Research, development and trades concerning the powerful Proxmark3 device.
Remember; sharing is caring. Bring something back to the community.
"Learn the tools of the trade the hard way." +Fravia
You are not logged in.
Time changes and with it the technology
Proxmark3 @ discord
Users of this forum, please be aware that information stored on this site is not private.
Hello everybody,
i find Key A and Key B of my hardnested Mifare 4K-tag with my Proxmark3 "Easy" via hardnested attack!
Subsequently i stored them to emulator memory and confirmed them as valid keys!
How can i now write them to dumpkeys.bin-file?
Many, many thanks in advance!
Last edited by Ollibolli (2019-05-10 15:05:57)
Offline
The dumpkeys file is a normal binary file. With the Akeys first and Bkeys. You can edit it with a hexeditor
Offline
Hello iceman,
thanks for your answer!
To edit the dumpkeys.bin-file, i have to write/create one first!
But how after successfull hardnested attack?
If i use a usual dumpkeys.bin-file, how i have to write the keys inside?
Is it just necessary to write each key once anywhere inside of the file (replacing existing FFFFFFFFFFFF-keys) or have i to put each key in a specific row and/or column?
Last edited by Ollibolli (2019-05-12 11:13:21)
Offline
I have added an option to dump keys to dumpkeys.bin with 'hf mf ekeyprn'. PR in official repo, not yet merged.
Offline
What did you mean exactly?
Why i can do almost everything with hardnested-tags, except saving the keys (with a command)?
Offline
I mean: I have added the function which you requested. You can download with
git checkout -b pwpiwi-dumpkeys master
git pull https://github.com/pwpiwi/proxmark3.git
Then compile as usual and dump your keys with 'hf mf ekeyprn d'.
If your tests are successful this will be included into the master branch on github.
Offline
Sorry, i can't compile anything!
Can you provide the already comiled stuff, please?
Offline
It should meanwhile be available in compiled binaries as well.
Offline