Proxmark3 community

Research, development and trades concerning the powerful Proxmark3 device.

Remember; sharing is caring. Bring something back to the community.


"Learn the tools of the trade the hard way." +Fravia

You are not logged in.

Announcement

Time changes and with it the technology
Proxmark3 @ discord

Users of this forum, please be aware that information stored on this site is not private.

#1 2017-09-19 21:10:47

Stardork
Contributor
Registered: 2017-09-19
Posts: 3

Using Proxmark3 on CharlieCard: Mifare 1k (newer model, no PRNG)

I am trying to crack the CharlieCard system as a side project and it uses the newer models that don't work for Darkside attacks due to the lack of a psudo random number generator. I am thinking that at this point the only choice left is to do a sniff, but I'm not entirely sure how that would work. would it be as easy as running the command while it's attached to my laptop? What kind of output does it give me?
I'm kind of new to this, so any help is appreciated!

For the question I'm sure someone will ask: no, I don't have any of the keys already.

EDIT: I am not planning on manipulating the card or doing anything illegal, I just want to see if I /could/

Last edited by Stardork (2017-09-19 21:11:43)

Offline

#2 2017-09-21 04:26:15

Dot.Com
Contributor
From: Hong Kong
Registered: 2016-10-05
Posts: 180
Website

Re: Using Proxmark3 on CharlieCard: Mifare 1k (newer model, no PRNG)

hf mf sniff
hf list 14a
Use the crapto method.
Need crapto GUI and Diagram to decode it. smile

http://pan.baidu.com/s/1o7Pg7qE (crapto gui)

Offline

Board footer

Powered by FluxBB