Research, development and trades concerning the powerful Proxmark3 device.
Remember; sharing is caring. Bring something back to the community.
"Learn the tools of the trade the hard way." +Fravia
Time changes and with it the technology
Proxmark3 @ discord
Users of this forum, please be aware that information stored on this site is not private.
Pages: 1
Hey guys
I'm kinda new to this RFID section. I read this badge. It has like 5 entries. Is there any way to manipulate it and add more entries?
[=] Checking for known tags...
[-] Searching for ISO14443-A tag... UID : 10 5C DD 76
ATQA : 00 04
SAK : 08 [2]
TYPE : NXP MIFARE CLASSIC 1k | Plus 2k SL1 | 1k Ev1
[=] proprietary non iso14443-4 card found, RATS not supported
[=] Answers to magic commands: NO
[+] Prng detection: WEAK
[+] Valid ISO14443-A tag found
Later I used the command ''hf mf autopwn'' and I got this .json file:
{
"Created": "proxmark3",
"FileType": "mfcard",
"blocks": {
"0": "105CDD76E7880400468F755559803011",
"1": "EA00C02E000000000000000000000000",
"2": "00000000000000000000000000000000",
"3": "A0A1A2A3A4A5787788C1B0B1B2B3B4B5",
"4": "0FC000000620C3000000000000000000",
"5": "0000000080FFFFAA0000000000000000",
"6": "00000000000000000000000000000000",
"7": "A0A1A2A3A4A50F00FFAA00008627C10A",
"8": "00000000000000000000000000000000",
"9": "00000000000000000000000000000000",
"10": "00000000000000000000000000000000",
"11": "FFFFFFFFFFFF00000000FFFFFFFFFFFF",
"12": "00000000000000000000000000000000",
"13": "00000000000000000000000000000000",
"14": "00000000000000000000000000000000",
"15": "FFFFFFFFFFFF00000000FFFFFFFFFFFF",
"16": "00000000000000000000000000000000",
"17": "00000000000000000000000000000000",
"18": "00000000000000000000000000000000",
"19": "FFFFFFFFFFFF00000000FFFFFFFFFFFF",
"20": "00000000000000000000000000000000",
"21": "00000000000000000000000000000000",
"22": "00000000000000000000000000000000",
"23": "FFFFFFFFFFFF00000000FFFFFFFFFFFF",
"24": "00000000000000000000000000000000",
"25": "00000000000000000000000000000000",
"26": "00000000000000000000000000000000",
"27": "FFFFFFFFFFFF00000000FFFFFFFFFFFF",
"28": "00000000000000000000000000000000",
"29": "00000000000000000000000000000000",
"30": "00000000000000000000000000000000",
"31": "FFFFFFFFFFFF00000000FFFFFFFFFFFF",
"32": "00000000000000000000000000000000",
"33": "00000000000000000000000000000000",
"34": "00000000000000000000000000000000",
"35": "FFFFFFFFFFFF00000000FFFFFFFFFFFF",
"36": "00000000000000000000000000000000",
"37": "00000000000000000000000000000000",
"38": "00000000000000000000000000000000",
"39": "FFFFFFFFFFFF00000000FFFFFFFFFFFF",
"40": "00000000000000000000000000000000",
"41": "00000000000000000000000000000000",
"42": "00000000000000000000000000000000",
"43": "FFFFFFFFFFFF00000000FFFFFFFFFFFF",
"44": "00000000000000000000000000000000",
"45": "00000000000000000000000000000000",
"46": "00000000000000000000000000000000",
"47": "FFFFFFFFFFFF00000000FFFFFFFFFFFF",
"48": "00000000000000000000000000000000",
"49": "00000000000000000000000000000000",
"50": "00000000000000000000000000000000",
"51": "FFFFFFFFFFFF00000000FFFFFFFFFFFF",
"52": "00000000000000000000000000000000",
"53": "00000000000000000000000000000000",
"54": "00000000000000000000000000000000",
"55": "FFFFFFFFFFFF00000000FFFFFFFFFFFF",
"56": "00000000000000000000000000000000",
"57": "00000000000000000000000000000000",
"58": "00000000000000000000000000000000",
"59": "FFFFFFFFFFFF00000000FFFFFFFFFFFF",
"60": "00000000000000000000000000000000",
"61": "00000000000000000000000000000000",
"62": "00000000000000000000000000000000",
"63": "FFFFFFFFFFFF00000000FFFFFFFFFFFF"
},
"Card": {
"UID": "105CDD76",
"SAK": "88",
"ATQA": "0400"
},
"SectorKeys": {
"0": {
"KeyA": "A0A1A2A3A4A5",
"KeyB": "B0B1B2B3B4B5",
"AccessConditions": "787788C1",
"AccessConditionsText": {
"block0": "rdAB wrB",
"block1": "rdAB wrB",
"block2": "rdAB wrB",
"block3": "wrAbyB rdCbyAB wrCbyB wrBbyB",
"UserData": "C1"
}
},
"1": {
"KeyA": "A0A1A2A3A4A5",
"KeyB": "00008627C10A",
"AccessConditions": "0F00FFAA",
"AccessConditionsText": {
"block4": "rdB wrB",
"block5": "rdB wrB",
"block6": "rdB wrB",
"block7": "wrAbyB rdCbyAB wrCbyB wrBbyB",
"UserData": "AA"
}
},
"2": {
"KeyA": "FFFFFFFFFFFF",
"KeyB": "FFFFFFFFFFFF",
"AccessConditions": "00000000",
"AccessConditionsText": {
"block8": "rdAB wrAB incAB dectrAB",
"block9": "rdAB wrAB incAB dectrAB",
"block10": "rdAB wrAB incAB dectrAB",
"block11": "rdAbyA rdCbyA rdBbyA wrBbyA",
"UserData": "00"
}
},
"3": {
"KeyA": "FFFFFFFFFFFF",
"KeyB": "FFFFFFFFFFFF",
"AccessConditions": "00000000",
"AccessConditionsText": {
"block12": "rdAB wrAB incAB dectrAB",
"block13": "rdAB wrAB incAB dectrAB",
"block14": "rdAB wrAB incAB dectrAB",
"block15": "rdAbyA rdCbyA rdBbyA wrBbyA",
"UserData": "00"
}
},
"4": {
"KeyA": "FFFFFFFFFFFF",
"KeyB": "FFFFFFFFFFFF",
"AccessConditions": "00000000",
"AccessConditionsText": {
"block16": "rdAB wrAB incAB dectrAB",
"block17": "rdAB wrAB incAB dectrAB",
"block18": "rdAB wrAB incAB dectrAB",
"block19": "rdAbyA rdCbyA rdBbyA wrBbyA",
"UserData": "00"
}
},
"5": {
"KeyA": "FFFFFFFFFFFF",
"KeyB": "FFFFFFFFFFFF",
"AccessConditions": "00000000",
"AccessConditionsText": {
"block20": "rdAB wrAB incAB dectrAB",
"block21": "rdAB wrAB incAB dectrAB",
"block22": "rdAB wrAB incAB dectrAB",
"block23": "rdAbyA rdCbyA rdBbyA wrBbyA",
"UserData": "00"
}
},
"6": {
"KeyA": "FFFFFFFFFFFF",
"KeyB": "FFFFFFFFFFFF",
"AccessConditions": "00000000",
"AccessConditionsText": {
"block24": "rdAB wrAB incAB dectrAB",
"block25": "rdAB wrAB incAB dectrAB",
"block26": "rdAB wrAB incAB dectrAB",
"block27": "rdAbyA rdCbyA rdBbyA wrBbyA",
"UserData": "00"
}
},
"7": {
"KeyA": "FFFFFFFFFFFF",
"KeyB": "FFFFFFFFFFFF",
"AccessConditions": "00000000",
"AccessConditionsText": {
"block28": "rdAB wrAB incAB dectrAB",
"block29": "rdAB wrAB incAB dectrAB",
"block30": "rdAB wrAB incAB dectrAB",
"block31": "rdAbyA rdCbyA rdBbyA wrBbyA",
"UserData": "00"
}
},
"8": {
"KeyA": "FFFFFFFFFFFF",
"KeyB": "FFFFFFFFFFFF",
"AccessConditions": "00000000",
"AccessConditionsText": {
"block32": "rdAB wrAB incAB dectrAB",
"block33": "rdAB wrAB incAB dectrAB",
"block34": "rdAB wrAB incAB dectrAB",
"block35": "rdAbyA rdCbyA rdBbyA wrBbyA",
"UserData": "00"
}
},
"9": {
"KeyA": "FFFFFFFFFFFF",
"KeyB": "FFFFFFFFFFFF",
"AccessConditions": "00000000",
"AccessConditionsText": {
"block36": "rdAB wrAB incAB dectrAB",
"block37": "rdAB wrAB incAB dectrAB",
"block38": "rdAB wrAB incAB dectrAB",
"block39": "rdAbyA rdCbyA rdBbyA wrBbyA",
"UserData": "00"
}
},
"10": {
"KeyA": "FFFFFFFFFFFF",
"KeyB": "FFFFFFFFFFFF",
"AccessConditions": "00000000",
"AccessConditionsText": {
"block40": "rdAB wrAB incAB dectrAB",
"block41": "rdAB wrAB incAB dectrAB",
"block42": "rdAB wrAB incAB dectrAB",
"block43": "rdAbyA rdCbyA rdBbyA wrBbyA",
"UserData": "00"
}
},
"11": {
"KeyA": "FFFFFFFFFFFF",
"KeyB": "FFFFFFFFFFFF",
"AccessConditions": "00000000",
"AccessConditionsText": {
"block44": "rdAB wrAB incAB dectrAB",
"block45": "rdAB wrAB incAB dectrAB",
"block46": "rdAB wrAB incAB dectrAB",
"block47": "rdAbyA rdCbyA rdBbyA wrBbyA",
"UserData": "00"
}
},
"12": {
"KeyA": "FFFFFFFFFFFF",
"KeyB": "FFFFFFFFFFFF",
"AccessConditions": "00000000",
"AccessConditionsText": {
"block48": "rdAB wrAB incAB dectrAB",
"block49": "rdAB wrAB incAB dectrAB",
"block50": "rdAB wrAB incAB dectrAB",
"block51": "rdAbyA rdCbyA rdBbyA wrBbyA",
"UserData": "00"
}
},
"13": {
"KeyA": "FFFFFFFFFFFF",
"KeyB": "FFFFFFFFFFFF",
"AccessConditions": "00000000",
"AccessConditionsText": {
"block52": "rdAB wrAB incAB dectrAB",
"block53": "rdAB wrAB incAB dectrAB",
"block54": "rdAB wrAB incAB dectrAB",
"block55": "rdAbyA rdCbyA rdBbyA wrBbyA",
"UserData": "00"
}
},
"14": {
"KeyA": "FFFFFFFFFFFF",
"KeyB": "FFFFFFFFFFFF",
"AccessConditions": "00000000",
"AccessConditionsText": {
"block56": "rdAB wrAB incAB dectrAB",
"block57": "rdAB wrAB incAB dectrAB",
"block58": "rdAB wrAB incAB dectrAB",
"block59": "rdAbyA rdCbyA rdBbyA wrBbyA",
"UserData": "00"
}
},
"15": {
"KeyA": "FFFFFFFFFFFF",
"KeyB": "FFFFFFFFFFFF",
"AccessConditions": "00000000",
"AccessConditionsText": {
"block60": "rdAB wrAB incAB dectrAB",
"block61": "rdAB wrAB incAB dectrAB",
"block62": "rdAB wrAB incAB dectrAB",
"block63": "rdAbyA rdCbyA rdBbyA wrBbyA",
"UserData": "00"
}
}
}
}
Last edited by Dranked (2019-09-17 16:27:53)
Hello,
i do not know, if you can use "autopwn" for a "WEAK"-tag!
Try "hf mf nested 1 0 A a0a1a2a3a4a5 d" to get a dump of your tag!
Hey, thanks for the commands. I'm gonna test them out and give you output.
Last edited by Dranked (2019-09-18 12:25:28)