Proxmark3 community

Research, development and trades concerning the powerful Proxmark3 device.

Remember; sharing is caring. Bring something back to the community.


"Learn the tools of the trade the hard way." +Fravia

You are not logged in.

Announcement

Time changes and with it the technology
Proxmark3 @ discord

Users of this forum, please be aware that information stored on this site is not private.

#1 2019-08-30 09:03:16

iceman
Administrator
Registered: 2013-04-25
Posts: 9,537
Website

hf mf autopwn

It started with a PR from @matthiaskonrath  to make hardnested, like nested,  and it grew into a fullfledge autopwn command.



[usb] pm3 --> hf mf autopwn h
Usage:
      hf mf autopwn [k] <sector number> <key A|B> <key (12 hex symbols)>
                    [* <card memory>] [f <dictionary>[.dic]] [s] [i <simd type>] [l] [v]

Description:
      This command automates the key recovery process on Mifare classic cards.
      It uses the darkside, nested and hardnested attack to extract the keys and card content.

Options:
      h                          this help
      k <sector> <key A|B> <key> known key is supplied
      f <dictionary>[.dic]       key dictionary file
      s                          slower acquisition for hardnested (required by some non standard cards)
      v                          verbose output (statistics)
      l                          legacy mode (use the slow 'mf chk' for the key enumeration)
      * <card memory>            all sectors based on card memory
        * 0   = MINI(320 bytes)
        * 1   = 1k  (default)
        * 2   = 2k
        * 4   = 4k
      i <simd type>              set type of SIMD instructions for hardnested. Default: autodetection.
        i 5   = AVX512
        i 2   = AVX2
        i a   = AVX
        i s   = SSE2
        i m   = MMX
        i n   = none (use CPU regular instruction set)

Examples:
      hf mf autopwn                                             -- target Mifare classic card with default keys
      hf mf autopwn * 1 f mfc_default_keys                      -- target Mifare classic card (size 1k) with default dictionary
      hf mf autopwn k 0 A FFFFFFFFFFFF                          -- target Mifare classic card with Sector0 typeA with known key 'FFFFFFFFFFFF'
      hf mf autopwn k 0 A FFFFFFFFFFFF * 1 f mfc_default_keys   -- this command combines the two above (reduce the need for nested / hardnested attacks, by using a dictionary)

Offline

#2 2019-09-10 20:12:01

Ollibolli
Contributor
Registered: 2019-04-27
Posts: 51

Re: hf mf autopwn

So, now it is available for everyone who use the latest Iceman/RRG-repo?

Offline

#3 2019-09-10 20:44:28

iceman
Administrator
Registered: 2013-04-25
Posts: 9,537
Website

Re: hf mf autopwn

Yup,  RRG/Iceman repo.

Offline

#4 2019-09-18 09:26:28

Ollibolli
Contributor
Registered: 2019-04-27
Posts: 51

Re: hf mf autopwn

Oh, so it is not "holy" anymore...:-(

Offline

#5 2019-09-18 18:35:33

iceman
Administrator
Registered: 2013-04-25
Posts: 9,537
Website

Re: hf mf autopwn

Time changes,  progress comes.  You seem to be unhappy?

Offline

#6 2019-09-18 19:37:55

Ollibolli
Contributor
Registered: 2019-04-27
Posts: 51

Re: hf mf autopwn

No, everything is very fine!

Offline

Board footer

Powered by FluxBB