Research, development and trades concerning the powerful Proxmark3 device.
Remember; sharing is caring. Bring something back to the community.
"Learn the tools of the trade the hard way." +Fravia
You are not logged in.
Time changes and with it the technology
Proxmark3 @ discord
Users of this forum, please be aware that information stored on this site is not private.
Pages: 1
Hello all
Just have in hands a strange tag... looks like a old Mifare Classic 1k, but when reading it:
proxmark3> hf 14a info
UID : xx xx xx xx
ATQA : 00 10
SAK : 81 [2]
proprietary non iso14443-4 card found, RATS not supported
No chinese magic backdoor command detected
Prng detection: WEAK
Of course, hf mf commands seems to not work (I don't know keys).
Can it be a classic Mifare with fake announcment, but wanting normal Mifare communication ?
Offline
fudan clone?
check your trace list when doing a auth req. See if the nonce is fixed.
Offline
Prng detection gives a result. Mifare authentication commands therefore work. Try 'hf mf mifare' to retrieve a key.
Offline
@ iceman, I don't know about it, it seems an original from a known manufacturer for entry doors (Noralsy)
(and I can not test it against the original reader)
@ piwi, yeah \o/ it worked, thanks to it I was able to dump 3 sectors, because of the behavior when attacking others, I suspect it's only 192 bytes...
Last edited by gentilkiwi (2019-03-07 19:20:19)
Offline
It's even worse... readed data are 192 bytes, but effective data seems to be 48 bytes
Datas are repeated, and trailers do not seems to be coherent, even with keys used to read it...:
Fake data readed from sector 0 (for example):
data : xx xx xx xx cc 81 10 00 xx xx xx xx cc 81 10 00
data : xx xx xx xx cc 81 10 00 xx xx xx xx cc 81 10 00
data : aa bb 00 00 00 00 00 00 aa bb 00 00 00 00 00 00
trailer: aa bb 00 00 00 00 00 00 aa bb 00 00 00 00 00 00
So, effective data seems to be:
xx xx xx xx cc 81 10 00 aa bb 00 00 00 00 00 00
Same behavior for 2 others sectors...
Did you already seen that?
Last edited by gentilkiwi (2019-03-07 19:23:28)
Offline
I would assume that you see the contents of block 0 and block 2, but each of them twice.
Usually such strange behaviour results from mixing different versions of client software (on your PC) and firmware (flashed on Proxmark). Please try to update to a common version/release.
Offline
I just flashed to the latest one FW/client (official)
bootrom: master/v3.1.0-70-g1338d24-suspect 2019-03-04 13:25:10
os: master/v3.1.0-70-g1338d24-suspect 2019-03-04 13:25:13
fpga_lf.bit built for 2s30vq100 on 2015/03/06 at 07:38:04
fpga_hf.bit built for 2s30vq100 on 2019/02/15 at 20:40:32
SmartCard Slot: not available
And exactly same results
Offline
and we are back to the "is it a fudan clone?" or maybe even aztec http://www.proxmark.org/forum/viewtopic.php?id=4456
Offline
How can I verify it without original read/auth ?
No answer to: 'hf 14a raw -s -c -p 10 03 00' (or equ.)
Offline
Hm, do you have a picture of the tag?
Offline
Can you please read block by block (hf mf rdbl, block 0 to 3, all same keys A or B) and post the result?
Offline
I've made all the test (results in another PC), but I can already say it changed nothing
Offline
Would you please post the commands and the output.
Offline
yeah, I will on Monday (access to the computer)
just to say that no real hope because of what I've seen on Friday
Offline
Pages: 1