Proxmark3 community

Research, development and trades concerning the powerful Proxmark3 device.

Remember; sharing is caring. Bring something back to the community.


"Learn the tools of the trade the hard way." +Fravia

You are not logged in.

Announcement

Time changes and with it the technology
Proxmark3 @ discord

Users of this forum, please be aware that information stored on this site is not private.

#1 2019-03-08 18:53:39

sher96
Contributor
Registered: 2019-03-06
Posts: 12

hi

hello,
I bought the pm3 easy and I arrived last week, I installed the drivers.
when I go to do hf mf mifare tells me that he is not vulnerable to attack.
I have read various discussions on the forum but I have not been able to solve it

Prox/RFID mark3 RFID instrument
bootrom: master/v3.1.0-70-g1338d24-dirty-suspect 2019-03-07 14:03:05
os: master/v3.1.0-70-g1338d24-dirty-suspect 2019-03-07 14:03:13
fpga_lf.bit built for 2s30vq100 on 2015/03/06 at 07:38:04
fpga_hf.bit built for 2s30vq100 on 2019/02/15 at 20:40:32
SmartCard Slot: not available

uC: AT91SAM7S512 Rev B
Embedded Processor: ARM7TDMI
Nonvolatile Program Memory Size: 512K bytes. Used: 205228 bytes (39%). Free: 319060 bytes (61%).
Second Nonvolatile Program Memory Size: None
Internal SRAM Size: 64K bytes

proxmark3> hf 14a read
UID : ad 80 11 96
ATQA : 00 04
SAK : 08 [2]
TYPE : NXP MIFARE CLASSIC 1k | Plus 2k SL1
proprietary non iso14443-4 card found, RATS not supported
Answers to chinese magic backdoor commands: NO

proxmark3> hf mf chk *1 ? t
No key specified, trying default keys
chk default key[ 0] ffffffffffff
chk default key[ 1] 000000000000
chk default key[ 2] a0a1a2a3a4a5
chk default key[ 3] b0b1b2b3b4b5
chk default key[ 4] aabbccddeeff
chk default key[ 5] 4d3a99c351dd
chk default key[ 6] 1a982c7e459a
chk default key[ 7] d3f7d3f7d3f7
chk default key[ 8] 714c5c886e97
chk default key[ 9] 587ee5f9350f
chk default key[10] a0478cc39091
chk default key[11] 533cb6c723f6
chk default key[12] 8fd0a4f256e9
--sector: 0, block:  3, key type:A, key count:13
#db# ChkKeys: Can't select card
--sector: 1, block:  7, key type:A, key count:13
#db# ChkKeys: Can't select card (UID) lvl=1
--sector: 2, block: 11, key type:A, key count:13
--sector: 3, block: 15, key type:A, key count:13
#db# ChkKeys: Can't select card (UID) lvl=1
--sector: 4, block: 19, key type:A, key count:13
#db# ChkKeys: Can't select card (UID) lvl=1
--sector: 5, block: 23, key type:A, key count:13
--sector: 6, block: 27, key type:A, key count:13
#db# ChkKeys: Can't select card (UID) lvl=1
--sector: 7, block: 31, key type:A, key count:13
--sector: 8, block: 35, key type:A, key count:13
#db# ChkKeys: Can't select card (UID) lvl=1
--sector: 9, block: 39, key type:A, key count:13
--sector:10, block: 43, key type:A, key count:13
--sector:11, block: 47, key type:A, key count:13
--sector:12, block: 51, key type:A, key count:13
--sector:13, block: 55, key type:A, key count:13
--sector:14, block: 59, key type:A, key count:13
--sector:15, block: 63, key type:A, key count:13
--sector: 0, block:  3, key type:B, key count:13
--sector: 1, block:  7, key type:B, key count:13
#db# ChkKeys: Can't select card (UID) lvl=1
#db# ChkKeys: Can't select card (UID) lvl=1
#db# ChkKeys: Can't select card (UID) lvl=1
#db# ChkKeys: Can't select card (UID) lvl=1
--sector: 2, block: 11, key type:B, key count:13
#db# ChkKeys: Can't select card (UID) lvl=1
--sector: 3, block: 15, key type:B, key count:13
--sector: 4, block: 19, key type:B, key count:13
--sector: 5, block: 23, key type:B, key count:13
--sector: 6, block: 27, key type:B, key count:13
#db# ChkKeys: Can't select card
#db# ChkKeys: Can't select card
#db# ChkKeys: Can't select card (UID) lvl=1
--sector: 7, block: 31, key type:B, key count:13
--sector: 8, block: 35, key type:B, key count:13
--sector: 9, block: 39, key type:B, key count:13
--sector:10, block: 43, key type:B, key count:13
--sector:11, block: 47, key type:B, key count:13
--sector:12, block: 51, key type:B, key count:13
--sector:13, block: 55, key type:B, key count:13
--sector:14, block: 59, key type:B, key count:13
--sector:15, block: 63, key type:B, key count:13
Found keys have been transferred to the emulator memory

proxmark3> hf mf mifare
-------------------------------------------------------------------------
Executing command. Expected execution time: 25sec on average  :-)
Press button on the proxmark3 device to abort both proxmark3 and client.
-------------------------------------------------------------------------
.

Card is not vulnerable to Darkside attack (its random number generator is not predictable).



I do not know how to move, I have already installed the installation on wiki github .  thank you all for your help

Offline

#2 2019-03-10 22:08:53

sher96
Contributor
Registered: 2019-03-06
Posts: 12

Re: hi

there is no one who can help me?
I'm trying but I do not understand what I'm wrong, I would be grateful

Offline

#3 2019-03-11 06:36:42

iceman
Administrator
Registered: 2013-04-25
Posts: 9,495
Website

Re: hi

On the wiki there is some general guidelines for how to use mifare commands.  A bit outdated but ok.

https://github.com/Proxmark/proxmark3/wiki/Mifare-HowTo
https://github.com/Proxmark/proxmark3/w … re-Tag-Ops

In this forum under category Mifare Classic http://www.proxmark.org/forum/viewforum.php?id=5  you find very many threads about how to approach a Mifare classic card.  Well, you will need to understand what you are trying to do.  If you don't know, then I agree it is hard to find suitable information.

The search function on this forum is also effect,  once you have and idea about what you want to accomplish. 

When posting,  do be as detailed about your setup,  your intended action,  and how you failed to find related information on the forum,  like "i searched for xxxxx" and didn't get any posts that coverted my problem.

Another way to find very much information about "hacking a mifare card",  is google it or search on youtube.  You be surprised to see how many hits with fully detailed blogposts and videos you find.  All very tutorial.

Happy learning!

Offline

#4 2019-03-11 11:22:13

sher96
Contributor
Registered: 2019-03-06
Posts: 12

Re: hi

Good morning ,
my goal is to find all the keys of my card, but this card is not hacked, with the mifare tells me that the card is not vulnerable and therefore does not perform the darkattak.
I saw all the videos on youtube and searched a lot on the internet before finding this forum is to publish my question.
before taking the proxmark I had the pn532 and with that I could not find all the keys, I bought the proxmark to solve the problem but I can not find the same.
if you have any advice or video to send me to solve this problem I would be grateful, on youtube I find many videos but they do not show how to solve this problem .

Offline

Board footer

Powered by FluxBB