Research, development and trades concerning the powerful Proxmark3 device.
Remember; sharing is caring. Bring something back to the community.
"Learn the tools of the trade the hard way." +Fravia
You are not logged in.
Time changes and with it the technology
Proxmark3 @ discord
Users of this forum, please be aware that information stored on this site is not private.
Pages: 1
I recorded with the sniff command the communication swichen chip and the transmitter
and also the program crapto1gui.exe version 1.1 to calculate for Kay but the kay does not work is not the version too old or why can it be?
TYPE : NXP MIFARE CLASSIC 1k | Plus 2k SL1
proprietary non iso14443-4 card found, RATS not supported
Answers to chinese magic backdoor commands: NO
received trace len: 481 packages: 1
tag select uid:19 2B 33 14 atqa:0x0004 sak:0x08
RDR(0):60 00 f5 7b
TAG(1):58 a9 d4 e1
RDR(2):9b dc 51 b2 1f d9 56 d2
TAG(3):70 45 86 44
RDR(4):66 9a 12 f3
TAG(5):d0 d8 5b 51 19 2B 33 14b5 31 19 2B 33 14 24 3f 16
RDR(6):9c 73 4d ef
TAG(7):20 f4 09 14 66 01 f8 74 14 a1 87 9f 3d 08 cb 85 d4 18
RDR(8):87 03 fc 4b
tag select uid:19 2B 33 14 atqa:0x0004 sak:0x08
RDR(9):60 04 d1 3d
TAG(10):14 cc 13 3b
RDR(11):dd 21 d8 26 40 73 f8 e7
TAG(12):a1 38 38 e0
RDR(13):dc fc a3 75
TAG(14):4d 2f 15 c8 86 51 bd 9c e3 18 30 db fa 02 07 53 63 eb
RDR(15):8a a0 6f c9
TAG(16):a8 72 0f 40 40 19 2B 33 14 20 7e b1 c3 ac f6 a9 65
RDR(17):f5 3f ff 3c
TAG(18):e8 af 7f 74 d6 34 5c 19 2B 33 14 06 d1 07 89 cb 6c
RDR(19):f7 41 3b 66
TAG(20):0c ce a9 d6
RDR(21):59 f9 10 bd ba 49 68 99
TAG(22):2e d9 56 6a
RDR(23):bf 31 05 53
TAG(24):32 5b 35 b7 dd 73 94 8f 14 19 2B 33 14 14 85 8f e5 82
kay:9DDDFD8226EC = crapto1gui.exe
Last edited by 3dmann (2019-06-23 11:51:46)
Offline
Looks like you are on a old proxmark3 client/firmware version. Try latest official.
Then when you sniff, try hf list mifare, it will be easier
Offline
Thank you you had right the old version on it ...
Now I have the latest news
[ CLIENT ]
client: iceman build for RDV40 with flashmem; smartcard;
[ ARM ]
bootrom: iceman/master/ice_v3.1.0-1087-gf55a5725 2019-05-29 21:04:34
os: iceman/master/ice_v3.1.0-1087-gf55a5725 2019-05-29 21:04:38
[ FPGA ]
LF image built for 2s30vq100 on 2017/10/25 at 19:50:50
HF image built for 2s30vq100 on 2018/ 9/ 3 at 21:40:23
[ Hardware ]
--= uC: AT91SAM7S512 Rev B
--= Embedded Processor: ARM7TDMI
--= Nonvolatile Program Memory Size: 512K bytes, Used: 117349 bytes (45%) Free: 286939 bytes (55%)
--= Second Nonvolatile Program Memory Size: None
--= Internal SRAM Size: 64K bytes
--= Architecture Identifier: AT91SAM7Sxx Series
--= Nonvolatile Program Memory Type: Embedded Flash Memory
now I have the communication with the version recorded only because I last day only 6 characters and no 8
and so I get no kay in crapto1gui.exe
pm3 --> hf list mf
Recorded Activity (TraceLen = 77 bytes)
Start = Start of Start Bit, End = End of last modulation. Src = Source of Transfer
iso14443a - All times are in carrier periods (1/13.56Mhz)
Start | End | Src | Data (! denotes parity error) | CRC | Annotation
------------+------------+-----+-------------------------------------------------------------------------+-----+--------------------
0 | 992 | Rdr |52 | | WUPA
2228 | 4596 | Tag |04 00 | |
7040 | 9504 | Rdr |93 20 | | ANTICOLL
10676 | 16500 | Tag |32 bf da 7a 2d | |
19456 | 29920 | Rdr |93 70 19 2B 33 14 86 c3 | ok | SELECT_UID
31156 | 34676 | Tag |08 b6 dd | |
and in the program PM3 Universal GUI.exe I can not find any crapt or kay generated
Last edited by 3dmann (2019-06-23 11:52:39)
Offline
You should even try latest offical repo or RRG repo in order to get the functions I am thinking of.
Offline
you do not mean the version of the firmware but the ELECHOUSE Proxmark3 V2 DEV is too old and I should buy Proxmark3 4.0 RFID?
or what is RRG repo?
Offline
No, your RDV2 is still a good one. Just put latest source on it and life will be better.
Latest sourcecode on Offical pm3 repo. (also a link on top of the forumpages)
https://github.com/Proxmark/proxmark3/
RRG repo, can be compiled for any pm3 device nowdays.
https://github.com/RfidResearchGroup/proxmark3
Offline
Thank you for your help !!! i'm a freshman as you see.
I've already looked at some things and tried out such as. Gator96100 / ProxSpace but because not so because I do not know exactly what I have to do exactly to install offical repo in windows 7 / 64bit there is a tutorial tutorial or something in the kind for beginners.
Offline
there is a lot of documentation... read the wiki, read the installation documents..
Offline
OK :-)
Now I want the program PM3UniversalGUI.exe
integrate
but how would that work?
======. ===. ===. ====. ...iceman fork
==...==.====. ====. ..=. ...dedicated to RDV40
======..==.====.==. ====..
==..... ==..==..==. ..=. iceman@icesql.net
==. ==. ... ==. ====.. https://github.com/rfidresearchgroup/proxmark3/
... ... ... ..... pre-release v4.0
Support iceman on patreon, https://www.patreon.com/iceman1001/
[=] Using UART port com15
[=] Communicating with PM3 over USB-CDC
[ Proxmark3 RFID instrument ]
[ CLIENT ]
client: RRG/Iceman
[ PROXMARK RDV4 ]
external flash: absent
smartcard reader: absent
[ PROXMARK RDV4 Extras ]
FPC USART for BT add-on support: absent
[ ARM ]
bootrom: RRG/Iceman/master/7afc4b7b-dirty-unclean 2019-06-09 19:58:25
os: RRG/Iceman/master/7afc4b7b-dirty-unclean 2019-06-09 19:59:46
[ FPGA ]
LF image built for 2s30vq100 on 2019/ 4/18 at 9:35:32
HF image built for 2s30vq100 on 2018/ 9/ 3 at 21:40:23
[ Hardware ]
--= uC: AT91SAM7S512 Rev B
--= Embedded Processor: ARM7TDMI
--= Nonvolatile Program Memory Size: 512K bytes, Used: 339433 bytes (48%) Free
: 274855 bytes (52%)
--= Second Nonvolatile Program Memory Size: None
--= Internal SRAM Size: 64K bytes
--= Architecture Identifier: AT91SAM7Sxx Series
--= Nonvolatile Program Memory Type: Embedded Flash Memory
[usb] pm3 -->
Last edited by 3dmann (2019-06-23 11:53:22)
Offline
make sure you set the right target in the Makefile.platform file.
If you don't have a platform file, use the supplied sample file and follow the guide.
pm3 ~$ cp Makefile.platform.sample Makefile.platform
pm3 ~$ cat Makefile.platform.sample
# If you want to use it, copy this file as Makefile.platform and adjust it to your needs
PLATFORM=PM3RDV4
#PLATFORM_EXTRAS=BTADDON
#STANDALONE=LF_SAMYRUN
Offline
anyway this is all sidetracked from original post. Time to get back to topic.
Offline
Now I'll continue.
only see that? is there something wrong?
or is the good?[/b]
[b][usb] pm3 --> hf 14a sniff
#db# Starting to sniff[/b]
[b][usb] pm3 --> hf list mf
[+] Recorded Activity (TraceLen = 467 bytes)
[=]
Start = Start of Start Bit, End = End of last modulation. Src = Source of Transfer
iso14443a - All times are in carrier periods (1/13.56Mhz)[/b]
[b] Start | End | Src | Data (! denotes parity error) | CRC | Annotation
------------+------------+-----+-------------------------------------------------------------------------+-----+--------------------
0 | 0 | Rdr |00 | |
16843008 | 16843265 | Rdr |01 01 01 01 01 01 01 01 01 01 01 01 01 01 00 01 01 01 | |
| | |01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 | |
| | |01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 | |
| | |01 01 01 01 00 01 01 01 01 01 01 01 01 01 01 01 01 01 | |
| | |01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 | |
| | |01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 | |
| | |01 01 01 01 00 01 01 01 01 01 01 01 01 01 01 01 01 01 | |
| | |01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 | |
| | |01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 | |
| | |01 01 01 01 01 01 01 01 00 01 01 00 01 01 00 01 00 01 | |
| | |01 00 01 01 00 01 01 01 01 01 00 01 00 01 01 00 00 01 | |
| | |00 01 01 01 01 01 00 01 00 01 01 00 01 01 00 01 00 00 | |
| | |01 00 00 01 00 01 01 00 01 01 00 01 00 00 01 00 00 01 | |
| | |00 01 01 00 01 01 00 01 01 01 01 00 01 01 00 01 01 00 | |
| | |01 01 00 01 00 | |
[usb] pm3 -->[/b]
[b]b# Starting to sniff
b# maxDataLen=3, Uart.state=0, Uart.len=0
b# traceLen=618 , Uart.output[0]=000000e6
sb] pm3 --> hf list mf
] Recorded Activity (TraceLen = 618 bytes)
]
art = Start of Start Bit, End = End of last modulation. Src = Source of Transfe
o14443a - All times are in carrier periods (1/13.56Mhz)[/b]
[b]better now[/b]
[b] Start | End | Src | Data (! denotes parity error)
----------+------------+-----+-------------------------------------------------
0 | 992 | Rdr |52
10169952 | 10170944 | Rdr |52
10172196 | 10174564 | Tag |04 00
10220112 | 10222576 | Rdr |93 20
10223748 | 10229572 | Tag |19 2B 33 14
10282944 | 10293408 | Rdr |93 70 32 bf da 7a 2d 86 c3
10294644 | 10298164 | Tag |08 b6 dd
10344736 | 10349440 | Rdr |60 00 f5 7b
10354292 | 10356596 | Tag |aa 69!
10360368 | 10369744 | Rdr |65 a8 8e aa d0 0d 75 50
10370916 | 10374500 | Tag |5e! 91! f4
10399648 | 10404416 | Rdr |a7 9f dc d9
10405588 | 10410708 | Tag |19 2B 33 14 01
10411236 | 10411748 | Tag |00!
10412516 | 10419684 | Tag |5e 21 74! 9b 01 69 00!
10421540 | 10421860 | Tag |03!
10483456 | 10488224 | Rdr |2d 10 a4 0d
10489428 | 10491988 | Tag |5f! fd! 00!
10493460 | 10493908 | Tag |07
10567664 | 10572432 | Rdr |88 7f 90 69
10625392 | 10626448 | Rdr |26
10672352 | 10673344 | Rdr |52
10674612 | 10674996 | Tag |00!
10722512 | 10724976 | Rdr |93 20
10726180 | 10727460 | Tag |32
10785232 | 10795696 | Rdr |93 70 19 2B 33 14 2d 86 c3
10796948 | 10799636 | Tag |08 b6 01
10940960 | 10945728 | Rdr |60 04 d1 3d
10950516 | 10953844 | Tag |29 c2 02
10956576 | 10965952 | Rdr |b2 7a e3 e9 d3 88 dd 80
10967156 | 10971636 | Tag |43! ad 2f 0a!
10995984 | 11000688 | Rdr |18 0a b3 5d
11001956 | 11007588 | Tag |9f 96 c0 e4! 3d
11010788 | 11011300 | Tag |01
11018468 | 11018852 | Tag |00!
11079552 | 11084320 | Rdr |59 cc f7 e8
11085508 | 11088836 | Tag |cd 6d 0b
11090580 | 11090772 | Tag |01
11162352 | 11167120 | Rdr |4f df 79 d1
11168308 | 11170484 | Tag |4b! 3f!
11408464 | 11413168 | Rdr |ae 79 56 31
11418004 | 11418644 | Tag |07
11419540 | 11419796 | Tag |00!
11424080 | 11433456 | Rdr |cd 4c b7 97 68 b4 07 a6
11437652 | 11437844 | Tag |01
11438756 | 11439332 | Tag |0c!
11462080 | 11466784 | Rdr |e6 1b eb 56
11468036 | 11469060 | Tag |03!
11474980 | 11477156 | Tag |8c 04
11478788 | 11479044 | Tag |00!
11481684 | 11482004 | Tag |03!
sb] pm3 -->[/b]
[b][usb] pm3 --> hf 14a sniff c
#db# Starting to sniff
#db# maxDataLen=4, Uart.state=0, Uart.len=0
#db# traceLen=604 , Uart.output[0]=0000001b
[usb] pm3 --> hf list mf
[+] Recorded Activity (TraceLen = 604 bytes)
[=]
Start = Start of Start Bit, End = End of last modulation. Src = Source of Transfer
iso14443a - All times are in carrier periods (1/13.56Mhz)[/b]
[b] Start | End | Src | Data (! denotes parity error) | CRC | Annotation
------------+------------+-----+-------------------------------------------------------------------------+-----+--------------------
0 | 2368 | Tag |04 00 | |
38983420 | 38984412 | Rdr |52 | | WUPA
38985680 | 38988048 | Tag |04 00 | |
39033580 | 39036044 | Rdr |93 20 | | ANTICOLL
39037248 | 39037888 | Tag |02 | |
39096300 | 39106764 | Rdr |93 70 19 2B 33 14 2d 86 c3 | ok | SELECT_UID
39108000 | 39111520 | Tag |08 b6 dd | |
39158220 | 39162924 | Rdr |60 00 f5 7b | ok | AUTH-A(0)
39167760 | 39172432 | Tag |50 7e 70 6f | | AUTH: nt
39173836 | 39183148 | Rdr |76 30 19 2B 33 14 1f 68 | | AUTH: nr ar (enc)
39184416 | 39189152 | Tag |c9! 7e 2c! cc! | | AUTH: at (enc)
39213116 | 39217820 | Rdr |b3 b7 0d 3f | |
| | * | key a0a1a2a3a4a5 prng HARD | |
| | * |30 01 8B B9 | ok | READBLOCK(1)
39219088 | 39239888 | Tag |54! f5! c9 19 2B 33 14 1f! ee! 57! d6! d8! 43! 1c d3! f8! 1a da! | |
| | * |6F 01 51 90 51 90 00 00 00 00 00 00 00 00 00 00 0A 6D | ok |
39296940 | 39301708 | Rdr |39 cb 25 71 | |
| | * |30 02 10 8B | ok | READBLOCK(2)
39302896 | 39323760 | Tag |c3 f2! a0 2a! 64 67! fe 0b 13! 50 a6! bf 67! ee d2 48! 82! 51 | |
| | * |00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 37 49 | ok |
39381148 | 39385916 | Rdr |56 5c 6b 6a | |
| | * |50 00 57 CD | ok | HALT
39438860 | 39439916 | Rdr |26 | | REQA
39485836 | 39486828 | Rdr |52 | | WUPA
39488080 | 39490448 | Tag |04 00 | |
39535996 | 39538460 | Rdr |93 20 | | ANTICOLL
39539648 | 39545472 | Tag |19 2B 33 14 | |
39598700 | 39609164 | Rdr |93 70 19 2B 33 14 86 c3 | ok | SELECT_UID
39610416 | 39613936 | Tag |08 b6 dd | |
39754444 | 39759212 | Rdr |60 04 d1 3d | ok | AUTH-A(4)
39763968 | 39768704 | Tag |6a 17 35 51 | | AUTH: nt
39770060 | 39779372 | Rdr |7b 0b e6 19 2B 33 14 53 | | AUTH: nr ar (enc)
39780624 | 39785360 | Tag |ed! e4 0a! 7e! | | AUTH: at (enc)
39809468 | 39814236 | Rdr |9a ce c3 89 | |
| | * | key aa172DDD3967 prng HARD | |
| | * |30 07 BD DC | ok | READBLOCK(7)
39815408 | 39836208 | Tag |fa! 5f 78! 3f 19 2B 33 14 19 86! bf 5f e6 0b! 24 14! 02 29! | |
| | * |00 00 00 00 00 00 78 77 88 01 00 00 00 00 00 00 25 71 | ok |
39893036 | 39897804 | Rdr |e6 00 c1 71 | |
| | * |30 05 AF FF | ok | READBLOCK(5)
39898992 | 39919792 | Tag |09 00! 8f! 6b! 9a 27 b5! ab 43! bd! 1f c2 c4 83 e0 d7 1f 60 | |
| | * |88 00 16 0A 5C F7 F4 5E 0B 0C A4 FA EF D1 4B 48 1B F7 | ok |
39975820 | 39980524 | Rdr |d3 44 34 42 | |
| | * |30 04 26 EE | ok | READBLOCK(4)
39981792 | 40002656 | Tag |fa! e9! 2a!19 2B 33 14 96 b7! 2c! 36 72 38 ce 2d 06 a0 2c | |
| | * |B2 8A AB AB 8A 1E C4 E3 44 7D 86 91 EF 9A CE 91 13 E1 | ok |
40221932 | 40226700 | Rdr |7c 43 99 c2 | |
| | * |61 08 65 EE | ok | AUTH-B(8)
40231456 | 40236192 | Tag |19 2B 33 14 | | AUTH: nt (enc)
40237548 | 40246924 | Rdr |12 11 f8 ce 19 2B 33 14 | | AUTH: nr ar (enc)
40248112 | 40252848 | Tag |6d 81 7e! 6a! | | AUTH: at (enc)
40275676 | 40280444 | Rdr |1b 68 13 2f | |
hardnested not implemented. uid:19 2B 33 14 nt:19 2B 33 14 ar_enc:7f423560 at_enc:6d19 2B 33 14[/b]
[b] 40281648 | 40302512 | Tag |56 5a! d7 ee! 0f 319 2B 33 14 3b! 1c! b8 5a 36 ee! 13 a0 d0 | |
[usb] pm3 -->
Last edited by 3dmann (2019-06-23 11:57:52)
Offline
that output was better, don't you think?
I also suggest you use BBCode for formatting code. Or use a pastebin, for longer outputs. Doesn't mess up the forum flow.
Offline
OK I do that thanks for the tip
2 key
key ffff293e1167
key A0A1A2A3A4A5
Do not have to be Kay anymore?
Last edited by 3dmann (2019-06-23 11:58:15)
Offline
Now you have enough to get the rest of the keys and do a proper dump of your card. From there, well that is up to you.
Offline
could you give me a little advice to get the remaining key
What would you do now?
Offline
You need to figure out what it is that you want to do. Your first post is about sniffing and getting a key, which you now solved. Time to read more about Mifare classic. Datasheets, youtube videos, blogposts, https://github.com/Proxmark/proxmark3/wiki/Mifare-HowTo the already mentioned wiki has information.
Offline
Thanks iceman
I read a lot yesterday and now I have 30 of 32 key
Now only the last 2 key is missing
is that right that I need all 32 key?
or are there cards with 30 key?
ide last 2 kay are B
key where only ------------ stands
30 von 32 key
|---|----------------|---|----------------|---|
|sec|key A |res|key B |res|
|---|----------------|---|----------------|---|
|000| a0a1a2a3a4a5 | 1 | 0d333390296 | 1 |
|001| fff7293e1117 | 1 | ------------ | 0 | last 2 kay are B key where only ------------ stands ?
|002| a0a1a2a3a4a5 | 1 | ------------ | 0 |
|003| ffffffffffff | 1 | ffffffffffff | 1 |
|004| ffffffffffff | 1 | ffffffffffff | 1 |
|005| eeb420209d0c | 1 | eeb420ff9d0c | 1 |
|006| 911e52fd7ce4 | 1 | 911e52fd7ce4 | 1 |
|007| 752fbb5b7b45 | 1 | 752fbb5b7b45 | 1 |
|008| 66b03aca6ee9 | 1 | 66b03aca6ee9 | 1 |
|009| 48734389edc3 | 1 | 48734389edc3 | 1 |
|010| 17193709adf4 | 1 | 17193709adf4 | 1 |
|011| 1acc3189578c | 1 | 1acc3189578c | 1 |
|012| c2b7ec7d4eb1 | 1 | c2b7ec7d4eb1 | 1 |
|013| 369a4663acd2 | 1 | 369a4663acd2 | 1 |
|014| ffffffffffff | 1 | ffffffffffff | 1 |
|015| ffffffffffff | 1 | ffffffffffff | 1 |
|---|----------------|---|----------------|---|
[+] Printing keys to binary file hf-mf-19 2B 33 14-key.bin ...
-mf-19 2B 33 14-data.json
"Created": "proxmark3",
"FileType": "mfcard",
"blocks": {
"0": "19 2B 33 142D880400C823002000000018",
"1": "9F033390119000000000000000000000",
"2": "00000000000000000000000000000000",
"3": "A0A1A2A3A4A5787788C10D258FE90296",
"4": "B28AABAB8A1EC4E3447D8691EF9ACE91",
"5": "8800100A5CFffffffffffB0CA4FAEFD14B48",
"6": "F53553F04E3232B5DEE85647839900CA",
"7": "CA172ffff96778778801000000000000",
"8": "00000000000000000000000000000000",
"9": "00000000000000000000000000000000",
"10": "00000000000000000000000000000000",
"11": "A0A1A2A3A4A578778805000000000000",
"12": "00000000000000000000000000000000",
"13": "00000000000000000000000000000000",
"14": "00000000000000000000000000000000",
"15": "FFFFFFFFFFFFFF078069FFFFFFFFFFFF",
"16": "00000000000000000000000000000000",
"17": "00000000000000000000000000000000",
"18": "00000000000000000000000000000000",
"19": "FFFFFFFFFFFFFF078069FFFFFFFFFFFF",
"20": "00000000000000000000000000000000",
"21": "00000000000000000000000000000000",
"22": "00000000000000000000000000000000",
"23": "EEB420209D0C78778800EEB420209D0C",
"24": "00000000000000000000000000000000",
"25": "00000000000000000000000000000000",
"26": "00000000000000000000000000000000",
"27": "911E52FD7CE478778800911E52FD7CE4",
"28": "00000000000000000000000000000000",
"29": "00000000000000000000000000000000",
"30": "00000000000000000000000000000000",
"31": "752FBB5B7B4578778800752FBB5B7B45",
"32": "00000000000000000000000000000000",
"33": "00000000000000000000000000000000",
"34": "00000000000000000000000000000000",
"35": "66B03ACA6EE97877880066B03ACA6EE9",
"36": "00000000000000000000000000000000",
"37": "00000000000000000000000000000000",
"38": "00000000000000000000000000000000",
"39": "48734389EDC37877880048734389EDC3",
"40": "00000000000000000000000000000000",
"41": "00000000000000000000000000000000",
"42": "00000000000000000000000000000000",
"43": "17193709ADF47877880017193709ADF4",
"44": "00000000000000000000000000000000",
"45": "00000000000000000000000000000000",
"46": "00000000000000000000000000000000",
"47": "1ACC3189578C787788001ACC3189578C",
"48": "00000000000000000000000000000000",
"49": "00000000000000000000000000000000",
"50": "00000000000000000000000000000000",
"51": "C2B7EC7D4EB178778800C2B7EC7D4EB1",
"52": "00000000000000000000000000000000",
"53": "00000000000000000000000000000000",
"54": "00000000000000000000000000000000",
"55": "369A4663ACD278778800369A4663ACD2",
"56": "00000000000000000000000000000000",
"57": "00000000000000000000000000000000",
"58": "00000000000000000000000000000000",
"59": "FFFFFFFFFFFFFF078069FFFFFFFFFFFF",
"60": "00000000000000000000000000000000",
"61": "00000000000000000000000000000000",
"62": "00000000000000000000000000000000",
"63": "FFFFFFFFFFFFFF078069FFFFFFFFFFFF"
},
"Card": {
"UID": "33232333",
"SAK": "88",
"ATQA": "0400"
},
"
Last edited by 3dmann (2019-06-23 12:01:48)
Offline
In short, if you want the card to be a 100% clone you need everything 100% the same.
Quick high level overview.
Mifare classic cards come in a few sizes. depending on the size they will have X sectors (the tech sheets will tell you)
For each sector there are 2 keys, A and B as well as some data blocks and some permissions.
Now, we need to think about what the card is used for and how they do it. This will be 100% up to the system designers.
For example.
I could write an access system that could work as follows.
User walks up to a door access reader. Places the card on the reader and the card ID is read and sent to the back end.
The back end looks up the ID and makes a quick call (UID exists so continue or UID does not exist, so don't open the door)
If we continue, the back end then instructs the reader to read the data from block Y with key A.
The data is sent to the back end, and checked... Yes the data was correct.
The back end could then tell the reader to update the card with some new data and save back to block Y and write with Key B
(i.e. the permissions were set such that A could read and B could write)
Why would they do this... simple, by writing new data on every use, then a clone will only work once unless its re-cloned. and the original will fail if the clone is the new one, so it would need updating.
Do they do that ? thats up to the system developers.
So know that we know what they could do, it is up to you to find out what you need to know and how your system works.
e.g. Read the entire card. Use the card, re-read the card and compare to the first read. Did anything change ?
Next, if you think you have enough data/keys, then try it.
Offline
thanks mwalker
I have tried to read a lot of times but it always stays with
The access system is self-sufficient, it was programmed on-site there is a baterie included
So I have here 6 different chips for one and the same zutriets system and all Chip fählt the same B Key does not exist.
Is it because 2 B Key is not default_keys?
Are there any bigger key lists? I already have iceman from rdv40 + official + of course
Last edited by 3dmann (2019-06-12 17:25:37)
Offline
try running nested or hardnest attacks against the missing keys.
Offline
Thanks iceman with the hardnest attacks + nonces did it work now i have all the key now i want to write another chip with for data.
My main concern is that I can open the 3 doors with 1 chip to not always have to have all three chips
|---|----------------|---|----------------|---|
|sec|key A |res|key B |res|
|---|----------------|---|----------------|---|
|000| a0a1a2a3a4a5 | 1 | 0d258fe90296 | 1 |
|001| dd172fff3967 | 1 | abd42aa32e37 | 1 |
|002| a0a1a2a3a4a5 | 1 | abd42aa32e37 | 1 |
|003| ffffffffffff | 1 | ffffffffffff | 1 |
|004| ffffffffffff | 1 | ffffffffffff | 1 |
|005| eeb420209d0c | 1 | eeb420209d0c | 1 |
|006| 911e52fd7ce4 | 1 | 911e52fd7ce4 | 1 |
|007| 752fbb5b7b45 | 1 | 752fbb5b7b45 | 1 |
|008| 66b03aca6ee9 | 1 | 66b03aca6ee9 | 1 |
|009| 48734389edc3 | 1 | 48734389edc3 | 1 |
|010| 17193709adf4 | 1 | 17193709adf4 | 1 |
|011| 1acc3189578c | 1 | 1acc3189578c | 1 |
|012| c2b7ec7d4eb1 | 1 | c2b7ec7d4eb1 | 1 |
|013| 369a4663acd2 | 1 | 369a4663acd2 | 1 |
|014| ffffffffffff | 1 | ffffffffffff | 1 |
|015| ffffffffffff | 1 | ffffffffffff | 1 |
|---|----------------|---|----------------|---|
Last edited by 3dmann (2019-06-23 12:02:58)
Offline
restore function does not work with the chip as soon as I enter the correct UID with csetuid he writes only with errors, but with the wrong UID he writes correctly
What is this mistake?
[usb] pm3 --> hf sea
[=] Checking for known tags...
UID : 399 AA DA 9A
ATQA : 00 04
SAK : 08 [2]
TYPE : NXP MIFARE CLASSIC 1k | Plus 2k SL1 | 1k Ev1
[=] proprietary non iso14443-4 card found, RATS not supported
[=] Answers to magic commands: NO maybe that's why, how can I change that?or do I have to buy other chips
[+] Prng detection: HARD
[+] Valid ISO14443-A tag found
[usb] pm3 --> hf sea
[=] Checking for known tags...
UID : 399 AA DA 9A
ATQA : 00 04
SAK : 08 [2]
TYPE : NXP MIFARE CLASSIC 1k | Plus 2k SL1 | 1k Ev1
[=] proprietary non iso14443-4 card found, RATS not supported
[+] Answers to magic commands (GEN 1a): YES maybe that's why, how can I change that?or do I have to buy other chips
[+] Prng detection: WEAK
[+] Valid ISO14443-A tag found
Last edited by 3dmann (2019-06-23 12:03:45)
Offline
"...My main concern is that I can open the 3 doors with 1 chip to not always have to have all three chips..."
Are you saying you have three different mifare classic cards and want one to do the job of all three ?
this may or may not work.
On an original mifare card the UID (in block 0) is not changeable, and was intended to be different for every card (and they are moving to 7 or 10 byte UID over the old 4 byte UID).
So assuming your cards are all 4 byte mifare classic, I would expect them all to have different UIDs.
and while I don't know how your access system works, I would expect the UID will play a part in that.
(e.g. some systems only use the uid, others are more secure).
If the system uses the UID then it may not work. On the other hand, if it simply uses the UID for card selection and uses the data in the blocks/sectors for access control (i.e. UID is not validated) then as long as each access card stores data in different sectors, it could work.
You need to work on a plan to turn the unknown into knows.
e.g. Work with each card one by one. make a clone of card A and check that it works (this will ensure you have everything needed for card A), then repeat for Card B and C. If all goes well you will then know you have all the bits for a single card copy.
Next, check if all three cards use different sectors to store the data, if they overlap, is it the same data and keys (and permissions).
Then create a card with all the different sectors and one of the UIDs and see if it works.
Key Note: The UID is not meant to be changeable. the csetuid (and other c commands) are for the magic cards and not normal mifare cards. Iceman posted about the different types of cards and the functions.
Offline
There is a mastercard in the house with access to all rooms, so it can not be alone from the UID.
however, the command restore only works as long as it was the first time.
the second repeated times the on the same card I get errors and
the door does not open
although the data are identical except for the UID
Are there other options ?
the programmer was connected to the lock of the door with a cable and there were 3 chips per room
The locks for the door were newly installed only 3 months ago
Last edited by 3dmann (2019-06-13 01:15:03)
Offline
My comment was more around how the security system works. e.g. the back end could say
UID 12345678 can access door 1,2 and 3 <- All based on the UID and a back end database
UID aabbccdd can access door 1
UID 11223344 can access door 2
UID 55667788 can access door 3
if that is the case, then you would need the back end to allow the single UID to access all 3 doors, as IF it is based on UID then you cant make 1 card have 3 UID (but one UID could access more then one door)
if everything is 100% the same BUT the UID then it is linked to the UID (in part at least)
[=] Answers to magic commands: NO : This means the card does not appear to be a gen1/magic card, so the csetuid wont work.
Answers to magic commands (GEN 1a): YES : This means the card does work with csetuid.
There are many types of cards. if its not a magic card then the csetuid wont work.
If its a CUID then it may allow block 0 to be change via the normal block write command.
if its a FUID then it may allow block 0 to be changed BUT ONLY ONCE
For the card you say only allowed the UID to be changed once. Can you re-run the hf search and post.
Offline
Original chip
[usb] pm3 --> hf sea
[=] Checking for known tags...
UID : 399 AA DA 9A
ATQA : 00 04
SAK : 08 [2]
TYPE : NXP MIFARE CLASSIC 1k | Pl
[=] proprietary non iso14443-4 ca
[=] Answers to magic commands: NO
[+] Prng detection: HARD
[+] Valid ISO14443-A tag found
|sec|key A |res|key B |res|
|---|----------------|---|----------------|---|
|000| a0a1a2a3a4a5 | 1 | 0d258fe90296 | 1 |
|001| daddd93e1117 | 1 | abd333350e11 | 1 |
|002| a0a1a2a3a4a5 | 1 | abd333350e11 | 1 |
|003| ffffffffffff | 1 | ffffffffffff | 1 |
|004| ffffffffffff | 1 | ffffffffffff | 1 |
|005| eeb420209d0c | 1 | eeb420209d0c | 1 |
|006| 911e52fd7ce4 | 1 | 911e52fd7ce4 | 1 |
|007| 752fbb5b7b45 | 1 | 752fbb5b7b45 | 1 |
|008| 66b03aca6ee9 | 1 | 66b03aca6ee9 | 1 |
|009| 48734389edc3 | 1 | 48734389edc3 | 1 |
|010| 17193709adf4 | 1 | 17193709adf4 | 1 |
|011| 1acc3189578c | 1 | 1acc3189578c | 1 |
|012| c2b7ec7d4eb1 | 1 | c2b7ec7d4eb1 | 1 |
|013| 369a4663acd2 | 1 | 369a4663acd2 | 1 |
|014| ffffffffffff | 1 | ffffffffffff | 1 |
|015| ffffffffffff | 1 | ffffffffffff | 1 |
|---|----------------|---|----------------|---|
hf-mf-399 AA DA 9A-data.json
{
"Created": "proxmark3",
"FileType": "mfcard",
"blocks": {
"0": "399AADA9A2D880400C823002000000018",
"1": "9F01DDDD519000000000000000000000",
"2": "00000000000000000000000000000000",
"3": "A0A1A2A3A4A5787788C10D2aaaa90296",
"4": "B28AABAB8A1EC4E3447D863245ACE91",
"5": "8800162342F7F45E0B0CA4FAEFD14B48",
"6": "F53553F04E542BB5DEE85fffff0000CA",
"7": "CA17293E396778778801ABD4aaaa0E37",
"8": "00000000000000000000000000000000",
"9": "00000000000000000000000000000000",
"10": "00000000000000000000000000000000",
"11": "A0A1A2A3A4A578778805ABD42DD50E37",
"12": "00000000000000000000000000000000",
"13": "00000000000000000000000000000000",
"14": "00000000000000000000000000000000",
"15": "FFFFFFFFFFFFFF078069FFFFFFFFFFFF",
"16": "00000000000000000000000000000000",
"17": "00000000000000000000000000000000",
"18": "00000000000000000000000000000000",
"19": "FFFFFFFFFFFFFF078069FFFFFFFFFFFF",
"20": "00000000000000000000000000000000",
"21": "00000000000000000000000000000000",
"22": "00000000000000000000000000000000",
"23": "EEB420209D0C78778800EEB420209D0C",
"24": "00000000000000000000000000000000",
"25": "00000000000000000000000000000000",
"26": "00000000000000000000000000000000",
"27": "911E52FD7CE478778800911E52FD7CE4",
"28": "00000000000000000000000000000000",
"29": "00000000000000000000000000000000",
"30": "00000000000000000000000000000000",
"31": "752FBB5B7B4578778800752FBB5B7B45",
"32": "00000000000000000000000000000000",
"33": "00000000000000000000000000000000",
"34": "00000000000000000000000000000000",
"35": "66B03ACA6EE97877880066B03ACA6EE9",
"36": "00000000000000000000000000000000",
"37": "00000000000000000000000000000000",
"38": "00000000000000000000000000000000",
"39": "48734389EDC37877880048734389EDC3",
"40": "00000000000000000000000000000000",
"41": "00000000000000000000000000000000",
"42": "00000000000000000000000000000000",
"43": "17193709ADF47877880017193709ADF4",
"44": "00000000000000000000000000000000",
"45": "00000000000000000000000000000000",
"46": "00000000000000000000000000000000",
"47": "1ACC3189578C787788001ACC3189578C",
"48": "00000000000000000000000000000000",
"49": "00000000000000000000000000000000",
"50": "00000000000000000000000000000000",
"51": "C2B7EC7D4EB178778800C2B7EC7D4EB1",
"52": "00000000000000000000000000000000",
"53": "00000000000000000000000000000000",
"54": "00000000000000000000000000000000",
"55": "369A4663ACD278778800369A4663ACD2",
"56": "00000000000000000000000000000000",
"57": "00000000000000000000000000000000",
"58": "00000000000000000000000000000000",
"59": "FFFFFFFFFFFFFF078069FFFFFFFFFFFF",
"60": "00000000000000000000000000000000",
"61": "00000000000000000000000000000000",
"62": "00000000000000000000000000000000",
"63": "FFFFFFFFFFFFFF078069FFFFFFFFFFFF"
},
"Card": {
"UID": "399AADA9",
"SAK": "88",
"ATQA": "0400"
},
"SectorKeys": {
"0": {
"KeyA": "A0A1A2A3A4A5",
"KeyB": "0D258ffff299",
"AccessConditions": "787788C1",
"AccessConditionsText": {
"block0": "rdAB wrB",
"block1": "rdAB wrB",
"block2": "rdAB wrB",
"block3": "wrAbyB rdCbyAB wrCbyB wrBbyB",
"UserData": "C1"
}
Copy chip
[usb] pm3 --> hf sea
[=] Checking for known tags...
UID : 399AADA9
ATQA : 00 04
SAK : 08 [2]
TYPE : NXP MIFARE CLASSIC 1k | Plus 2k SL1 | 1k Ev1
[=] proprietary non iso14443-4 card found, RATS not supported
[=] Answers to magic commands: NO
[+] Prng detection: WEAK
[+] Valid ISO14443-A tag found
I have to buy reasonable chips can you recommend me on ebay?
Last edited by 3dmann (2019-06-23 12:07:35)
Offline
[usb] pm3 --> hf sea
[=] Checking for known tags...
UID : A1 41 A7 55
ATQA : 00 04
SAK : 08 [2]
TYPE : NXP MIFARE CLASSIC 1k | Plus 2k SL1 | 1k Ev1
[=] proprietary non iso14443-4 card found, RATS not supported
[=] Answers to magic commands: NO
[+] Prng detection: WEAK
[+] Valid ISO14443-A tag found
[usb] pm3 --> hf mf fchk 1 default_keys.dic
[+] Loaded 779 keys from default_keys.dic
[+] Running strategy 1
#db# Cmd Error: 04
#db# Cmd Error: 04
#db# Cmd Error: 04
#db# Cmd Error: 04
#db# Cmd Error: 04
#db# Cmd Error: 04
#db# Cmd Error: 04
#db# Cmd Error: 04
#db# Cmd Error: 04
#db# Cmd Error: 04
....
[+] Chunk: 10.0s | found 13/32 keys (85)
[+] Chunk: 0.7s | found 13/32 keys (85)
#db# Cmd Error: 04
#db# Cmd Error: 04
#db# Cmd Error: 04
#db# Cmd Error: 04
#db# Cmd Error: 04
#db# Cmd Error: 04
#db# Cmd Error: 04
#db# Cmd Error: 04
#db# Cmd Error: 04
[+] Chunk: 5.6s | found 32/32 keys (85)
[+] Time in checkkeys (fast): 16.3s
|---|----------------|---|----------------|---|
|sec|key A |res|key B |res|
|---|----------------|---|----------------|---|
|000| a0a1a2a3a4a5 | 1 | 0d258fe90296 | 1 |
|001| ca1432342967 | 1 | abdfffd50e37 | 1 |
|002| a0a1a2a3a4a5 | 1 | abdfffd50e37 | 1 |
|003| ffffffffffff | 1 | ffffffffffff | 1 |
|004| ffffffffffff | 1 | ffffffffffff | 1 |
|005| eeb420209d0c | 1 | eeb420209d0c | 1 |
|006| 911e52fd7ce4 | 1 | 911e52fd7ce4 | 1 |
|007| 752fbb5b7b45 | 1 | 752fbb5b7b45 | 1 |
|008| 66b03aca6ee9 | 1 | 66b03aca6ee9 | 1 |
|009| 48734389edc3 | 1 | 48734389edc3 | 1 |
|010| 17193709adf4 | 1 | 17193709adf4 | 1 |
|011| 1acc3189578c | 1 | 1acc3189578c | 1 |
|012| c2b7ec7d4eb1 | 1 | c2b7ec7d4eb1 | 1 |
|013| 369a4663acd2 | 1 | 369a4663acd2 | 1 |
|014| ffffffffffff | 1 | ffffffffffff | 1 |
|015| ffffffffffff | 1 | ffffffffffff | 1 |
|---|----------------|---|----------------|---|
[usb] pm3 -->
hf mf dump
#db# Cmd Error: 04
#db# Read block error
#db# Cmd Error: 04
#db# Read block error
#db# Cmd Error: 04
#db# Read block error
#db# Cmd Error: 04
#db# Read block error
#db# Cmd Error: 04
#db# Read block error
#db# Cmd Error: 04
#db# Read block error
#db# Cmd Error: 04
#db# Read block error
#db# Cmd Error: 04
#db# Read block error
#db# Cmd Error: 04
#db# Read block error
[-] could not read block 0 of sector 14
#db# Cmd Error: 04
#db# Read block error
#db# Cmd Error: 04
#db# Read block error
#db# Cmd Error: 04
#db# Read block error
#db# Cmd Error: 04
#db# Read block error
#db# Cmd Error: 04
#db# Read block error
#db# Cmd Error: 04
#db# Read block error
#db# Cmd Error: 04
#db# Read block error
#db# Cmd Error: 04
#db# Read block error
#db# Cmd Error: 04
#db# Read block error
#db# Cmd Error: 04
#db# Read block error
[-] could not read block 0 of sector 15
[+] time: 67 seconds
[+] Succeded in dumping all blocks
[+] saved 1024 bytes to binary file hf-mf-A1 41 A7 55-data-2.bin
[+] saved 64 blocks to text file hf-mf-A1 41 A7 55-data-2.eml
[+] saved to json file hf-mf-A1 41 A7 55-data-2.json
[usb] pm3 -->
chip ist fehlerhaft
I've ordered the first time now see if the are good?
https://www.ebay.de/itm/4-x-NFC-Tag-mit-MIFARE-Classic-Chip-Schlüsselanhänger-Android-NFC-1k/331810678718?ssPageName=STRK%3AMEBIDX%3AIT&_trksid=p2060353.m2749.l2649
Last edited by 3dmann (2019-06-23 12:09:38)
Offline
Have learned a lot from you thanks for that
first card works perfectly
Now I would like to expand the access to my 2 rooms
I have now compared the file
Now I compare room 1 to room 2 for comparison in the data.json
and see what's different
"Created": "proxmark3",
"FileType": "mfcard",
"blocks": {
"0": "E3447D862D880400C823002000000018",
"1": "63232190229000000000000000000000",
"2": "00000000000000000000000000000000",
"3": "A0A1A2A3A4A5787788C10D258FE90296",
"4": "B28AABAB8A1EC4f35d127991EF9ACE91",
"5": "880016125CF7F45E0B0CA4FAEFD14B48",
"6": "F53553F04E542BDDDDD5647830000CA",
"7": "CA17293E396778778801ABD42DD50E37",
"8": "00000000000000000000000000000000",
"9": "00000000000000000000000000000000",
"10": "00000000000000000000000000000000",
"11": "A0A1A2A3A4A578778805ABD42DD50E37",
--------------------------------------------------------------
"Created": "proxmark3",
"FileType": "mfcard",
"blocks": {
"0": "E3447D8AFC880400C823002000000018",
"1": "9F000000519000000000000000000000",
"2": "00000000000000000000000000000000",
"3": "A0A1A2A3A4A5787788C10D258FE90296",
"4": "47949CB2A4A0968F3AEDffffff0991DF",
"5": "1500160A5CF7F45E0B0CA4FAEFD14B48",
"6": "F53553F04E542E3447D86E856470000CA",
"7": "98F73A04432978778801E8D6223ACB49",
"8": "00000000000000000000000000000000",
"9": "00000000000000000000000000000000",
"10": "00000000000000000000000000000000",
"11": "A0A1A2A3A4A578778805E8D6223ACB49",
Last edited by 3dmann (2019-06-23 12:12:01)
Offline
Pages: 1