-------------------------------------------------------------------------
Executing command. Expected execution time: 25sec on average
Press button on the proxmark3 device to abort both proxmark3 and client.
-------------------------------------------------------------------------
.#db# Mifare: Can't select card
#db# Mifare: Can't select card
#db# Mifare: Can't select card
#db# Mifare: Can't select card
#db# Mifare: Can't select card
#db# Mifare: Can't select card
#db# Mifare: Can't select card
#db# Mifare: Can't select card
.#db# Mifare: Can't select card
#db# Mifare: Can't select card
#db# Mifare: Can't select card
#db# Mifare: Can't select card
#db# Mifare: Can't select card
#db# Mifare: Can't select card
#db# Mifare: Can't select card
#db# Mifare: Can't select card
#db# Mifare: Can't select card
#db# Mifare: Can't select card
.#db# Mifare: Can't select card
#db# Mifare: Can't select card
#db# Mifare: Can't select card
#db# Mifare: Can't select card
#db# Mifare: Can't select card
#db# Mifare: Can't select card
#db# Mifare: Can't select card
#db# Mifare: Can't select card
#db# Mifare: Can't select card
.Parity is all zero. Most likely this card sends NACK on every failed authentication.
.#db# Mifare: Can't select card
#db# Mifare: Can't select card
#db# Mifare: Can't select card
#db# Mifare: Can't select card
#db# Mifare: Can't select card
#db# Mifare: Can't select card
#db# Mifare: Can't select card
#db# Mifare: Can't select card
#db# Mifare: Can't select card
.#db# Mifare: Can't select card
#db# Mifare: Can't select card
#db# Mifare: Can't select card
#db# Mifare: Can't select card
#db# Mifare: Can't select card
#db# Mifare: Can't select card
#db# Mifare: Can't select card
#db# Mifare: Can't select card
.#db# Mifare: Can't select card
#db# Mifare: Can't select card
#db# Mifare: Can't select card
#db# Mifare: Can't select card
#db# Mifare: Can't select card
.#db# Mifare: Can't select card
#db# Mifare: Can't select card
#db# Mifare: Can't select card
#db# Mifare: Can't select card
#db# Mifare: Can't select card
#db# Mifare: Can't select card
#db# Mifare: Can't select card
#db# Mifare: Can't select card
#db# Mifare: Can't select card
#db# Mifare: Can't select card
.#db# Mifare: Can't select card
#db# Mifare: Can't select card
#db# Mifare: Can't select card
#db# Mifare: Can't select card
#db# Mifare: Can't select card
#db# Mifare: Can't select card
#db# Mifare: Can't select card
#db# Mifare: Can't select card
.#db# Mifare: Can't select card
#db# Mifare: Can't select card
#db# Mifare: Can't select card
#db# Mifare: Can't select card
#db# Mifare: Can't select card
#db# Mifare: Can't select card
#db# Mifare: Can't select card
#db# Mifare: Can't select card
Found 26 possible keys. Trying to authenticate with each of them ...
Found valid key:e769a21ba799
And I tried the key on any of the card sectors, or nested attack, or added it to default keys file. Non helped.
proxmark3> hf mf chk * ? default_keys.dic
--chk keys. sectors:16, block no: 0, key type:B, eml:n, dmp=n checktimeout=471 us
chk custom key[ 0] ffffffffffff
chk custom key[ 1] 000000000000
chk custom key[ 2] a0a1a2a3a4a5
chk custom key[ 3] b0b1b2b3b4b5
chk custom key[ 4] aabbccddeeff
chk custom key[91] a9f953def0a3
chk custom key[92] e769a21ba799
To cancel this operation press the button on the proxmark...
--..
No valid keys found.
proxmark3> hf mf chk * ? e769a21ba799
--chk keys. sectors:16, block no: 0, key type:B, eml:n, dmp=n checktimeout=471 us
chk key[ 0] e769a21ba799
To cancel this operation press the button on the proxmark...
--.
No valid keys found.
Offline
try
http://www.proxmark.org/forum/viewtopic.php?id=6532
nb: below commands only show "WEAK prng" key (not those keys you need to find with hardnested)
proxmark3> hf list mf --help
proxmark3> hf search
proxmark3> hf mf chk *1 ? d
proxmark3> hf list mf ; run this line a few times before you can see something popup on the screen
are there any lines like this "key | probable key:"
i use the newest release from https://github.com/Proxmark/proxmark3/wiki/Windows
d:\ProxSpace-master\pm3\client>proxmark3.exe com25
Prox/RFID mark3 RFID instrument
bootrom: master/v3.1.0-199-g4b27ca5-dirty-suspect 2020-07-22 13:01:11
os: master/v3.1.0-199-g4b27ca5-dirty-suspect 2020-07-22 13:01:55
fpga_lf.bit built for 2s30vq100 on 2019/11/21 at 09:02:37
fpga_hf.bit built for 2s30vq100 on 2020/03/05 at 19:09:39
SmartCard Slot: not available
Last edited by tng (2020-07-27 12:16:18)
Offline