Research, development and trades concerning the powerful Proxmark3 device.
Remember; sharing is caring. Bring something back to the community.
"Learn the tools of the trade the hard way." +Fravia
You are not logged in.
Time changes and with it the technology
Proxmark3 @ discord
Users of this forum, please be aware that information stored on this site is not private.
hw ver
bootrom: master/v3.1.0-173-ga749b1e-suspect 2020-01-09 14:36:52
os: master/v3.1.0-209-g6116334-suspect 2022-02-05 14:02:44
fpga_lf.bit built for 2s30vq100 on 2019/11/21 at 09:02:37
fpga_hf.bit built for 2s30vq100 on 2020/03/05 at 19:09:39
hf search
UID : XX XX XX XX
ATQA : 00 04
SAK : 08 [2]
TYPE : NXP MIFARE CLASSIC 1k | Plus 2k SL1
proprietary non iso14443-4 card found, RATS not supported
No chinese magic backdoor command detected
Prng detection: WEAK
Valid ISO14443A Tag Found - Quiting Search
hf mfp info
UID : XX XX XX XX
ATQA : 00 04
SAK : 08 [2]
TYPE : NXP MIFARE CLASSIC 1k | Plus 2k SL1
proprietary non iso14443-4 card found, RATS not supported
No chinese magic backdoor command detected
Prng detection: WEAK
Waiting for a response from the proxmark... ERROR
hf mf chk *1 ? d default_keys.dic
No valid keys found.
hf mf mifare
Card is not vulnerable to Darkside attack (doesn't send NACK on authentication requests).
hf mf nested OR hf mf hardnested without 1 valid key is not an option.
Offline
proceeding to experiment with lua scripting..
script run mfkeys.lua
No response from card
debugging mfkeys.lua
local function main(args)
result, err = reader.read14443a(false, true)
reader.read14443a <------ ERROR
Offline
It seems that the function read14443a does not work in any script.
The result is always "No response from card".
Offline
new approach
bootrom: RRG/Iceman/master/v4.14831-273-g3c4bf9ed3 2022-02-13 13:53:16
os: RRG/Iceman/master/v4.14831-273-g3c4bf9ed3 2022-02-13 13:53:23
LF image built for 2s30vq100 on 2020-07-08 at 23:08:07
HF image built for 2s30vq100 on 2020-07-08 at 23:08:19
HF FeliCa image built for 2s30vq100 on 2020-07-08 at 23:08:30
hw tune
[=] ---------- LF Antenna ----------
[+] LF antenna: 26.03 V - 125.00 kHz
[+] LF antenna: 29.12 V - 134.83 kHz
[+] LF optimal: 33.12 V - 130.43 kHz
[+] Approx. Q factor (*): 9.0 by frequency bandwidth measurement
[+] Approx. Q factor (*): 9.6 by peak voltage measurement
[+] LF antenna is OK
[=] ---------- HF Antenna ----------
[+] HF antenna: 36.28 V - 13.56 MHz
[+] Approx. Q factor (*): 10.5 by peak voltage measurement
[+] HF antenna is OK
auto
[=] hf search
[-] Searching for ISO14443-A tag...
[+] UID: XX XX XX XX
[+] ATQA: 00 04
[+] SAK: 08 [2]
[+] Possible types:
[+] MIFARE Classic 1K
[=] proprietary non iso14443-4 card found, RATS not supported
[#] 1 static nonce 01200145
[+] Static nonce: yes
[#] Auth error
[?] Hint: try `hf mf` commands
[+] Valid ISO 14443-A tag found
hf mf autopwn
[#] 1 static nonce 01200145
[!] no known key was supplied, key recovery might fail
[+] loaded 42 keys from hardcoded default array
[=] running strategy 1
[=] Chunk 0.6s | found 0/32 keys (42)
[=] running strategy 2
[=] ..
[=] Chunk 7.0s | found 0/32 keys (42)
[-] No usable key was found!
hf mf nack
[=] Checking for NACK bug
......................................
[+] NACK test: no bug
script run hf_mf_autopwn.lua
Running darkside ..........ERROR: Card is not vulnerable to Darkside attack (doesn't send NACK on authentication requests).
script run hf_mf_keycheck.lua
Checkkey execution time: 280 sec
NO KEYS FOUND...Do you wish to save the keys to dumpfile? [y/n] ?
Last edited by pbtek (2022-02-13 20:24:17)
Offline
static nonce, you must have one known key in order to find the rest.
Offline
No keys! Please advise...
Offline
No keys! Please advise...
sniff the key?
Offline
is there a working procedure to follow after sniff the keys?
just made some sniffing log analysis and a few downloads... it looks like i am unable to gererate valid keys.
Offline
Hello, I see you are using scripts, have you tried hf mf autopwn -h
Offline