Research, development and trades concerning the powerful Proxmark3 device.
Remember; sharing is caring. Bring something back to the community.
"Learn the tools of the trade the hard way." +Fravia
Time changes and with it the technology
Proxmark3 @ discord
Users of this forum, please be aware that information stored on this site is not private.
Hello everybody,
i find Key A and Key B of my hardnested Mifare 4K-tag with my Proxmark3 "Easy" via hardnested attack!
Subsequently i stored them to emulator memory and confirmed them as valid keys!
How can i now write them to dumpkeys.bin-file?
Many, many thanks in advance!
Last edited by Ollibolli (2019-05-10 15:05:57)
Hello iceman,
thanks for your answer!
To edit the dumpkeys.bin-file, i have to write/create one first!
But how after successfull hardnested attack?
If i use a usual dumpkeys.bin-file, how i have to write the keys inside?
Is it just necessary to write each key once anywhere inside of the file (replacing existing FFFFFFFFFFFF-keys) or have i to put each key in a specific row and/or column?
Last edited by Ollibolli (2019-05-12 11:13:21)
I mean: I have added the function which you requested. You can download with
git checkout -b pwpiwi-dumpkeys master
git pull https://github.com/pwpiwi/proxmark3.git
Then compile as usual and dump your keys with 'hf mf ekeyprn d'.
If your tests are successful this will be included into the master branch on github.