Research, development and trades concerning the powerful Proxmark3 device.
Remember; sharing is caring. Bring something back to the community.
"Learn the tools of the trade the hard way." +Fravia
You are not logged in.
Time changes and with it the technology
Proxmark3 @ discord
Users of this forum, please be aware that information stored on this site is not private.
Pages: 1
Topic closed
[usb] pm3 --> hf 14a info
[+] UID: 3E 52 88 72
[+] ATQA: 00 04
[+] SAK: 08 [2]
[+] Possible types:
[+] MIFARE Classic 1K
[=] proprietary non iso14443-4 card found, RATS not supported
[+] Prng detection....... hard
[=]
[=] --- Tag Signature
[=] IC signature public key name: NXP MIFARE Classic MFC1C14_x
[=] IC signature public key value: 044F6D3F294DEA5737F0F46FFEE88A356EED95695DD7E0C27A591E6F6F65962BAF
[=] Elliptic curve parameters: NID_secp128r1
[=] TAG IC Signature: CB3613D25D20799363AA43493B7F7AC484292830AF8FA9A41B97BC3316478870
[+] Signature verification: successful
[?] Hint: try `hf mf` commands
[+] found keys:
[+] -----+-----+--------------+---+--------------+----
[+] Sec | Blk | key A |res| key B |res
[+] -----+-----+--------------+---+--------------+----
[+] 000 | 003 | FFFFFFFFFFFF | D | FFFFFFFFFFFF | D
[+] 001 | 007 | A754DE67A103 | H | A0A1A2A3A4A5 | D
[+] 002 | 011 | FFFFFFFFFFFF | D | 5B6871180EC0 | D
[+] 003 | 015 | A8F1DF072B30 | H | FFFFFFFFFFFF | D
[+] 004 | 019 | 64E3EBAB6B5E | H | 96075C554F02 | A
[+] 005 | 023 | FC041EC3840B | H | FFFFFFFFFFFF | D
[+] 006 | 027 | FFFFFFFFFFFF | D | FFFFFFFFFFFF | D
[+] 007 | 031 | FFFFFFFFFFFF | D | FFFFFFFFFFFF | D
[+] 008 | 035 | FFFFFFFFFFFF | D | FFFFFFFFFFFF | D
[+] 009 | 039 | FFFFFFFFFFFF | D | FFFFFFFFFFFF | D
[+] 010 | 043 | FFFFFFFFFFFF | D | FFFFFFFFFFFF | D
[+] 011 | 047 | FFFFFFFFFFFF | D | FFFFFFFFFFFF | D
[+] 012 | 051 | FFFFFFFFFFFF | D | FFFFFFFFFFFF | D
[+] 013 | 055 | FFFFFFFFFFFF | D | FFFFFFFFFFFF | D
[+] 014 | 059 | FFFFFFFFFFFF | D | FFFFFFFFFFFF | D
[+] 015 | 063 | FFFFFFFFFFFF | D | FFFFFFFFFFFF | D
[+] 016 | 067 | 5C8FF9990DA2 | D | D01AFEEB890A | D
[+] 017 | 071 | 75CCB59C9BED | D | 4B791BEA7BCC | D
[+] -----+-----+--------------+---+--------------+----
[=] ( D:Dictionary / S:darkSide / U:User / R:Reused / N:Nested / H:Hardnested / C:statiCnested / A:keyA )
[+] Generating binary key file
[+] Found keys have been dumped to C:\Users\admin\Downloads\rrg_other-20240118-3ccfd5835cdb47ed7dbc66142b75c458950955c9\client\/hf-mf-3E528872-key.bin
[=] --[ FFFFFFFFFFFF ]-- has been inserted for unknown keys where res is 0
[=] transferring keys to simulator memory ( ok )
[=] dumping card content to emulator memory (Cmd Error: 04 can occur)
[=] downloading card content from emulator memory
[+] saved 1024 bytes to binary file C:\Users\admin\Downloads\rrg_other-20240118-3ccfd5835cdb47ed7dbc66142b75c458950955c9\client\/hf-mf-3E528872-dump.bin
[+] saved to json file C:\Users\admin\Downloads\rrg_other-20240118-3ccfd5835cdb47ed7dbc66142b75c458950955c9\client\/hf-mf-3E528872-dump.json
[=] autopwn execution time: 80 seconds
This card has 17 sectors, but after decryption, the hf-mf-3E528872 dump bin obtained is only 1024 bytes
Offline
This is the introduction channel. Please post in correct topic.
Offline
Pages: 1
Topic closed