Research, development and trades concerning the powerful Proxmark3 device.
Remember; sharing is caring. Bring something back to the community.
"Learn the tools of the trade the hard way." +Fravia
You are not logged in.
Time changes and with it the technology
Proxmark3 @ discord
Users of this forum, please be aware that information stored on this site is not private.
Pages: 1
Hi everyone,
I have here a card where the standard keys don't work and wanted to try to recover they keys. To do that I used the proxmark3 to sniff (hf mf sniff) the communication between the card and the reader. The whole communication was written in the console, and initally I wasn't able to save it since I thought it would be possible to save it with the hf list command (but there was no communication listed).
I found and saved the whole communication in the proxmark3 log file, but I'm not sure how to recover the keys from there. Can someone give me some tips?
thank you
Offline
Why don't you just use the nested/hardnested code to get the keys?
Offline
Hi Onsian,
my understanding was that for hardnested there is one key needed to get the other keys. With the command:
hf mf hardnested r
I'm prompted with "Could not open nonces.bin". Additionally to that I tried the hardnested attack on another mifare card where I got some keys (chk), my computer would shut down after some time, so I thought that reading the communication between the card and reader would make it easier to recover the keys.
thanks
Offline
I suggest you give RRG/Iceman repo a try, and use
hf mf autopwn
Offline
Pages: 1