Research, development and trades concerning the powerful Proxmark3 device.
Remember; sharing is caring. Bring something back to the community.
"Learn the tools of the trade the hard way." +Fravia
Time changes and with it the technology
Proxmark3 @ discord
Users of this forum, please be aware that information stored on this site is not private.
Pages: 1
Warning: all of the following is my understanding of Google translation from Russian. Native speakers are welcome to correct.
TL;DR: like darkside, yet better. But a special reader is necessary (I know you hate this phrase).
So, someone claims a new (in 2016 and not yet discussed there) attack against Classic [3][4]. It recovers one key in presence of weak PRNG, and has more chances to succeed compared to mfcuk/darkside.
The attack is published as a win32/win64 binary for a specific reader RD-03AB, as a demo of its capabilities, on its page [1].
Executables are not obfuscated, but not easy to read either. Reader API documentation [2] may help.
Nothing is provided for normal readers, libnfc is not supported, and their reader is not easy to get (no buy button, Belarus-based company [5]), so I can't actually verify this attack.
Is it something worth exploring? Does anybody already know the details?
[1] https://www.anyram.net/anyram_ru/develo … /index.php
[2] https://www.anyram.net/anyram_ru/develo … b-2-DS.pdf
[3] https://anyram.net/blog_ru/?p=712
[4] https://anyram.net/blog_ru/?p=954
[5] https://www.anyram.net/anyram_ru/contacts/index.php