Proxmark3 community

Research, development and trades concerning the powerful Proxmark3 device.

Remember; sharing is caring. Bring something back to the community.


"Learn the tools of the trade the hard way." +Fravia

You are not logged in.

Announcement

Time changes and with it the technology
Proxmark3 @ discord

Users of this forum, please be aware that information stored on this site is not private.

#1 2015-03-22 13:41:35

jonsbun
Member
Registered: 2015-03-22
Posts: 2

Research work on Mifare Classic

Hello,

I am writing my master thesis about Mifare Classic cards security but I am a little bit upset about some things.
Maybe you can explain main different between old Mifare Classic and new card with 7 bytes UID?
However, how can I know what type Mifare Classic card I have? With my reader like SLC3711, Proxmark3 or ACR122U I can see only card is 4k or 1K but I don't know this card is new or old type...
This question related with nestted atack because I can't dump some Mifare 4K card which has some default KEY A and KEY B. But I know that this attack should dump Mifare Classic card if some sectors using default and well know KEY A and KEY B.

For example card like show below (/ - A Key found, x - both Key found, . - no default Key):
[Key: ffffffffffff] -> […………….xxxxxxxxxxxxxxxxxxxxxxxx]
[Key: a0a1a2a3a4a5] -> [/……………xxxxxxxxxxxxxxxxxxxxxxxx]
[Key: d3f7d3f7d3f7] -> [/……………xxxxxxxxxxxxxxxxxxxxxxxx]
[Key: 000000000000] -> [/……………xxxxxxxxxxxxxxxxxxxxxxxx]
[Key: b0b1b2b3b4b5] -> [/……………xxxxxxxxxxxxxxxxxxxxxxxx]
[Key: 4d3a99c351dd] -> [/……………xxxxxxxxxxxxxxxxxxxxxxxx]
[Key: 1a982c7e459a] -> [/……………xxxxxxxxxxxxxxxxxxxxxxxx]
[Key: aabbccddeeff] -> [/……………xxxxxxxxxxxxxxxxxxxxxxxx]
[Key: 714c5c886e97] -> [/……………xxxxxxxxxxxxxxxxxxxxxxxx]
[Key: 587ee5f9350f] -> [/……………xxxxxxxxxxxxxxxxxxxxxxxx]
[Key: a0478cc39091] -> [/……………xxxxxxxxxxxxxxxxxxxxxxxx]
[Key: 533cb6c723f6] -> [/……………xxxxxxxxxxxxxxxxxxxxxxxx]
[Key: 8fd0a4f256e9] -> [/……………xxxxxxxxxxxxxxxxxxxxxxxx]

Offline

#2 2015-03-22 16:22:19

joe
Contributor
Registered: 2013-08-15
Posts: 126

Re: Research work on Mifare Classic

" It should be pointed out quite early that the proxmark3 is not really for beginners. If you are not already fairly familiar with electronics, embedded programming, some RF design and ISO standards, this device will probably bring you more frustration than anything else ! Users that do not understand the basic principles behind RFID may have difficulty using the device. "

Offline

#3 2015-03-23 13:25:45

J-Run
Contributor
Registered: 2014-11-13
Posts: 24

Re: Research work on Mifare Classic

The main difference between "old" and "new" cards is fixed PRNG, that makes impossible nested and darkside attacks. UID length is indirect sign of new kind of cards, cause of mifare 1k with 4 byte uid and fixed PRNG are exist.

Offline

#4 2015-04-04 18:38:24

jonsbun
Member
Registered: 2015-03-22
Posts: 2

Re: Research work on Mifare Classic

J-Run wrote:

The main difference between "old" and "new" cards is fixed PRNG, that makes impossible nested and darkside attacks. UID length is indirect sign of new kind of cards, cause of mifare 1k with 4 byte uid and fixed PRNG are exist.

Where I can find more information about this change? Maybe because Crypto-1 is close source this is only what I can know about it?

Offline

Board footer

Powered by FluxBB