Proxmark3 community

Research, development and trades concerning the powerful Proxmark3 device.

Remember; sharing is caring. Bring something back to the community.


"Learn the tools of the trade the hard way." +Fravia

You are not logged in.

Announcement

Time changes and with it the technology
Proxmark3 @ discord

Users of this forum, please be aware that information stored on this site is not private.

#1 2009-06-19 15:44:01

marcus2608
Contributor
Registered: 2009-03-26
Posts: 30

ReaderIso14443a function - Interpreting SAK from Tag

I am looking at the 20090409_prox package obtained from the files section, and under the iso14443a.c file, ReaderIso14443a function, there is a line of code:

if (receivedAnswer[0] == 0x88) { //code to obtain UID of higher cascade levels }

From my understanding of the ISO_14443_A specs, 0x88 should be understood as "UID complete, PICC not compliant with ISO/IEC 14443-4" (see specs in "FINAL_ISO_IEC_14443-3_2001.pdf" page 19). Is my understanding correct? Hence it should not be asking the tag for more UID bytes.

I have a Mifare Classic 1K card that responded with "88  be  59" for the SAK, that's why I am asking. Thank you.

Offline

#2 2009-06-19 16:39:17

TomBu
Contributor
From: Delft, The Netherlands
Registered: 2008-10-27
Posts: 55
Website

Re: ReaderIso14443a function - Interpreting SAK from Tag

Hi,


I'm having the exact same question.
Look here:
http://www.proxmark.org/forum/topic/229 … 0-uid-bcc/
However I din't look at the ISO_14443_A specs yet.
Thanks for the hint.


Cheers,
Tom

Offline

#3 2009-06-19 19:47:52

rule
Member
Registered: 2008-05-21
Posts: 417

Re: ReaderIso14443a function - Interpreting SAK from Tag

The first byte of the UID during the anti-collision is something different than the SAK (1 byte + 2 CRC)
Check out this page for more information about card types and their vendors.

Offline

#4 2009-06-19 21:13:33

marcus2608
Contributor
Registered: 2009-03-26
Posts: 30

Re: ReaderIso14443a function - Interpreting SAK from Tag

Thanks for the quick reply.

So in my case, my card is a Infineon Mifare Classic 1K card.

However looking back at the code, the condition here is not correct then? Because if the card is a Classic 1K card (0x88), the reader does not need to perform cascade level 2 to get further UID bytes. This is only necessary for JCOP and DESFire cards, right? Thanks!

Offline

Board footer

Powered by FluxBB