Research, development and trades concerning the powerful Proxmark3 device.
Remember; sharing is caring. Bring something back to the community.
"Learn the tools of the trade the hard way." +Fravia
You are not logged in.
Time changes and with it the technology
Proxmark3 @ discord
Users of this forum, please be aware that information stored on this site is not private.
[+] UID: 23 5D 86 9F
[+] ATQA: 00 04
[+] SAK: 08 [2]
[+] Possible types:
[+] MIFARE Classic 1K
[=] proprietary non iso14443-4 card found, RATS not supported
[#] 1 static nonce 009080a2
[+] Static nonce: yes
[#] Auth error
[?] Hint: try `hf mf` commands
[#] 1 static nonce 009080a2
[!] no known key was supplied, key recovery might fail
[+] loaded 71 keys from dictionary file ..\user\tmp.dic
[=] running strategy 1
[=] Chunk: 0.9s | found 31/32 keys (71)
[=] running strategy 2
[=] Chunk: 1.0s | found 31/32 keys (71)
[+] target sector: 0 key type: A -- found valid key [ FF FF FF FF FF FF ] (used for nested / hardnested attack)
[+] target sector: 0 key type: B -- found valid key [ FF FF FF FF FF FF ]
[+] target sector: 1 key type: A -- found valid key [ 57 71 29 50 46 67 ]
[+] target sector: 1 key type: B -- found valid key [ FF FF FF FF FF FF ]
[+] target sector: 2 key type: A -- found valid key [ FF FF FF FF FF FF ]
[+] target sector: 2 key type: B -- found valid key [ FF FF FF FF FF FF ]
[+] target sector: 3 key type: A -- found valid key [ D1 A7 FB 89 B2 5F ]
[+] target sector: 3 key type: B -- found valid key [ 35 12 57 06 BC 28 ]
[+] target sector: 4 key type: A -- found valid key [ FF FF FF FF FF FF ]
[+] target sector: 4 key type: B -- found valid key [ FF FF FF FF FF FF ]
[+] target sector: 5 key type: A -- found valid key [ 3C EF 6F B9 DD C4 ]
[+] target sector: 6 key type: A -- found valid key [ FF FF FF FF FF FF ]
[+] target sector: 6 key type: B -- found valid key [ FF FF FF FF FF FF ]
[+] target sector: 7 key type: A -- found valid key [ FF FF FF FF FF FF ]
[+] target sector: 7 key type: B -- found valid key [ FF FF FF FF FF FF ]
[+] target sector: 8 key type: A -- found valid key [ FF FF FF FF FF FF ]
[+] target sector: 8 key type: B -- found valid key [ FF FF FF FF FF FF ]
[+] target sector: 9 key type: A -- found valid key [ FF FF FF FF FF FF ]
[+] target sector: 9 key type: B -- found valid key [ FF FF FF FF FF FF ]
[+] target sector: 10 key type: A -- found valid key [ FF FF FF FF FF FF ]
[+] target sector: 10 key type: B -- found valid key [ FF FF FF FF FF FF ]
[+] target sector: 11 key type: A -- found valid key [ FF FF FF FF FF FF ]
[+] target sector: 11 key type: B -- found valid key [ FF FF FF FF FF FF ]
[+] target sector: 12 key type: A -- found valid key [ FF FF FF FF FF FF ]
[+] target sector: 12 key type: B -- found valid key [ FF FF FF FF FF FF ]
[+] target sector: 13 key type: A -- found valid key [ FF FF FF FF FF FF ]
[+] target sector: 13 key type: B -- found valid key [ FF FF FF FF FF FF ]
[+] target sector: 14 key type: A -- found valid key [ FF FF FF FF FF FF ]
[+] target sector: 14 key type: B -- found valid key [ FF FF FF FF FF FF ]
[+] target sector: 15 key type: A -- found valid key [ FF FF FF FF FF FF ]
[+] target sector: 15 key type: B -- found valid key [ FF FF FF FF FF FF ]
[+] Found 58403 key candidates
[+] target block: 20 key type: B
[+] found keys:
[+] |-----|----------------|---|----------------|---|
[+] | Sec | key A |res| key B |res|
[+] |-----|----------------|---|----------------|---|
[+] | 000 | ffffffffffff | D | ffffffffffff | D |
[+] | 001 | 577129504667 | D | ffffffffffff | D |
[+] | 002 | ffffffffffff | D | ffffffffffff | D |
[+] | 003 | d1a7fb89b25f | D | 35125706bc28 | D |
[+] | 004 | ffffffffffff | D | ffffffffffff | D |
[+] | 005 | 3cef6fb9ddc4 | D | ------------ |
[+] | 006 | ffffffffffff | D | ffffffffffff | D |
[+] | 007 | ffffffffffff | D | ffffffffffff | D |
[+] | 008 | ffffffffffff | D | ffffffffffff | D |
[+] | 009 | ffffffffffff | D | ffffffffffff | D |
[+] | 010 | ffffffffffff | D | ffffffffffff | D |
[+] | 011 | ffffffffffff | D | ffffffffffff | D |
[+] | 012 | ffffffffffff | D | ffffffffffff | D |
[+] | 013 | ffffffffffff | D | ffffffffffff | D |
[+] | 014 | ffffffffffff | D | ffffffffffff | D |
[+] | 015 | ffffffffffff | D | ffffffffffff | D |
[+] |-----|----------------|---|----------------|---|
[=] ( D:Dictionary / S:darkSide / U:User / R:Reused / N:Nested / H:Hardnested / C:statiCnested / A:keyA )
[+] Generating binary key file
[+] Found keys have been dumped to hf-mf-235D869F-key.bin
[=] FYI! --> 0xFFFFFFFFFFFF <-- has been inserted for unknown keys where res is 0
[+] transferring keys to simulator memory (Cmd Error: 04 can occur)
[=] downloading the card content from emulator memory
[+] saved 1024 bytes to binary file hf-mf-235D869F-dump.bin
[+] saved 64 blocks to text file hf-mf-235D869F-dump.eml
[+] saved to json file hf-mf-235D869F-dump.json
[=] autopwn execution time: 360 seconds
Sector 5 password is
3CEF6FB9DDC4 78778869 5689A779DFAC
-----------------------
BKey cannot be decrypted normally
[ Proxmark3 RFID instrument ]
[ CLIENT ]
client: RRG/Iceman/master/release (git)
compiled with MinGW-w64 10.1.0 OS:Windows (64b) ARCH:x86_64
[ PROXMARK3 ]
device.................... device / fw mismatch
firmware.................. RDV4
external flash............ present
smartcard reader.......... absent
FPC USART for BT add-on... present
[ ARM ]
bootrom: RRG/Iceman/master/v4.9237-3236-g2a645e801 2021-02-28 12:21:32
os: RRG/Iceman/master/v4.9237-3236-g2a645e801 2021-02-28 12:21:39
compiled with GCC 8.4.0
[ FPGA ]
LF image built for 2s30vq100 on 2020-07-08 at 23: 8: 7
HF image built for 2s30vq100 on 2020-07-08 at 23: 8:19
HF FeliCa image built for 2s30vq100 on 2020-07-08 at 23: 8:30
[ Hardware ]
--= uC: AT91SAM7S512 Rev A
--= Embedded Processor: ARM7TDMI
--= Internal SRAM size: 64K bytes
--= Architecture identifier: AT91SAM7Sxx Series
--= Embedded flash memory 512K bytes ( 59% used )
Last edited by wdywmz (2022-02-23 16:30:17)
Offline
Is there a way to solve this problem?
Offline
"man of midle"...
Offline
Test against the latest source, it should have improved since you ran it.
Offline