Research, development and trades concerning the powerful Proxmark3 device.
Remember; sharing is caring. Bring something back to the community.
"Learn the tools of the trade the hard way." +Fravia
You are not logged in.
Time changes and with it the technology
Proxmark3 @ discord
Users of this forum, please be aware that information stored on this site is not private.
I've been trying to clone this mifare card for a very long time. I can't seem to find any keys at all and don't know what to do...
Prox/RFID mark3 RFID instrument
bootrom: iceman/master/v1.1.0-1743-g1772cf8 2016-12-27 03:46:28
os: iceman/master/v1.1.0-1743-g1772cf8 2016-12-27 03:46:33
LF FPGA image built for 2s30vq100 on 2015/03/06 at 07:38:04
HF FPGA image built for 2s30vq100 on 2015/11/ 2 at 9: 8: 8
uC: AT91SAM7S256 Rev B
Embedded Processor: ARM7TDMI
Nonvolatile Program Memory Size: 256K bytes. Used: 216090 bytes (82). Free: 46054 bytes (18).
Second Nonvolatile Program Memory Size: None
Internal SRAM Size: 64K bytes
Architecture Identifier: AT91SAM7Sxx Series
Nonvolatile Program Memory Type: Embedded Flash Memory
pm3 --> hf mf chk *1 ? t
No key specified, trying default keys
key[ 0] ffffffffffff
key[ 1] 000000000000
key[ 2] a0a1a2a3a4a5
key[ 3] b0b1b2b3b4b5
key[ 4] aabbccddeeff
key[ 5] 4d3a99c351dd
key[ 6] 1a982c7e459a
key[ 7] d3f7d3f7d3f7
key[ 8] 714c5c886e97
key[ 9] 587ee5f9350f
key[10] a0478cc39091
key[11] 533cb6c723f6
key[12] 8fd0a4f256e9
................................
Time in checkkeys: 19624 ticks 19 seconds
testing to read key B...
Reading block 63
#db# Can't select card
#db# READ BLOCK FINISHED
|---|----------------|---|----------------|---|
|sec|key A |res|key B |res|
|---|----------------|---|----------------|---|
|000| ffffffffffff | 0 | ffffffffffff | 0 |
|001| ffffffffffff | 0 | ffffffffffff | 0 |
|002| ffffffffffff | 0 | ffffffffffff | 0 |
|003| ffffffffffff | 0 | ffffffffffff | 0 |
|004| ffffffffffff | 0 | ffffffffffff | 0 |
|005| ffffffffffff | 0 | ffffffffffff | 0 |
|006| ffffffffffff | 0 | ffffffffffff | 0 |
|007| ffffffffffff | 0 | ffffffffffff | 0 |
|008| ffffffffffff | 0 | ffffffffffff | 0 |
|009| ffffffffffff | 0 | ffffffffffff | 0 |
|010| ffffffffffff | 0 | ffffffffffff | 0 |
|011| ffffffffffff | 0 | ffffffffffff | 0 |
|012| ffffffffffff | 0 | ffffffffffff | 0 |
|013| ffffffffffff | 0 | ffffffffffff | 0 |
|014| ffffffffffff | 0 | ffffffffffff | 0 |
|015| ffffffffffff | 1 | ffffffffffff | 0 |
|---|----------------|---|----------------|---|
Found keys have been transferred to the emulator memory
pm3 -->
Offline
Seems like you found 1 key. Now you can try a nested attack or if it doesn't work a hardnested attack.
Last edited by gator96100 (2016-12-30 21:49:02)
Offline
I think my scanner wasn't working correctly I ran it again with another one i have and got
No key specified, trying default keys
key[ 0] ffffffffffff
key[ 1] 000000000000
key[ 2] a0a1a2a3a4a5
key[ 3] b0b1b2b3b4b5
key[ 4] aabbccddeeff
key[ 5] 4d3a99c351dd
key[ 6] 1a982c7e459a
key[ 7] d3f7d3f7d3f7
key[ 8] 714c5c886e97
key[ 9] 587ee5f9350f
key[10] a0478cc39091
key[11] 533cb6c723f6
key[12] 8fd0a4f256e9
Time in checkkeys: 24862 ticks 25 seconds
testing to read key B...
Reading block 59
#db# READ BLOCK FINISHED
Data:FF FF FF FF FF FF
|---|----------------|---|----------------|---|
|sec|key A |res|key B |res|
|---|----------------|---|----------------|---|
|000| ffffffffffff | 1 | ffffffffffff | 1 |
|001| ffffffffffff | 0 | ffffffffffff | 0 |
|002| ffffffffffff | 0 | ffffffffffff | 0 |
|003| ffffffffffff | 0 | ffffffffffff | 0 |
|004| ffffffffffff | 0 | ffffffffffff | 0 |
|005| ffffffffffff | 0 | ffffffffffff | 0 |
|006| ffffffffffff | 0 | ffffffffffff | 0 |
|007| ffffffffffff | 0 | ffffffffffff | 0 |
|008| ffffffffffff | 0 | ffffffffffff | 0 |
|009| ffffffffffff | 0 | ffffffffffff | 0 |
|010| ffffffffffff | 0 | ffffffffffff | 0 |
|011| ffffffffffff | 0 | ffffffffffff | 0 |
|012| ffffffffffff | 0 | ffffffffffff | 0 |
|013| ffffffffffff | 0 | ffffffffffff | 0 |
|014| ffffffffffff | 1 | ffffffffffff | 1 |
|015| ffffffffffff | 1 | ffffffffffff | 1 |
|---|----------------|---|----------------|---|
I then ran this command:
hf mf hardnested 0 a ffffffffffff 4 a w
which gave me
Acquiring nonces...
Writing acquired nonces to binary file nonces.bin
Checking for Filter Flip Properties...
Acquired 1344 nonces ( 1327/ 5000 with distinct bytes 0,1). Bytes with probability for correctly guessed Sum(a8) > 95.0%: 0
Acquired 1568 nonces ( 1549/ 5000 with distinct bytes 0,1). Bytes with probability for correctly guessed Sum(a8) > 95.0%: 0
Acquired 2016 nonces ( 1986/ 5000 with distinct bytes 0,1). Bytes with probability for correctly guessed Sum(a8) > 95.0%: 0
Acquired 2576 nonces ( 2528/ 5000 with distinct bytes 0,1). Bytes with probability for correctly guessed Sum(a8) > 95.0%: 0
Acquired 3024 nonces ( 2962/ 5000 with distinct bytes 0,1). Bytes with probability for correctly guessed Sum(a8) > 95.0%: 1
Acquired 3584 nonces ( 3494/ 5000 with distinct bytes 0,1). Bytes with probability for correctly guessed Sum(a8) > 95.0%: 1
Acquired 4032 nonces ( 3908/ 5000 with distinct bytes 0,1). Bytes with probability for correctly guessed Sum(a8) > 95.0%: 0
Acquired 4592 nonces ( 4425/ 5000 with distinct bytes 0,1). Bytes with probability for correctly guessed Sum(a8) > 95.0%: 0
Acquired 5040 nonces ( 4845/ 5000 with distinct bytes 0,1). Bytes with probability for correctly guessed Sum(a8) > 95.0%: 0
Acquired 5600 nonces ( 5363/10000 with distinct bytes 0,1). Bytes with probability for correctly guessed Sum(a8) > 95.0%: 1
Acquired 6048 nonces ( 5766/10000 with distinct bytes 0,1). Bytes with probability for correctly guessed Sum(a8) > 95.0%: 1
Acquired 6608 nonces ( 6280/10000 with distinct bytes 0,1). Bytes with probability for correctly guessed Sum(a8) > 95.0%: 1
Acquired 7056 nonces ( 6678/10000 with distinct bytes 0,1). Bytes with probability for correctly guessed Sum(a8) > 95.0%: 1
Acquired 7504 nonces ( 7082/10000 with distinct bytes 0,1). Bytes with probability for correctly guessed Sum(a8) > 95.0%: 1
Acquired 8064 nonces ( 7574/10000 with distinct bytes 0,1). Bytes with probability for correctly guessed Sum(a8) > 95.0%: 1
Acquired 8512 nonces ( 7969/10000 with distinct bytes 0,1). Bytes with probability for correctly guessed Sum(a8) > 95.0%: 0
Acquired 9072 nonces ( 8465/10000 with distinct bytes 0,1). Bytes with probability for correctly guessed Sum(a8) > 95.0%: 0
Acquired 9520 nonces ( 8848/10000 with distinct bytes 0,1). Bytes with probability for correctly guessed Sum(a8) > 95.0%: 1
Acquired 10080 nonces ( 9329/10000 with distinct bytes 0,1). Bytes with probability for correctly guessed Sum(a8) > 95.0%: 1
Acquired 10528 nonces ( 9697/10000 with distinct bytes 0,1). Bytes with probability for correctly guessed Sum(a8) > 95.0%: 3
Generating crypto1 state candidates...
Number of possible keys with Sum(a0) = 136: 16937635385344 (2^43.9)
Number of remaining possible keys: 720083200 (2^29.4)
Brute force phase starting.
Using 128-bit bitslices
Bitslicing best_first_byte^uid[3] (rollback byte): 14 ...
Bitslicing nonces...
Starting 4 cracking threads to search 8 buckets containing a total of 720083200 states...
but then it crashed. I'm using your latest compile of icemans fork on a windows 10 pc.
Last edited by ericlam2728 (2016-12-31 00:29:12)
Offline
first run "hf mf mifare" to verify that your tag has the newer prng and needs the hardnested attack.
Second, try "hf mf dbg 3" (or 4) to see more messages when running the nested attack.
Offline
Subject says "Mifare 1k plus". If this is correct, then hf mf mifare and hf mf nested will not work.
Mifare Plus chips can be configured in one of 4 possible Security Levels (SL0 to SL3):
SL0: initial state. Accepts personalization commands only (and the command to switch to SL1).
SL1: Mifare Classic EV1 compatibility. An additional authentication with an 128 Bit AES key can be performed but is not required. hf mf hardnested should work.
SL2: The additional authentication with an 128Bit AES key is mandatory before Mifare Classic commands can be used
SL3: Mifare Plus command set and ISO14443-4 protocol only.
You didn't tell us in which Security Level your Mifare Plus chip is configured? If in doubt, try hf 14a reader.
Offline
When I use the search command I get:
UID : 4b b4 d9 49
ATQA : 00 04
SAK : 08 [2]
TYPE : NXP MIFARE CLASSIC 1k | Plus 2k SL1
proprietary non iso14443-4 card found, RATS not supported
Answers to chinese magic backdoor commands: NO
Valid ISO14443A Tag Found - Quiting Search
When I try using a normal nested/darkside command it returns
Card is not vulnerable to Darkside attack (its random number generator is not predictable).
Offline
if you have one key, you can try and use the hardnested attack
Offline
look like Mifare function only try out known passwords. Am I correct?
Last edited by Go_tus (2017-02-09 19:49:35)
Offline