Research, development and trades concerning the powerful Proxmark3 device.
Remember; sharing is caring. Bring something back to the community.
"Learn the tools of the trade the hard way." +Fravia
You are not logged in.
Time changes and with it the technology
Proxmark3 @ discord
Users of this forum, please be aware that information stored on this site is not private.
Hello,
I had the opportunity of Snoop Mifare communication. I am looking for the key of my tag, but when I enter 'hf sheet 14a' I see only the UID tag and then just CRC!
My tag is MIFARE CLASSIC 1k | Plus 2k SL1 , UID:bbbe991d . Is there an antenna error?
I think it's unlikely. Maybe the signal is too strong or weak. How can I sniff TAG and Reader communication?
Where am I making a mistake?
Perhaps this is someone familiar and able to advise.
Thank you.
proxmark3> hw version
Prox/RFID mark3 RFID instrument
bootrom: /-suspect 2015-11-19 10:08:02
os: master/v3.0.1-71-g5c814c3-suspect 2017-08-23 21:35:43
LF FPGA image built for 2s30vq100 on 2015/03/06 at 07:38:04
HF FPGA image built for 2s30vq100 on 2017/07/13 at 08:44:13
uC: AT91SAM7S512 Rev B
Embedded Processor: ARM7TDMI
Nonvolatile Program Memory Size: 512K bytes. Used: 198383 bytes (38%). Free: 325905 bytes (62%).
Second Nonvolatile Program Memory Size: None
Internal SRAM Size: 64K bytes
Architecture Identifier: AT91SAM7Sxx Series
Nonvolatile Program Memory Type: Embedded Flash Memory
proxmark3> hf tune
#db# Measuring HF antenna, press button to exit
#db# 31727 mV
#db# 31727 mV
#db# 31727 mV
proxmark3> hf search
UID : bb be 99 1d
ATQA : 00 04
SAK : 08 [2]
TYPE : NXP MIFARE CLASSIC 1k | Plus 2k SL1
proprietary non iso14443-4 card found, RATS not supported
Answers to chinese magic backdoor commands: NO
Valid ISO14443A Tag Found - Quiting Search
proxmark3> hf 14a snoop
#db# COMMAND FINISHED
#db# maxDataLen=3, Uart.state=0, Uart.len=1
#db# traceLen=39293, Uart.output[0]=00000026
proxmark3> hf list 14a
Recorded Activity (TraceLen = 39293 bytes)
Start = Start of Start Bit, End = End of last modulation. Src = Source of Transfer
iso14443a - All times are in carrier periods (1/13.56Mhz)
iClass - Timings are not as accurate
Start | End | Src | Data (! denotes parity error) | CRC | Annotation |
------------|------------|-----|-----------------------------------------------------------------|-----|--------------------|
0 | 192 | Tag | 01 | |
115456 | 115648 | Tag | 01 | |
139200 | 139584 | Tag |00! | |
162368 | 164736 | Tag | 04 00 | |
187072 | 189440 | Tag | 04 00 | |
209104 | 210000 | Tag | 04 | |
255824 | 256464 | Tag | 04 | |
279952 | 280144 | Tag | 01 | |
...
7431216 | 7433584 | Tag | 04 00 | |
7449792 | 7452160 | Tag | 04 00 | |
7459904 | 7465152 | Tag | bb be 99 1d 01 | |
7490752 | 7493120 | Tag | 04 00 | |
7500864 | 7506688 | Tag | bb be 99 1d 81 | |
7522752 | 7526272 | Tag | 08 b6 dd | |
8923296 | 8927968 | Tag | 05 a9 bc 71 | |
8940960 | 8945632 | Tag |c6! a6 05 11 | |
8955424 | 8976224 | Tag |76! 08 49! c2 b3 43! a6 53! 41 6a! eb! 4f db e6! d0! 28! | |
| | |b9! 36 | !crc|
8992048 | 8996784 | Tag | 15 37! 5a ac! | |
9009712 | 9014384 | Tag |ac! a5 87! 86! | |
9023408 | 9044208 | Tag | 52 79! 1d e9 04! 64! 80! 25 15! e9 09! c1! 67 61! 34 45! | |
| | |4a! 58! | !crc|
9053872 | 9074736 | Tag | c3 50 12 1f! de! f0! 23 8b! 33! 75 01! 1a 05 6c 02! 90! | |
| | |e2! 44! | !crc|
9084336 | 9105200 | Tag | 69 e6 d7 ca aa 24! 69 64! 4e! bb b0! 82! 97 75 31! cc | |
| | |d7! df | !crc|
9123632 | 9128368 | Tag |28! 9b 83 f1 | |
9141296 | 9145968 | Tag |0c! 72! 45! 0b! | |
9154992 | 9175792 | Tag |26! 26! a4! a0 3a e4 9e! 1b! df e9 0d 1b 0a! 39 2c! 7a! | |
| | | 8c 8f! | !crc|
9192384 | 9197056 | Tag |ce! 0c! b2 bf! | |
9210048 | 9214720 | Tag |3b! 3d! 25! fe! | |
9224512 | 9245376 | Tag |81! 0f! ae a8 39 64 88 f2! d0! b8! 73! 8c! 66! 8b! c9 3b! | |
| | | 1b 77! | !crc|
9254976 | 9275840 | Tag | 65 76 19! ac! 3b! b8 c0! 9b ff! 49 21! f5 98 1f 09 3b! | |
| | |7f! 9f! | !crc|
9285440 | 9306304 | Tag |63! 60 d6 7a! 63! 47! 9d 2b! 43 bf! aa! 35! 5c! 50! a7 5a! | |
| | |2c! a5! | !crc|
9453264 | 9457936 | Tag | 4d fb! ab! dd | |
9470928 | 9475664 | Tag |57! 78! 98 d0 | |
9484624 | 9505488 | Tag |1a! f2 d3! d8 5e! f0! 2d 4e 7d! f2! 8c! 8a! 32! 2a! 60 52 | |
| | | 0b 31 | !crc|
9521232 | 9525968 | Tag | e3 7a! 1c! 16 | |
9538896 | 9543632 | Tag |2b! 2c 62! c1 | |
9552592 | 9573392 | Tag | cd 3e ae 15! 25! b4 88! 5c fa! da fc! 4f 26! ce! 87! 5d! | |
| | |ba! ea! | !crc|
9583056 | 9603920 | Tag |c9! 3b! 5d f3! e4! 62 bb! ec a3 d8! f0 12! 4a! 36 df fd! | |
| | | 55 a3! | !crc|
9613536 | 9634336 | Tag |8d! 2f 9b 13! 39! d4 e3 88 c4 35! 7d 6e! f8 8a! 52! 83 | |
| | |59! d1 | !crc|
9653344 | 9658080 | Tag |f6! 42 e9 dc | |
9671136 | 9675808 | Tag |f8! 1c! 06 2e | |
9685600 | 9706400 | Tag | 10 86! f9 f8! 29! f6 ae! 49! b2 61 7c! 1a a4! 16! cd! 0c! | |
| | |99! 7d | !crc|
15347328 | 15352064 | Tag |2e! fc! fa da | |
15364992 | 15369664 | Tag | 9a 1f e0! 55 | |
15378688 | 15399552 | Tag |83! 53! 76! 14 31! 88! 27! b6 43! 19 9c d6! a1! 42! 56! c1! | |
| | |84! 6f! | !crc|
15417088 | 15421760 | Tag |46! ff! 5e! 1e | |
15434752 | 15439424 | Tag | 46 1d! 25 15! | |
15449216 | 15470080 | Tag |35! f6! 20 4d e3 db! 29! d1! 25! f7! 35! 95! de! a3! 84! 43 | |
| | |e5! fe | !crc|
15486736 | 15491408 | Tag |d2! a8 92! 33 | |
15504400 | 15509136 | Tag |f3! 60 06! a1 | |
15518608 | 15539472 | Tag | d8 b9! e5! 02! f1! 4a d7 81 f0 6f! e2 4e 41! 35 b1 00! | |
| | |d5! 5c! | !crc|
15556112 | 15560848 | Tag |75! d4! 14! 91 | |
15573776 | 15578448 | Tag | c6 df! ee! 41 | |
15587472 | 15608272 | Tag |86! 13! ed! 0b! e3! b0! d4! fe c5! ac 3d! 00 99! f9! ba! b2! | |
| | |3f! f9 | !crc|
15624976 | 15629648 | Tag | 4d 85 98 d8 | |
15643536 | 15648208 | Tag |b7! 7b bb! 48 | |
15657232 | 15678032 | Tag | 6d ce! b5 e7! e4! af! 33! 80 ab! 93 3d 11! e0 c9 53! 15 | |
| | | 97 ff | !crc|
15694752 | 15699488 | Tag |0e! 28 70 92 | |
15712544 | 15717280 | Tag | be c6! 0c 7b! | |
15726240 | 15747040 | Tag |34! c1 a2 cd! 85 57! 20! 11 d8! ae! 2d! 63 63! 77! 42! 6b | |
| | | 2f 0b! | !crc|
15764640 | 15769376 | Tag |99! 03 19 4b! | |
15782304 | 15786976 | Tag |d9! 6d! 76 1e | |
15796000 | 15816800 | Tag |8a! 19! 25 5d! ef! 20 f1! 3b e3! 9d 60 ec 62 47 f3 a2! | |
| | | 5c 98! | !crc|
15834400 | 15839136 | Tag | 4f e4! 2c 4e! | |
15852064 | 15856736 | Tag | 35 b0 26 43! | |
15865760 | 15886624 | Tag | 8e 17! 54! 6e 30 0e a1! fb! f2! 25 0c a0 21! 5f ef ed! | |
| | |33! 09! | !crc|
15904176 | 15908912 | Tag |a2! 53! 54 95! | |
15921840 | 15926576 | Tag | f2 05! d8! ce | |
15935536 | 15956336 | Tag |0e! 23 a4 13! 83 e5 7d! 0a! 09! f4! bf! 46! cb 2f! 65 b2 | |
| | | e2 6c | !crc|
15973936 | 15978608 | Tag |b7! 25! 92! 3f | |
15991600 | 15996336 | Tag |0a! 32 aa! b8! | |
16006064 | 16026864 | Tag |17! da 64 ed 0b! 8a! 80! 53! 21! 5c cb 05 7f! 6a! d8 92! | |
| | |48! d5! | !crc|
16043568 | 16048304 | Tag |1a! 22 70 4e! | |
16061232 | 16065904 | Tag | 4b be! 67! ea! | |
16074928 | 16095728 | Tag | 0c 31 56 ec! 35! 99 0a 15 5d fc! ca! 77 79! 0c! 78 e8! | |
| | |23! 10!
(more)
Last edited by Tatka (2017-08-28 17:45:49)
Offline
Yes, your trace doesn't show the READER parts. try different positions with your antenna.
You could try the sim command to try getting the key out if it. Read the help text for instructions, or here on forum, search is your friend.
hf 14a sim h
Because you are trying to sniff/snoop a standard ISO14443a transaction, you will only get those parts out from your reader.
Mifare uses its own protocol about ISO14443a, luckily there is a mifare sniff command.
hf mf sniff
hf list 14a
Offline
Hello. Thank you for your advice.
proxmark3> hf 14a sim 1 bbbe001d x
Emulating ISO/IEC 14443 type A tag with 4 byte UID (bbbe001d)
#db# 1000 commands later...
#db# 0 0 3e8
proxmark3> hf list 14a
Recorded Activity (TraceLen = 21000 bytes)
Start = Start of Start Bit, End = End of last modulation. Src = Source of Transfer
iso14443a - All times are in carrier periods (1/13.56Mhz)
iClass - Timings are not as accurate
Start | End | Src | Data (! denotes parity error) | CRC | Annotation |
------------|------------|-----|-----------------------------------------------------------------|-----|--------------------|
0 | 1056 | Rdr | 26 | | REQA
2228 | 4596 | Tag | 04 00 | |
11776 | 12832 | Rdr | 26 | | REQA
14004 | 16372 | Tag | 04 00 | |
22912 | 23968 | Rdr | 26
Worked but found no key. I was kicked right after the first two bytes. I used
Hf mf sniff
And now I see this communication.
proxmark3> hf mf dbg 1
#db# Debug level: 1
proxmark3> hf mf sniff
-------------------------------------------------------------------------
Executing command.
Press the key on the proxmark3 device to abort both proxmark3 and client.
Press the key on pc keyboard to abort the client.
-------------------------------------------------------------------------
......................................>
received trace len: 17546 packages: 35
tag select uid:bb be 99 1d atqa:0x0004 sak:0x08
RDR(0):61 03 b6 50
TAG(1):6c cd eb b1
RDR(2):8e 8d 5a 92 66 bd 68 f9
TAG(3):cd 9f ac 2a
RDR(4):97 35 19 fd
TAG(5):34 93 34 80 34 c9 5f 98 b4 e2 5f af ea bb 67 5d 22 3f
RDR(6):f6 11 65 23
TAG(7):bf f1 0d 4b
RDR(8):9a 87 29 e9 12 81 66 b7
TAG(9):6b 1f 6c cb
RDR(10):21 5d 28 3b
TAG(11):cc fe 84 de 89 7f 3e 9a 08 87 0e 2e ac a4 49 72 24 d2
RDR(12):48 d5 f1 70
TAG(13):f5 e6 d7 07 a8 eb b4 b0 00 e6 b2 05 da a3 a9 99 9e 11
RDR(14):99 d7 5f 8d
TAG(15):91 d3 43 89 c7 ed 31 29 e5 b4 1c dc 62 be 9f 8b a9 3a
RDR(16):12 01 8a 6b
TAG(17):f6 92 02 19
RDR(18):a5 9a 2a 47 6e f4 7e e3
TAG(19):e3 7e 75 04
RDR(20):ab f4 e0 59
TAG(21):31 4c 0a 33 9b 12 d6 8c ae 8e e9 73 5d df 5e f2 7e 96
RDR(22):dd a8 5e 18
TAG(23):2d ac db 8e
RDR(24):89 e7 a7 84 6d 3b 89 0d
TAG(25):12 b5 49 ad
RDR(26):ac 1b c8 29
TAG(27):df 9e 8c e0 96 be a5 f7 75 00 4d 9d e8 8d 46 d0 77 6c
RDR(28):03 dd bf 7e
TAG(29):fb 00 00 22 53 ef 87 21 c1 72 04 7b 6d 85 b2 03 71 7b
RDR(30):52 8e e0 8e
TAG(31):b7 ac 19 6f 78 81 d0 1f d2 14 37 9d 9c 9f b9 49 5a c6
RDR(32):99 36 c9 15
TAG(33):1d e6 42 ba
RDR(34):32 9b 3a d5 6b 63 c4 db
TAG(35):98 18 ee 2c
RDR(36):38 c9 8b f4
TAG(37):50 2a ac 42 0d 7f 74 54 4a 1f 67 af 63 7b fa 5d 81 6c
RDR(38):6b 95 25 e3
TAG(39):ba 07 e9 57
RDR(40):e5 8d 94 05 01 7e a1 81
TAG(41):37 02 4c 25
RDR(42):16 77 fd 1b
TAG(43):84 7e a2 7f 1a 9e 2f 25 3a f3 f6 aa cf 66 3f 24 d5 1e
RDR(44):e3 0f 9d 32
TAG(45):a3 ba e7 86 88 35 f3 7d 42 15 08 23 25 46 e5 d1 30 27
RDR(46):b6 1c e5 17
TAG(47):77 6b 3a fa 15 e8 1d 98 a8 f4 54 df 5d a6 c6 db c2 f8
RDR(48):33 87 f1 7e
TAG(49):1e 2f 79 89
RDR(50):89 4c 87 78 eb a8 07 48
TAG(51):69 a7 7d 9f
RDR(52):bc c1 cf 30
TAG(53):4d b7 17 fe e1 56 54 f3 2f d8 e6 52 90 76 6c 69 7b 4a
RDR(54):bc 01 6a 74
TAG(55):3c 25 c5 d5
RDR(56):cd 0d c1 41 19 27 e8 cb
TAG(57):38 2f 34 23
RDR(58):54 36 8a 59
TAG(59):5b 35 6d c0 97 78 2e df b0 0e 87 1d 75 60 20 35 5c 03
RDR(60):a7 d7 58 8c
TAG(61):b6 6f 2d ab
RDR(62):3e 25 65 ea f7 28 c7 e0
TAG(63):5f c0 32 45
RDR(64):47 d3 3f e6
TAG(65):66 ed 44 b8 7f eb f5 49 9d 99 eb 00 22 b7 ba 8c df 82
RDR(66):85 42 ef 37
TAG(67):01 4c 58 8c
RDR(68):18 11 f0 62 f8 2e 81 3f
TAG(69):fd 3f 8e b0
...
The tag uses about more keys and I'm trying to find the right ones. So far, I found only one B valid key. He is only for zero sector where a key is used A=a0a1a2a3a4a5 OR B=1bacd1f05468
Other sectors are locked.
I use the parameters for Crypto1 as follows:
# ./mfkey64 bbbe991d 6ccdebb1 8e8d5a92 66bd68f9 cd9fac2a
MIFARE Classic key recovery - based on 64 bits of keystream
Recover key from only one complete authentication!
Recovering key for:
uid: bbbe991d
nt: 6ccdebb1
{nr}: 8e8d5a92
{ar}: 66bd68f9
{at}: cd9fac2a
LFSR successors of the tag challenge:
nt' : 149a0313
nt'': 3b6dbb00
Time spent in lfsr_recovery64(): 0.06 seconds
Keystream used to generate {ar} and {at}:
ks2: 72276bea
ks3: f6f2172a
Found Key: [1bacd1f05468]
1bacd1f05468--> is valid for sektor 0 as key B
# ./mfkey64 bbbe991d bff10d4b 9a8729e9 128166b7 6b1f6ccb
MIFARE Classic key recovery - based on 64 bits of keystream
Recover key from only one complete authentication!
Recovering key for:
uid: bbbe991d
nt: bff10d4b
{nr}: 9a8729e9
{ar}: 128166b7
{at}: 6b1f6ccb
LFSR successors of the tag challenge:
nt' : 81299d2f
nt'': f5689194
Time spent in lfsr_recovery64(): 0.07 seconds
Keystream used to generate {ar} and {at}:
ks2: 93a8fb98
ks3: 9e77fd5f
Found Key: [8d8d7e26d663]
8d8d7e26d663 is not valid for any sector.
...
Now I do not know how to continue to read sector 1-15
I tried 'mfoc' but the new keys were not found
$ mfoc -k 1bacd1f05468 -k a0a1a2a3a4a5 -T 30 -P 500 -O dumpkeys.bin
The custom key 0x1bacd1f05468 has been added to the default keys
The custom key 0xa0a1a2a3a4a5 has been added to the default keys
Found Mifare Classic 1k tag
ISO/IEC 14443A (106 kbps) target:
ATQA (SENS_RES): 00 04
* UID size: single
* bit frame anticollision supported
UID (NFCID1): bb be 99 1d
SAK (SEL_RES): 08
* Not compliant with ISO/IEC 14443-4
* Not compliant with ISO/IEC 18092
Fingerprinting based on MIFARE type Identification Procedure:
* MIFARE Classic 1K
* MIFARE Plus (4 Byte UID or 4 Byte RID) 2K, Security level 1
* SmartMX with MIFARE 1K emulation
Other possible matches based on ATQA & SAK values:
Try to authenticate to all sectors with default keys...
Symbols: '.' no key found, '/' A key found, '\' B key found, 'x' both keys found
[Key: 1bacd1f05468] -> [\...............]
[Key: a0a1a2a3a4a5] -> [x...............]
[Key: ffffffffffff] -> [x...............]
[Key: a0a1a2a3a4a5] -> [x...............]
[Key: d3f7d3f7d3f7] -> [x...............]
[Key: 000000000000] -> [x...............]
[Key: b0b1b2b3b4b5] -> [x...............]
[Key: 4d3a99c351dd] -> [x...............]
[Key: 1a982c7e459a] -> [x...............]
[Key: aabbccddeeff] -> [x...............]
[Key: 714c5c886e97] -> [x...............]
[Key: 587ee5f9350f] -> [x...............]
[Key: a0478cc39091] -> [x...............]
[Key: 533cb6c723f6] -> [x...............]
[Key: 8fd0a4f256e9] -> [x...............]
Sector 00 - Found Key A: a0a1a2a3a4a5 Found Key B: 1bacd1f05468
Sector 01 - Unknown Key A Unknown Key B
Sector 02 - Unknown Key A Unknown Key B
Sector 03 - Unknown Key A Unknown Key B
Sector 04 - Unknown Key A Unknown Key B
Sector 05 - Unknown Key A Unknown Key B
Sector 06 - Unknown Key A Unknown Key B
Sector 07 - Unknown Key A Unknown Key B
Sector 08 - Unknown Key A Unknown Key B
Sector 09 - Unknown Key A Unknown Key B
Sector 10 - Unknown Key A Unknown Key B
Sector 11 - Unknown Key A Unknown Key B
Sector 12 - Unknown Key A Unknown Key B
Sector 13 - Unknown Key A Unknown Key B
Sector 14 - Unknown Key A Unknown Key B
Sector 15 - Unknown Key A Unknown Key B
Using sector 00 as an exploit sector
Card is not vulnerable to nested attack
$_
.
I'm a newbie and I have a lot to learn. There is no sky without clouds.
Last edited by Tatka (2017-08-28 00:05:00)
Offline
I also tried the 'nested':
proxmark3> hf mf nested 1 0 B 1bacd1f05468 d
Testing known keys. Sector count=16
nested...
-----------------------------------------------
Tag isn't vulnerable to Nested Attack (random numbers are not predictable).
What else can I do to crack the card?
Offline
Go and read up about hardnest and how it works.
btw if you are unsure about the commands please feel free to type half the command.
Example: hf mf chk - will give you
Usage: hf mf chk <block number>|<*card memory> <key type (A/B/?)> [t|d] [<key (12 hex symbols)>] [<dic (*.dic)>]
* - all sectors
card memory - 0 - MINI(320 bytes), 1 - 1K, 2 - 2K, 4 - 4K, <other> - 1K
d - write keys to binary file
t - write keys to emulator memory
sample: hf mf chk 0 A 1234567890ab keys.dic
hf mf chk *1 ? t
hf mf chk *1 ? d
Hf mf hardnest - will give you
Usage:
hf mf hardnested <block number> <key A|B> <key (12 hex symbols)>
<target block number> <target key A|B> [known target key (12 hex symbols)] w s
or hf mf hardnested r [known target key]
Options:
w: Acquire nonces and write them to binary file nonces.bin
s: Slower acquisition (required by some non standard cards)
r: Read nonces.bin and start attack
sample1: hf mf hardnested 0 A FFFFFFFFFFFF 4 A
sample2: hf mf hardnested 0 A FFFFFFFFFFFF 4 A w
sample3: hf mf hardnested 0 A FFFFFFFFFFFF 4 A w s
sample4: hf mf hardnested r
Add the known target key to check if it is present in the remaining key space:
sample5: hf mf hardnested 0 A A0A1A2A3A4A5 4 A FFFFFFFFFFFF
good that you are learning, keep practising.
Last edited by Dot.Com (2017-08-28 03:27:25)
Offline
It works great. It's amazing. It's like magic
pm3 --> hf mf hardnested 0 B 1bacd1f05468 4 A
--target block no: 4, target key type:A, known target key: 0x000000000000 (not set), file action: none, Slow: No, Tests: 0
time | #nonces | Activity | expected to brute force
| | | #states | time
------------------------------------------------------------------------------------------------------
0 | 0 | Start using 8 threads and AVX2 SIMD core | |
0 | 0 | Brute force benchmark: 1121 million (2^30.1) keys/s | 140737488355328 | 35h
1 | 0 | Using 235 precalculated bitflip state tables | 140737488355328 | 35h
5 | 112 | Apply bit flip properties | 363263426560 | 5min
6 | 224 | Apply bit flip properties | 112237199360 | 2min
7 | 335 | Apply bit flip properties | 88805146624 | 79s
8 | 447 | Apply bit flip properties | 76838215680 | 69s
8 | 559 | Apply bit flip properties | 76532318208 | 68s
9 | 669 | Apply bit flip properties | 74550116352 | 67s
10 | 779 | Apply bit flip properties | 74550116352 | 67s
11 | 889 | Apply bit flip properties | 74550116352 | 67s
11 | 997 | Apply bit flip properties | 74550116352 | 67s
12 | 1106 | Apply bit flip properties | 74550116352 | 67s
13 | 1215 | Apply bit flip properties | 74550116352 | 67s
14 | 1324 | Apply bit flip properties | 74550116352 | 67s
15 | 1434 | Apply bit flip properties | 74550116352 | 67s
16 | 1541 | Apply bit flip properties | 74550116352 | 67s
16 | 1649 | Apply bit flip properties | 74550116352 | 67s
18 | 1759 | Apply Sum property. Sum(a0) = 64 | 21144940544 | 19s
18 | 1864 | Apply bit flip properties | 7027675648 | 6s
19 | 1970 | Apply bit flip properties | 7027675648 | 6s
20 | 2080 | Apply bit flip properties | 7877309440 | 7s
21 | 2186 | Apply bit flip properties | 7027675648 | 6s
22 | 2295 | Apply bit flip properties | 5142730752 | 5s
23 | 2295 | (1. guess: Sum(a8) = 0) | 5142730752 | 5s
23 | 2295 | Apply Sum(a8) and all bytes bitflip properties | 4239027712 | 4s
23 | 2295 | Brute force phase completed. Key found: 0a65cb3eb977 | 0 | 0s
pm3 -->
Now I can play Proxmark again.
Thank you.
Offline
Impressive numbers!
8 threads and Brute force benchmark: 1121 million (2^30.1) keys/s
Offline
I was flashing a new firmware yesterday. I hope this number does not show any problem
Offline
Hi sorry to piggyback on the old thread... let me know if i shld open a new thread
playing around the hf mf sniff / hf 14a snoop function, i encountered the following problems
1) in iceman v3.1.0 folk there is 'no hf mf sniff' command , is the mf sniff combined into 'hf 14a sniff' ?
pm3 --> hw version
[[[ Cached information ]]]
Proxmark3 RFID instrument
[ ARM ]
bootrom: iceman/master/ice_v3.1.0-787-g192aa9ab 2018-04-08 11:49:32
os: iceman/master/ice_v3.1.0-787-g192aa9ab 2018-04-08 11:49:37
[ FPGA ]
LF image built for 2s30vq100 on 2017/10/25 at 19:50:50
HF image built for 2s30vq100 on 2017/11/10 at 19:24:16
[ Hardware ]
--= uC: AT91SAM7S512 Rev B
--= Embedded Processor: ARM7TDMI
--= Nonvolatile Program Memory Size: 512K bytes, Used: 237727 bytes (45%) Free: 286561 bytes (55%)
--= Second Nonvolatile Program Memory Size: None
--= Internal SRAM Size: 64K bytes
--= Architecture Identifier: AT91SAM7Sxx Series
--= Nonvolatile Program Memory Type: Embedded Flash Memory
pm3 --> hf mf h
help This help
darkside Darkside attack. read parity error messages.
nested Nested attack. Test nested authentication
hardnested Nested attack for hardened Mifare cards
keybrute J_Run's 2nd phase of multiple sector nested authentication key recovery
nack Test for Mifare NACK bug
chk Check keys
fchk Check keys fast, targets all keys on card
decrypt [nt] [ar_enc] [at_enc] [data] - to decrypt snoop or trace
-----------
dbg Set default debug mode
rdbl Read MIFARE classic block
rdsc Read MIFARE classic sector
dump Dump MIFARE classic tag to binary file
restore Restore MIFARE classic binary file to BLANK tag
wrbl Write MIFARE classic block
setmod Set MIFARE Classic EV1 load modulation strength
-----------
sim Simulate MIFARE card
eclr Clear simulator memory block
eget Get simulator memory block
eset Set simulator memory block
eload Load from file emul dump
esave Save to file emul dump
ecfill Fill simulator memory with help of keys from simulator
ekeyprn Print keys from simulator memory
-----------
csetuid Set UID for magic Chinese card
csetblk Write block - Magic Chinese card
cgetblk Read block - Magic Chinese card
cgetsc Read sector - Magic Chinese card
cload Load dump into magic Chinese card
csave Save dump from magic Chinese card into file or emulator
ice collect Mifare Classic nonces to file
2) when I tried with the official firmware (v3.0.1)
2.1) hf 14a snoop is capturing TAG only information ( i was using an Android TagInfo app to act as reader for ease purpose)
where info can be retrieved from hf list 14a / hf list mf
2.2) when using hf mf sniff, there is not info captured at all .. while the Android app is able to retrieve tag UID etc
(position : Android Phone <--1cm--> PM3 Easy <--1cm--> Test Tag (IC)
should I try with the FDI reader at the lift or sth wrong local in my setup?
proxmark3> hw version
[[[ Cached information ]]]
Prox/RFID mark3 RFID instrument
bootrom: master/v3.0.1-361-ge069547-suspect 2018-04-03 11:12:28
os: master/v3.0.1-361-ge069547-suspect 2018-04-03 11:12:31
LF FPGA image built for 2s30vq100 on 2015/03/06 at 07:38:04
HF FPGA image built for 2s30vq100 on 2017/10/27 at 08:30:59
uC: AT91SAM7S512 Rev B
Embedded Processor: ARM7TDMI
Nonvolatile Program Memory Size: 512K bytes. Used: 199639 bytes (38%). Free: 324649 bytes (62%).
Second Nonvolatile Program Memory Size: None
Internal SRAM Size: 64K bytes
Architecture Identifier: AT91SAM7Sxx Series
Nonvolatile Program Memory Type: Embedded Flash Memory
proxmark3> hf mf h
help This help
dbg Set default debug mode
rdbl Read MIFARE classic block
rdsc Read MIFARE classic sector
dump Dump MIFARE classic tag to binary file
restore Restore MIFARE classic binary file to BLANK tag
wrbl Write MIFARE classic block
chk Test block keys
mifare Read parity error messages.
hardnested Nested attack for hardened Mifare cards
nested Test nested authentication
sniff Sniff card-reader communication
sim Simulate MIFARE card
eclr Clear simulator memory block
eget Get simulator memory block
eset Set simulator memory block
eload Load from file emul dump
esave Save to file emul dump
ecfill Fill simulator memory with help of keys from simulator
ekeyprn Print keys from simulator memory
cwipe Wipe magic Chinese card
csetuid Set UID for magic Chinese card
csetblk Write block - Magic Chinese card
cgetblk Read block - Magic Chinese card
cgetsc Read sector - Magic Chinese card
cload Load dump into magic Chinese card
csave Save dump from magic Chinese card into file or emulator
decrypt [nt] [ar_enc] [at_enc] [data] - to decrypt snoop or trace
proxmark3> hf mf dbg 3
#db# Debug level: 3
proxmark3> hf mf sniff
-------------------------------------------------------------------------
Executing command.
Press the key on the proxmark3 device to abort both proxmark3 and client.
Press the key on pc keyboard to abort the client.
-------------------------------------------------------------------------
.#db# ISO14443A Timeout set to 1060 (10ms)
.......#db# Canceled by button.
#db# COMMAND FINISHED.
#db# maxDataLen=2, Uart.state=0, Uart.len=0
Done.
proxmark3> hf list mf
Recorded Activity (TraceLen = 0 bytes)
Start = Start of Start Bit, End = End of last modulation. Src = Source of Transfer
iso14443a - All times are in carrier periods (1/13.56Mhz)
iClass - Timings are not as accurate
Start | End | Src | Data (! denotes parity error) | CRC | Annotation |
------------|------------|-----|-----------------------------------------------------------------|-----|--------------------|
proxmark3> hf list 14a
Recorded Activity (TraceLen = 0 bytes)
Start = Start of Start Bit, End = End of last modulation. Src = Source of Transfer
iso14443a - All times are in carrier periods (1/13.56Mhz)
iClass - Timings are not as accurate
Start | End | Src | Data (! denotes parity error) | CRC | Annotation |
------------|------------|-----|-----------------------------------------------------------------|-----|--------------------|
Offline
When i git the keys out off the reader and after that i used crypto 1 .But how you put the keys on a card after crypto 1 when i git keys out off the reader?
Offline
@mike don't hijack threads.
Offline
I can not get out with the proxmark3.I try to make a master key but I can not. I also try to get info from the reader but I can not. I am new in this I am learning can someone helping me with that and explained me how?iceman can you help me out and what did you mean I'm dutch my english is not so good.
Offline
Did you read the wiki? ]https://github.com/Proxmark/proxmark3/wiki its a good start.
Offline
Iceman I read it .i know how to clone.but I whant to make a masterkey out off a other valid key and allso the reader attack i whant to know .i search every where but can find nothing so can you help me out iceman
Offline
Thanks
Offline