Research, development and trades concerning the powerful Proxmark3 device.
Remember; sharing is caring. Bring something back to the community.
"Learn the tools of the trade the hard way." +Fravia
Time changes and with it the technology
Proxmark3 @ discord
Users of this forum, please be aware that information stored on this site is not private.
hw ver
bootrom: master/v3.1.0-173-ga749b1e-suspect 2020-01-09 14:36:52
os: master/v3.1.0-209-g6116334-suspect 2022-02-05 14:02:44
fpga_lf.bit built for 2s30vq100 on 2019/11/21 at 09:02:37
fpga_hf.bit built for 2s30vq100 on 2020/03/05 at 19:09:39
hf search
UID : XX XX XX XX
ATQA : 00 04
SAK : 08 [2]
TYPE : NXP MIFARE CLASSIC 1k | Plus 2k SL1
proprietary non iso14443-4 card found, RATS not supported
No chinese magic backdoor command detected
Prng detection: WEAK
Valid ISO14443A Tag Found - Quiting Search
hf mfp info
UID : XX XX XX XX
ATQA : 00 04
SAK : 08 [2]
TYPE : NXP MIFARE CLASSIC 1k | Plus 2k SL1
proprietary non iso14443-4 card found, RATS not supported
No chinese magic backdoor command detected
Prng detection: WEAK
Waiting for a response from the proxmark... ERROR
hf mf chk *1 ? d default_keys.dic
No valid keys found.
hf mf mifare
Card is not vulnerable to Darkside attack (doesn't send NACK on authentication requests).
hf mf nested OR hf mf hardnested without 1 valid key is not an option.
proceeding to experiment with lua scripting..
script run mfkeys.lua
No response from card
debugging mfkeys.lua
local function main(args)
result, err = reader.read14443a(false, true)
reader.read14443a <------ ERROR
new approach
bootrom: RRG/Iceman/master/v4.14831-273-g3c4bf9ed3 2022-02-13 13:53:16
os: RRG/Iceman/master/v4.14831-273-g3c4bf9ed3 2022-02-13 13:53:23
LF image built for 2s30vq100 on 2020-07-08 at 23:08:07
HF image built for 2s30vq100 on 2020-07-08 at 23:08:19
HF FeliCa image built for 2s30vq100 on 2020-07-08 at 23:08:30
hw tune
[=] ---------- LF Antenna ----------
[+] LF antenna: 26.03 V - 125.00 kHz
[+] LF antenna: 29.12 V - 134.83 kHz
[+] LF optimal: 33.12 V - 130.43 kHz
[+] Approx. Q factor (*): 9.0 by frequency bandwidth measurement
[+] Approx. Q factor (*): 9.6 by peak voltage measurement
[+] LF antenna is OK
[=] ---------- HF Antenna ----------
[+] HF antenna: 36.28 V - 13.56 MHz
[+] Approx. Q factor (*): 10.5 by peak voltage measurement
[+] HF antenna is OK
auto
[=] hf search
[-] Searching for ISO14443-A tag...
[+] UID: XX XX XX XX
[+] ATQA: 00 04
[+] SAK: 08 [2]
[+] Possible types:
[+] MIFARE Classic 1K
[=] proprietary non iso14443-4 card found, RATS not supported
[#] 1 static nonce 01200145
[+] Static nonce: yes
[#] Auth error
[?] Hint: try `hf mf` commands
[+] Valid ISO 14443-A tag found
hf mf autopwn
[#] 1 static nonce 01200145
[!] no known key was supplied, key recovery might fail
[+] loaded 42 keys from hardcoded default array
[=] running strategy 1
[=] Chunk 0.6s | found 0/32 keys (42)
[=] running strategy 2
[=] ..
[=] Chunk 7.0s | found 0/32 keys (42)
[-] No usable key was found!
hf mf nack
[=] Checking for NACK bug
......................................
[+] NACK test: no bug
script run hf_mf_autopwn.lua
Running darkside ..........ERROR: Card is not vulnerable to Darkside attack (doesn't send NACK on authentication requests).
script run hf_mf_keycheck.lua
Checkkey execution time: 280 sec
NO KEYS FOUND...Do you wish to save the keys to dumpfile? [y/n] ?
Last edited by pbtek (2022-02-13 20:24:17)