Research, development and trades concerning the powerful Proxmark3 device.
Remember; sharing is caring. Bring something back to the community.
"Learn the tools of the trade the hard way." +Fravia
You are not logged in.
Time changes and with it the technology
Proxmark3 @ discord
Users of this forum, please be aware that information stored on this site is not private.
Pages: 1
hi all,
i got some nice mifare classic ev1 (i think it was) to play with today.
(i m sure to get is one more time to play with)
i was a bit in hurry today and missed some things which i cant read on tuts while i was there. long story short...
not sure if my procedure was correct but after i read the card with some 4 byte uid it showed on bottom "this card is hardened" (or something similar)
i cant remeber exactly my next step but the ouput was a0a1a2a3a4a5 all over in "a" sector and "b" sector was simliar except it used "b" instead of "a".
then i tried
hf mf hardnested 1 0 a a0a1a2a3a4a5
after a minute or so it spits out "brute force phase completed. key found: 112233445566 (not the real one )
is there any scenario with a wrong keyoutput?
if the found key is correct what comes next?
can i clone the card somehow or let pm3 simulate it?
sorry for my questions but i totally stuck at this point. thanks for help!
Offline
The improved hardnested should never output a wrong key. It should verify key with a authentication.
The process is the same as for any mifare classic dump. First get all keys, then dump. There is a lot of blogs and even the wiki have a nice little piece on Mifare, if you take time to have a look on it...
Offline
Pages: 1