Research, development and trades concerning the powerful Proxmark3 device.
Remember; sharing is caring. Bring something back to the community.
"Learn the tools of the trade the hard way." +Fravia
You are not logged in.
Time changes and with it the technology
Proxmark3 @ discord
Users of this forum, please be aware that information stored on this site is not private.
Pages: 1
Hi
I have a PCF7936 card in crypto mode, a reader that works with the key and Proxmark 3 Easy from china.
I need to extract the crypto key and be able to duplicate the keys.
1) Is it possible to do that with Proxmark 3 Easy?
2) I could $pay$ for remote support with the task.
3) Is there an easier way/equipment for key extraction and card duplication?
Thank you
Last edited by DenisP (2021-03-27 05:38:20)
Offline
This is what I get when sniffing the communication between the reader and the card
recorded activity:
ETU :nbits: who bytes
---------+-----+----+-----------
+ 0: 2: TAG 40
+ 32: 2: 80
+ 1156: 1: 00
+ 255: 4: TAG 50!
+ 32: 1: 00
+ 1157: 1: 00
+ 254: 4: TAG 50!
+ 32: 1: 00
+ 1157: 1: 00
+ 251: 4: TAG 50!
+ 62: 1: 00
+ 1155: 1: 00
+ 254: 4: TAG 50!
+ 62: 1: 00
+ 1086: 4: 80
+ 32: 2: 80
+ 38: 3: 80
+ 1059: 5: c0
+ 1446: 31: 7b eb d0 8c
Last edited by DenisP (2021-03-24 06:13:27)
Offline
Is there a Proxmark 3 script for the key brute force attack?
Offline
time to give up
Offline
Not yet!
I purchased this awesome tool.
https://www.xhorsekey.com/wholesale/xhorse-vvdi-mini-key-tool.html
And it is almost working. It recognizes the chip type and should do the communication sniffing. But it doesn't.
Offline
Not yet!
I purchased this awesome tool.
https://www.xhorsekey.com/wholesale/xhorse-vvdi-mini-key-tool.htmlAnd it is almost working. It recognizes the chip type and should do the communication sniffing. But it doesn't.
this is holy bullshxt product and dont believe it!!! so many tools on market claim they can do this or do that, all lies and bull shxt!!!then the seller push you to buy more shxt products ,manipulating your anxiety only.....the PM3 is the only best tool to consider Pal.
I told you before that we have tried all tools on the market and none of them works . you can try if you have enough spare dollars to spend ^_^LOL if you have so much spare time please help make PM3 stronger starting with the whitepapers instead of buying crap tools on internet^_^
Last edited by yukihama (2021-06-10 15:23:01)
Offline
you would need to sniff the communications.
You can either use RFidler or Pm3. When it comes to good Hitag2 sniffing... I am not sure if official or rrg/iceman is good enough.
The part in the sniffing to extract the needed auth exchange is needed to then run the much improved key recovery.
Haven't seen anyone do it however.
Offline
Pages: 1