Research, development and trades concerning the powerful Proxmark3 device.
Remember; sharing is caring. Bring something back to the community.
"Learn the tools of the trade the hard way." +Fravia
Time changes and with it the technology
Proxmark3 @ discord
Users of this forum, please be aware that information stored on this site is not private.
Pages: 1
Hi, some mifare clone card always send same random number (nt), I tried hardnested attack, but they always get wrong key, so whether hardnested can crack this card? Anyone has idea about this type of mifare card?
Here is log:
I know the key is 0xFFFFFFFFFFFF, but hardnested get wrong key 0c00401045b7.
--target block no: 0, target key type:A, known target key: 0x000000000000 (not set), file action: read, Slow: No, Tests: 0
Using AVX2 SIMD core.
time | #nonces | Activity | expected to brute force
| | | #states | time
------------------------------------------------------------------------------------------------------
0 | 0 | Start using 4 threads and AVX2 SIMD core | |
0 | 0 | Brute force benchmark: 533 million (2^29.0) keys/s | 140737488355328 | 3d
1 | 0 | Using 235 precalculated bitflip state tables | 140737488355328 | 3d
3 | 0 | Reading nonces from file nonces.bin... | 140737488355328 | 3d
3 | 12096 | Read 12096 nonces from file. cuid=b94fda14 | 140737488355328 | 3d
3 | 12096 | Target Block=4, Keytype=A | 140737488355328 | 3d
3 | 12096 | (1. guess: Sum(a8) = 0) | 0 | 0s
12 | 12096 | Apply Sum(a8) and all bytes bitflip properties | nan | nand
12 | 12096 | Starting brute force... | 0 | 0s
12 | 12096 | Brute force phase completed. Key found: 0c00401045b7 | 0 | 0s
--target block no: 0, target key type:A, known target key: 0x000000000000 (not set), file action: read, Slow: No, Tests: 0
Using AVX2 SIMD core.
time | #nonces | Activity | expected to brute force
| | | #states | time
------------------------------------------------------------------------------------------------------
0 | 0 | Start using 4 threads and AVX2 SIMD core | |
0 | 0 | Brute force benchmark: 500 million (2^28.9) keys/s | 140737488355328 | 3d
1 | 0 | Using 235 precalculated bitflip state tables | 140737488355328 | 3d
3 | 0 | Reading nonces from file nonces.bin... | 140737488355328 | 3d
3 | 12096 | Read 12096 nonces from file. cuid=b94fda14 | 140737488355328 | 3d
3 | 12096 | Target Block=4, Keytype=A | 140737488355328 | 3d
3 | 12096 | (1. guess: Sum(a8) = 0) | 0 | 0s
12 | 12096 | Apply Sum(a8) and all bytes bitflip properties | nan | nand
12 | 12096 | Starting brute force... | 0 | 0s
12 | 12096 | Brute force phase completed. Key found: 0c00401045b7 | 0 | 0s
Recorded Activity (TraceLen = 39857 bytes)
Start = Start of Start Bit, End = End of last modulation. Src = Source of Transfer
iso14443a - All times are in carrier periods (1/13.56Mhz)
iClass - Timings are not as accurate
Start | End | Src | Data (! denotes parity error, ' denotes short bytes) | CRC | Annotation |
------------|------------|-----|-----------------------------------------------------------------|-----|--------------------|
0 | 992 | Rdr | 52' | | WUPA
2228 | 4596 | Tag | 04 00 | |
7040 | 9504 | Rdr | 93 20 | | ANTICOLL
10676 | 16564 | Tag | b9 4f da 14 38 | |
19072 | 29600 | Rdr | 93 70 b9 4f da 14 38 7d c1 | ok | SELECT_UID
30772 | 34292 | Tag | 08 b6 dd | |
35968 | 40672 | Rdr | 60 00 f5 7b | ok | AUTH-A(0)
42676 | 47412 | Tag | 01 20 01 45 | |
57088 | 66464 | Rdr | f3! 48 21! 0c a8! cb 46 c7 | !crc| ?
67636 | 72372 | Tag | a1! c1! 4f! cf! | |
78208 | 82912 | Rdr | 57 77 38 1e | !crc| ?
84916 | 89652 | Tag | 81! 90! c7! dc | |
90880 | 92128 | Rdr | 00 | | ?
106496 | 107488 | Rdr | 52' | | WUPA
108724 | 111092 | Tag | 04 00 | |
113664 | 124192 | Rdr | 93 70 b9 4f da 14 38 7d c1 | ok | SELECT_UID
125364 | 128884 | Tag | 08 b6 dd | |
130560 | 135264 | Rdr | 60 00 f5 7b | ok | AUTH-A(0)
137268 | 142004 | Tag | 01 20 01 45 | |
151680 | 161056 | Rdr | f3! 48 21! 0c a8! cb 46 c7 | !crc| ?
162228 | 166964 | Tag | a1! c1! 4f! cf! | |
172800 | 177504 | Rdr | 57 77 38 1e | !crc| ?
179508 | 184244 | Tag | 81! 90! c7! dc | |
185472 | 186720 | Rdr | 00 | | ?
201088 | 202080 | Rdr | 52' | | WUPA
203316 | 205684 | Tag | 04 00 | |
208256 | 218784 | Rdr | 93 70 b9 4f da 14 38 7d c1 | ok | SELECT_UID
219956 | 223476 | Tag | 08 b6 dd | |
225152 | 229856 | Rdr | 60 00 f5 7b | ok | AUTH-A(0)
231860 | 236596 | Tag | 01 20 01 45 | |
246272 | 255648 | Rdr | f3! 48 21! 0c a8! cb 46 c7 | !crc| ?
256820 | 261556 | Tag | a1! c1! 4f! cf! | |
267392 | 272096 | Rdr | 57 77 38 1e | !crc| ?
274100 | 278836 | Tag | 81! 90! c7! dc | |
280064 | 281312 | Rdr | 00 | | ?
295680 | 296672 | Rdr | 52' | | WUPA
297908 | 300276 | Tag | 04 00 | |
302848 | 313376 | Rdr | 93 70 b9 4f da 14 38 7d c1 | ok | SELECT_UID
314548 | 318068 | Tag | 08 b6 dd | |
319744 | 324448 | Rdr | 60 00 f5 7b | ok | AUTH-A(0)
326452 | 331188 | Tag | 01 20 01 45 | |
340864 | 350240 | Rdr | f3! 48 21! 0c a8! cb 46 c7 | !crc| ?
351412 | 356148 | Tag | a1! c1! 4f! cf! | |
361984 | 366688 | Rdr | 57 77 38 1e | !crc| ?
368692 | 373428 | Tag | 81! 90! c7! dc | |
374656 | 375904 | Rdr | 00 | | ?
390272 | 391264 | Rdr | 52' | | WUPA
392500 | 394868 | Tag | 04 00 | |
397440 | 407968 | Rdr | 93 70 b9 4f da 14 38 7d c1 | ok | SELECT_UID
409140 | 412660 | Tag | 08 b6 dd | |
414336 | 419040 | Rdr | 60 00 f5 7b | ok | AUTH-A(0)
421044 | 425780 | Tag | 01 20 01 45 | |
435456 | 444832 | Rdr | f3! 48 21! 0c a8! cb 46 c7 | !crc| ?
446004 | 450740 | Tag | a1! c1! 4f! cf! | |
456576 | 461280 | Rdr | 57 77 38 1e | !crc| ?
463284 | 468020 | Tag | 81! 90! c7! dc | |
469248 | 470496 | Rdr | 00 | | ?
484864 | 485856 | Rdr | 52' | | WUPA
487092 | 489460 | Tag | 04 00 | |
492032 | 502560 | Rdr | 93 70 b9 4f da 14 38 7d c1 | ok | SELECT_UID
503732 | 507252 | Tag | 08 b6 dd | |
508928 | 513632 | Rdr | 60 00 f5 7b | ok | AUTH-A(0)
515636 | 520372 | Tag | 01 20 01 45 | |
530048 | 539424 | Rdr | f3! 48 21! 0c a8! cb 46 c7 | !crc| ?
540596 | 545332 | Tag | a1! c1! 4f! cf! | |
551168 | 555872 | Rdr | 57 77 38 1e | !crc| ?
557876 | 562612 | Tag | 81! 90! c7! dc | |
563840 | 565088 | Rdr | 00 | | ?
579456 | 580448 | Rdr | 52' | | WUPA
581684 | 584052 | Tag | 04 00 | |
586624 | 597152 | Rdr | 93 70 b9 4f da 14 38 7d c1 | ok | SELECT_UID
598324 | 601844 | Tag | 08 b6 dd | |
603520 | 608224 | Rdr | 60 00 f5 7b | ok | AUTH-A(0)
610228 | 614964 | Tag | 01 20 01 45 | |
624640 | 634016 | Rdr | f3! 48 21! 0c a8! cb 46 c7 | !crc| ?
635188 | 639924 | Tag | a1! c1! 4f! cf! | |
645760 | 650464 | Rdr | 57 77 38 1e | !crc| ?
652468 | 657204 | Tag | 81! 90! c7! dc | |
658432 | 659680 | Rdr | 00 | | ?
674048 | 675040 | Rdr | 52' | | WUPA
676276 | 678644 | Tag | 04 00 | |
681216 | 691744 | Rdr | 93 70 b9 4f da 14 38 7d c1 | ok | SELECT_UID
692916 | 696436 | Tag | 08 b6 dd | |
698112 | 702816 | Rdr | 60 00 f5 7b | ok | AUTH-A(0)
704820 | 709556 | Tag | 01 20 01 45 | |
719232 | 728608 | Rdr | f3! 48 21! 0c a8! cb 46 c7 | !crc| ?
729780 | 734516 | Tag | a1! c1! 4f! cf! | |
740352 | 745056 | Rdr | 57 77 38 1e | !crc| ?
747060 | 751796 | Tag | 81! 90! c7! dc | |
753024 | 754272 | Rdr | 00 | | ?
768640 | 769632 | Rdr | 52' | | WUPA
770868 | 773236 | Tag | 04 00 | |
775808 | 786336 | Rdr | 93 70 b9 4f da 14 38 7d c1 | ok | SELECT_UID
787508 | 791028 | Tag | 08 b6 dd | |
792704 | 797408 | Rdr | 60 00 f5 7b | ok | AUTH-A(0)
799412 | 804148 | Tag | 01 20 01 45 | |
813824 | 823200 | Rdr | f3! 48 21! 0c a8! cb 46 c7 | !crc| ?
824372 | 829108 | Tag | a1! c1! 4f! cf! | |
834944 | 839648 | Rdr | 57 77 38 1e | !crc| ?
841652 | 846388 | Tag | 81! 90! c7! dc | |
847616 | 848864 | Rdr | 00 | | ?
863232 | 864224 | Rdr | 52' | | WUPA
865460 | 867828 | Tag | 04 00 | |
870400 | 880928 | Rdr | 93 70 b9 4f da 14 38 7d c1 | ok | SELECT_UID
882100 | 885620 | Tag | 08 b6 dd | |
887296 | 892000 | Rdr | 60 00 f5 7b | ok | AUTH-A(0)
894004 | 898740 | Tag | 01 20 01 45 | |
908416 | 917792 | Rdr | f3! 48 21! 0c a8! cb 46 c7 | !crc| ?
918964 | 923700 | Tag | a1! c1! 4f! cf! | |
929536 | 934240 | Rdr | 57 77 38 1e | !crc| ?
936244 | 940980 | Tag | 81! 90! c7! dc | |
942208 | 943456 | Rdr | 00 | | ?
957824 | 958816 | Rdr | 52' | | WUPA
960052 | 962420 | Tag | 04 00 | |
Last edited by mysx (2019-09-29 03:31:02)
I'm new to the forum and I need help
Hello you can tell me that you have to use commands with Prof Mark to be able to read the keys in a me make classic
Honestly I can not understand what commands you have to enter so that give me all the keys and all blocks do not know how to do you can help me please