Research, development and trades concerning the powerful Proxmark3 device.
Remember; sharing is caring. Bring something back to the community.
"Learn the tools of the trade the hard way." +Fravia
You are not logged in.
Time changes and with it the technology
Proxmark3 @ discord
Users of this forum, please be aware that information stored on this site is not private.
Pages: 1
Hi everyone !
Since I have been working in the Mifare Cards I could not decipher the data dump so I have a couple of cuestions if you don't mind
1) dump cards are encrypted to chiphertext (AES or DES) there is any program to know its contents.
2) I know that the card has a MAD (Mifare application directory) How I deciphered?
Regards my friends
Offline
MAD (Mifare Application Directory), some handy links:
http://www.nxp.com/documents/application_note/AN10787.pdf
git clone https://github.com/dpavlin/perl-Mifare-MAD.git
Offline
A very very brief MAD example:
SECTOR 0
Last edited by asper (2014-01-09 17:53:03)
Offline
Thanks to both of you.
midnitesnake : I taken a look to the source code but it's only work if I have the hex data. It must decrypt the data first.
asper : thanks to the brief MAD example, but it´s the same previous answer-
Is there any way to decrypt or break the DES or AES?
Offline
No way to break them actually.
Offline
I don't think so, I found this
http://www.gnu.org/software/libgcrypt/
I will study more
Offline
These are crypto libraries. To decrypt without knowing cryptographic keys you need to "crack" so "no way to break them actually".
Offline
You are right, These are crypto libraries then I started how to decrypt these "cryptographic keys" and I found this page that describes how to find keys http://gelvaos.blogspot.fr/2011/01/how- … sword.html its very interesting.
The proyect is https://github.com/gelvaos/clj-mifare-pass
Offline
The 1st link is NOT "how to find/recover DES keys" is "how to GENERATE keys" using the provided 3DES algo so, again, no crack is possible.
Offline
Pages: 1