Research, development and trades concerning the powerful Proxmark3 device.
Remember; sharing is caring. Bring something back to the community.
"Learn the tools of the trade the hard way." +Fravia
You are not logged in.
Time changes and with it the technology
Proxmark3 @ discord
Users of this forum, please be aware that information stored on this site is not private.
Pages: 1
Hello!
According to the instructions, I successfully connected Proxmark3 to Ubuntu 18.04 - https://github.com/Proxmark/proxmark3/wiki/Ubuntu-Linux
Then I started trying to copy cards / keychain RFID, with a simple RFID keychain from my intercom I copied without problems, because it was not encrypted.
But with the card RFID from the parking there were problems.
1. Run command - hf search
proxmark3> hf search
UID: 43 8b b7 75
ATQA: 00 04
SAK: 08 [2]
TYPE: NXP MIFARE CLASSIC 1k | Plus 2k SL1
proprietary non iso14443-4 card found, RATS not supported
No chinese magic backdoor command detected
Prng detection: WEAK
Valid ISO14443A Tag Found - Quiting Search
2. Run command - hf mf chk * ?
proxmark3> hf mf chk * ?
--chk keys. sectors: 16, block no: 0, key type:?, eml: n, dmp = n checktimeout = 471 us
No key specified, trying default keys
chk default key [0] ffffffffffff
chk default key [1] 000000000000
chk default key [2] a0a1a2a3a4a5
chk default key [3] b0b1b2b3b4b5
chk default key [4] aabbccddeeff
chk default key [5] 1a2b3c4d5e6f
chk default key [6] 123456789abc
chk default key [7] 010203040506
chk default key [8] 123456abcdef
chk default key [9] abcdef123456
chk default key [10] 4d3a99c351dd
chk default key [11] 1a982c7e459a
chk default key [12] d3f7d3f7d3f7
chk default key [13] 714c5c886e97
chk default key [14] 587ee5f9350f
chk default key [15] a0478cc39091
chk default key [16] 533cb6c723f6
chk default key [17] 8fd0a4f256e9
To cancel this operation press the button on the proxmark ...
-.
No valid keys found.
And I get the error "No valid keys found". What am I doing wrong? What should I do next?
Offline
Try 'hf mf mifare', then 'hf mf nested'.
Offline
Try 'hf mf mifare', then 'hf mf nested'.
Hello, piwi! I previously ran these commands, but this does not help me copy the RFID-keychain
1. Run command - hf mf mifare
proxmark3> hf mf mifare
-------------------------------------------------------------------------
Executing command. Expected execution time: 25sec on average
Press button on the proxmark3 device to abort both proxmark3 and client.
-------------------------------------------------------------------------
.....Card is not vulnerable to Darkside attack (its random number generator seems to be based on the wellknown
generating polynomial with 16 effective bits only, but shows unexpected behaviour.
2. Run command - hf mf nested
proxmark3> hf mf nested
Usage:
all sectors: hf mf nested <card memory> <block number> <key A/B> <key (12 hex symbols)> [t|d|s|ss]
all sectors autosearch key: hf mf nested <card memory> * [t|d|s|ss]
one sector: hf mf nested o <block number> <key A/B> <key (12 hex symbols)>
<target block number> <target key A/B> [t]
card memory - 0 - MINI(320 bytes), 1 - 1K, 2 - 2K, 4 - 4K, <other> - 1K
t - transfer keys to emulator memory
d - write keys to binary file dumpkeys.bin
s - Slow (1ms) check keys (required by some non standard cards)
ss - Very slow (5ms) check keys
sample1: hf mf nested 1 0 A FFFFFFFFFFFF
sample2: hf mf nested 1 0 A FFFFFFFFFFFF t
sample3: hf mf nested 1 0 A FFFFFFFFFFFF d
sample4: hf mf nested o 0 A FFFFFFFFFFFF 4 A
sample5: hf mf nested 1 * t
sample6: hf mf nested 1 * ss
3. Run command - hf mf nested 1 * t
proxmark3> hf mf nested 1 * t
--nested. sectors:16, block no:*, eml:y, dmp=n checktimeout=471 us
Testing known keys. Sector count=16
Can't found any of the known keys.
Maybe I need to execute other commands? Or maybe I need to do sniffing (snooping) RFID-keychain, but I have absolutely no experience in the sequence of my actions.
Offline
Hello!
Since I could not find any key and standard keys do not fit. I tried to do a sniffing tag.
1. Run command - hf 14a snoop (several times)
And put "Tag - Proxmark - Reader"
2. Run command - hf list 14a -l myCardTrace21.trc , hf list 14a -l myCardTrace22.trc , hf list 14a -l myCardTrace25.trc
proxmark3> hf list 14a -l myCardTrace21.trc
Recorded Activity (TraceLen = 39281 bytes)
Start = Start of Frame, End = End of Frame. Src = Source of transfer
All times are in carrier periods (1/13.56Mhz)
Start | End | Src | Data (! denotes parity error, ' denotes short bytes) | CRC | Annotation |
------------|------------|-----|-----------------------------------------------------------------|-----|--------------------|
0 | 2368 | Tag | 04 00 | |
449376 | 451744 | Tag | 04 00 | |
891392 | 893760 | Tag | 04 00 | |
921072 | 926896 | Tag | 43 8b b7 75 0a | |
1371872 | 1374240 | Tag | 04 00 | |
1401680 | 1407504 | Tag | 43 8b b7 75 0a | |
1449264 | 1452784 | Tag | 08 b6 dd | |
1560208 | 1564880 | Tag | f7 ab 2b 69 | |
1576848 | 1581520 | Tag | dd! 46 c0! 9c | |
1608832 | 1629632 | Tag | 08! e0 5e! 39! ea 19 07! a2 47! 95 46 6b! 98 55 92 cb! | |
| | | 3a! 49! | !crc|
2977648 | 2980016 | Tag | 04 00 | |
3003676 | 3006140 | Rdr | 93 20 | | ANTICOLL
3007328 | 3013152 | Tag | 43 8b b7 75 0a | |
3044108 | 3054572 | Rdr | 93 70 43 8b b7 75 0a 68 cf | ok | SELECT_UID
3055808 | 3059328 | Tag | 08 b6 dd | |
3103468 | 3104524 | Rdr | 26' | | REQA
3105712 | 3108080 | Tag | 04 00 | |
3132252 | 3134716 | Rdr | 93 20 | | ANTICOLL
3135888 | 3141712 | Tag | 43 8b b7 75 0a | |
3185152 | 3188672 | Tag | 08 b6 dd | |
3232748 | 3233804 | Rdr | 26' | | REQA
3234992 | 3237360 | Tag | 04 00 | |
3262044 | 3264508 | Rdr | 93 20 | | ANTICOLL
3265680 | 3271504 | Tag | 43 8b b7 75 0a | |
3314944 | 3318464 | Tag | 08 b6 dd | |
3363872 | 3366240 | Tag | 04 00 | |
3393808 | 3399632 | Tag | 43 8b b7 75 0a | |
3429564 | 3440028 | Rdr | 93 70 43 8b b7 75 0a 68 cf | ok | SELECT_UID
3441280 | 3444800 | Tag | 08 b6 dd | |
3487712 | 3490080 | Tag | 04 00 | |
3513740 | 3516204 | Rdr | 93 20 | | ANTICOLL
3517392 | 3523216 | Tag | 43 8b b7 75 0a | |
.....
I attach files - https://drive.google.com/drive/folders/ … sp=sharing
How can I find out the key, block number and type of key from this information?
Last edited by Rema78 (2020-04-06 22:09:43)
Offline
Hello, have you installed this repo:
# git clone https://github.com/RfidResearchGroup/proxmark3.git.
there is the doc to install the proxmark3 correctly. Otherwise try hf mf autopwn.
Have a good day
Offline
Hello, fazer!
I correctly installed my proxmark3 for Ubuntu 18.04 by official manual - https://github.com/Proxmark/proxmark3/wiki/Ubuntu-Linux
1. Run command - hf mf autopwn
proxmark3> hf mf autopwn
help This help
dbg Set default debug mode
rdbl Read MIFARE classic block
rdsc Read MIFARE classic sector
dump Dump MIFARE classic tag to binary file
restore Restore MIFARE classic binary file to BLANK tag
wrbl Write MIFARE classic block
auth4 ISO14443-4 AES authentication
chk Test block keys
mifare Read parity error messages.
hardnested Nested attack for hardened Mifare cards
nested Test nested authentication
sniff Sniff card-reader communication
sim Simulate MIFARE card
eclr Clear simulator memory
eget Get simulator memory block
eset Set simulator memory block
eload Load from file emul dump
esave Save to file emul dump
ecfill Fill simulator memory with help of keys from simulator
ekeyprn Print keys from simulator memory
cwipe Wipe magic Chinese card
csetuid Set UID for magic Chinese card
csetblk Write block - Magic Chinese card
cgetblk Read block - Magic Chinese card
cgetsc Read sector - Magic Chinese card
cload Load dump into magic Chinese card
csave Save dump from magic Chinese card into file or emulator
decrypt [nt] [ar_enc] [at_enc] [data] - to decrypt snoop or trace
mad Checks and prints MAD
ndef Prints NDEF records from card
personalize Personalize UID (Mifare Classic EV1 only)
But this command does not work!
Send me a link to configure and use the proxmark for Ubuntu in community "RfidResearchGroup", please
Last edited by Rema78 (2020-04-07 23:45:02)
Offline
Hi Rema78, look the reposite
# git clone https://github.com/RfidResearchGroup/proxmark3.git.
[=] Session log /home/pascal/.proxmark3/log_20200408.txt
[=] Using UART port /dev/ttyACM0
[=] Communicating with PM3 over USB-CDC
██████╗ ███╗ ███╗ ████╗
██╔══██╗████╗ ████║ ══█║
██████╔╝██╔████╔██║ ████╔╝
██╔═══╝ ██║╚██╔╝██║ ══█║ ❄️ iceman@icesql.net ☕
██║ ██║ ╚═╝ ██║ ████╔╝ https://github.com/rfidresearchgroup/proxmark3/
╚═╝ ╚═╝ ╚═╝ ╚═══╝ pre-release v4.0
[ Proxmark3 RFID instrument ]
[ CLIENT ]
client: RRG/Iceman
compiled with GCC 9.2.1 20191008 OS:Linux ARCH:x86_64
[ PROXMARK3 RDV4 ]
external flash: present
smartcard reader: present
[ PROXMARK3 RDV4 Extras ]
FPC USART for BT add-on support: present
[ ARM ]
bootrom: RRG/Iceman/master/0181d5c8-dirty-unclean 2020-04-04 18:48:49
os: RRG/Iceman/master/0181d5c8-dirty-unclean 2020-04-04 18:49:05
compiled with GCC 7.3.1 20180622 (release) [ARM/embedded-7-branch revision 261907]
[ FPGA ]
LF image built for 2s30vq100 on 2020-02-22 at 12:51:14
HF image built for 2s30vq100 on 2020-01-12 at 15:31:16
[ Hardware ]
--= uC: AT91SAM7S512 Rev B
--= Embedded Processor: ARM7TDMI
--= Nonvolatile Program Memory Size: 512K bytes, Used: 282263 bytes (54%) Free: 242025 bytes (46%)
--= Second Nonvolatile Program Memory Size: None
--= Internal SRAM Size: 64K bytes
--= Architecture Identifier: AT91SAM7Sxx Series
--= Nonvolatile Program Memory Type: Embedded Flash Memory
[usb] pm3 --> hf mf h
help This help
list List MIFARE history
darkside Darkside attack
nested Nested attack
hardnested Nested attack for hardened MIFARE Classic cards
staticnested Nested attack against static nonce MIFARE Classic cards
autopwn Automatic key recovery tool for MIFARE Classic
nack Test for MIFARE NACK bug
chk Check keys
fchk Check keys fast, targets all keys on card
decrypt [nt] [ar_enc] [at_enc] [data] - to decrypt sniff or trace
-----------
rdbl Read MIFARE classic block
rdsc Read MIFARE classic sector
dump Dump MIFARE classic tag to binary file
restore Restore MIFARE classic binary file to BLANK tag
wrbl Write MIFARE classic block
setmod Set MIFARE Classic EV1 load modulation strength
auth4 ISO14443-4 AES authentication
-----------
sim Simulate MIFARE card
eclr Clear simulator memory
eget Get simulator memory block
eset Set simulator memory block
eload Load from file emul dump
esave Save to file emul dump
ecfill Fill simulator memory with help of keys from simulator
ekeyprn Print keys from simulator memory
-----------
csetuid Set UID (magic chinese card)
cwipe Wipe card to default UID/Sectors/Keys
csetblk Write block (magic chinese card)
cgetblk Read block (magic chinese card)
cgetsc Read sector (magic chinese card)
cload Load dump (magic chinese card)
csave Save dump from magic chinese card into file or emulator
-----------
mad Checks and prints MAD
ndef Prints NDEF records from card
personalize Personalize UID (Mifare Classic EV1 only)
ice collect MIFARE Classic nonces to file
Offline
Dears fazer and iceman!
1. I successfully flashed the device with firmware RfidResearchGroup
2. I run command hf mf autopwn
[usb] pm3 --> hf mf autopwn
[!] ⚠️ no known key was supplied, key recovery might fail
[+] loaded 23 keys from hardcoded default array
[=] running strategy 1
[=] Chunk: 0.4s | found 0/32 keys (23)
[=] running strategy 2
.
[=] Chunk: 3.9s | found 0/32 keys (23)
[=] --------------------------------------------------------------------------------
[=] executing Darkside attack. Expected execution time: 25sec on average
[=] press pm3-button on the Proxmark3 device to abort both Proxmark3 and client.
[=] --------------------------------------------------------------------------------
................................................................................................................................................................................................................................................
I’ve been waiting for 10 minutes and nothing comes up, only the preloader with dots runs.
Two indicators are lit on the device - blue (d) and orange (c) and nothing happens.
Maybe I'm doing something wrong or should I leave the running command for a long time?
Offline
Hello Rema78, glad to see that you were able to flash your proxmark correctly. Now I advise you to read in the file /doc/commands.md to see how you can get what you are looking for. The advantage we have and this documentation to work, I thank the team for their job. You can also look at the requests already made on the profile of your search.
Have a good day.
Offline
Cheat sheet
https://github.com/RfidResearchGroup/pr … atsheet.md
In your case use the helptext parameter h, to understand the command better.
Offline
Dears iceman and fazer!
1. I run command - hf search:
[usb] pm3 --> hf search
? Searching for ISO14443-A tag...
[+] UID: 43 8B B7 75
[+] ATQA: 00 04
[+] SAK: 08 [2]
[+] POSSIBLE TYPE: MIFARE Classic 1K / Classic 1K CL2
[+] POSSIBLE TYPE: MIFARE Plus 2K / Plus EV1 2K
[+] POSSIBLE TYPE: MIFARE Plus CL2 2K / Plus CL2 EV1 2K
[=] proprietary non iso14443-4 card found, RATS not supported
[+] Prng detection: weak
[+] Valid ISO14443-A tag found
2. I run command - hf mf chk *1 ? d mfc_default_keys:
[usb] pm3 --> hf mf chk *1 ? d mfc_default_keys
[+] Loaded 920 keys from mfc_default_keys
................................................................................................................................................................................................................................................................................................................................................................
[=] Time in checkkeys: 217 seconds
[=] testing to read key B...
[+] found keys:
[+] |-----|----------------|---|----------------|---|
[+] | Sec | key A |res| key B |res|
[+] |-----|----------------|---|----------------|---|
[+] | 000 | ------------ | 0 | ------------ | 0 |
[+] | 001 | ------------ | 0 | ------------ | 0 |
[+] | 002 | ------------ | 0 | ------------ | 0 |
[+] | 003 | ------------ | 0 | ------------ | 0 |
[+] | 004 | ------------ | 0 | ------------ | 0 |
[+] | 005 | ------------ | 0 | ------------ | 0 |
[+] | 006 | ------------ | 0 | ------------ | 0 |
[+] | 007 | ------------ | 0 | ------------ | 0 |
[+] | 008 | ------------ | 0 | ------------ | 0 |
[+] | 009 | ------------ | 0 | ------------ | 0 |
[+] | 010 | ------------ | 0 | ------------ | 0 |
[+] | 011 | ------------ | 0 | ------------ | 0 |
[+] | 012 | ------------ | 0 | ------------ | 0 |
[+] | 013 | ------------ | 0 | ------------ | 0 |
[+] | 014 | ------------ | 0 | ------------ | 0 |
[+] | 015 | ------------ | 0 | ------------ | 0 |
[+] |-----|----------------|---|----------------|---|
[+] ( 0 :Failed / 1 :Success)
[+] Generating binary key file
[+] Found keys have been dumped to hf-mf-438BB775-key.bin --> 0xffffffffffff has been inserted for unknown keys.
3. I run command - hf mf fchk 1 m:
[usb] pm3 --> hf mf fchk 1 m
[+] No key specified, trying default keys
[ 0] ffffffffffff
[ 1] 000000000000
[ 2] a0a1a2a3a4a5
[ 3] b0b1b2b3b4b5
[ 4] c0c1c2c3c4c5
[ 5] d0d1d2d3d4d5
[ 6] aabbccddeeff
[ 7] 1a2b3c4d5e6f
[ 8] 123456789abc
[ 9] 010203040506
[10] 123456abcdef
[11] abcdef123456
[12] 4d3a99c351dd
[13] 1a982c7e459a
[14] d3f7d3f7d3f7
[15] 714c5c886e97
[16] 587ee5f9350f
[17] a0478cc39091
[18] 533cb6c723f6
[19] 8fd0a4f256e9
[20] 0000014b5c31
[21] b578f38a5c61
[22] 96a301bce267
[=] Running strategy 1
[=] Chunk: 0.4s | found 0/32 keys (23)
[=] Running strategy 2
.
[=] Chunk: 3.9s | found 0/32 keys (23)
[=] Time in checkkeys (fast): 4.4s
[!] ⚠️ No keys found
4. I run command - script run hf_bruteforce -s 0x438BB775 -e 0x438BB775 -t 1000 -x mfc:
[usb] pm3 --> script run hf_bruteforce -s 0x438BB775 -e 0x438BB775 -t 1000 -x mfc
[+] executing lua /home/administrator/proxmark3/client/luascripts/hf_bruteforce.lua
[+] args '-s 0x438BB775 -e 0x438BB775 -t 1000 -x mfc'
----------------------------------------
Bruteforcing Mifare Classic card numbers
----------------------------------------
Running: "hf 14a sim t 1 u 000000438bb775"
[+] Emulating ISO/IEC 14443 type A tag with 7 byte UID (00 00 00 43 8B B7 75)
[=] Press pm3-button to abort simulation
I’ve been waiting for 10 minutes and nothing comes up.
One indicator are lit on the device - green (a) and nothing happens.
5. I run command - hf mf autopwn:
[usb] pm3 --> hf mf autopwn
[!] ⚠️ no known key was supplied, key recovery might fail
[+] loaded 23 keys from hardcoded default array
[=] running strategy 1
[=] Chunk: 0.4s | found 0/32 keys (23)
[=] running strategy 2
.
[=] Chunk: 3.9s | found 0/32 keys (23)
[=] --------------------------------------------------------------------------------
[=] executing Darkside attack. Expected execution time: 25sec on average
[=] press pm3-button on the Proxmark3 device to abort both Proxmark3 and client.
[=] --------------------------------------------------------------------------------
.................................................................................................................................................................
I’ve been waiting for 10 minutes and nothing comes up, only the preloader with dots runs.
Two indicators are lit on the device - blue (d) and orange (c) and nothing happens.
I tried different options for the commands. But the keys are still not found.
What am I doing wrong, what other commands do I need to execute?
Offline
Dears iceman, fazer and others!
I beg you to help me.
Offline
I have the same: "No valid keys found."
did you solve it??
Offline
Do you have updates? I am interested in developments in your project...
Offline
Pages: 1