Research, development and trades concerning the powerful Proxmark3 device.
Remember; sharing is caring. Bring something back to the community.
"Learn the tools of the trade the hard way." +Fravia
You are not logged in.
Time changes and with it the technology
Proxmark3 @ discord
Users of this forum, please be aware that information stored on this site is not private.
Pages: 1
Hello my friends
I am in possession of a password-protected pcf. I know the first 5 bytes (FBA9EF4DC4) and I would like to try a bruteforce. I wrote the command:
- lf pcf7931 bruteforce FBA9EF4DC40000 2
but Proxmark easy responds
-proxmark3> lf pcf7931 bruteforce FBA9EF4DC40000 2
-Bruteforcing from password: fb 00 a9 00 ef 00 4d
-Trying each password 2 times
something I don't understand, the last 4 bytes should change, but not the first..
this is my configuration with official 32
Output will be flushed after every print.
Prox/RFID mark3 RFID instrument
bootrom: master/v3.1.0-88-g9ebbfd8-suspect 2019-04-23 09:35:14
os: master/v3.1.0-88-g9ebbfd8-suspect 2019-04-23 09:35:16
fpga_lf.bit built for 2s30vq100 on 2015/03/06 at 07:38:04
fpga_hf.bit built for 2s30vq100 on 2019/03/20 at 08:08:07
SmartCard Slot: not available
uC: AT91SAM7S256 Rev C
Embedded Processor: ARM7TDMI
Nonvolatile Program Memory Size: 256K bytes. Used: 206188 bytes (79%). Free: 55956 bytes (21%).
Second Nonvolatile Program Memory Size: None
Internal SRAM Size: 64K bytes
Architecture Identifier: AT91SAM7Sxx Series
Nonvolatile Program Memory Type: Embedded Flash Memory
Offline
Please try fix on https://github.com/Proxmark/proxmark3/pull/824
Offline
Did you succeed? Fix is now available in master branch.
Offline
Pages: 1