Domanda Mfoc non trova keys mifare classic 1k

Mm2810

Utente Iron
16 Maggio 2022
8
2
2
7
Ultima modifica:
Ciao a tutti, premetto che ho letto tantissime discussioni sia qui su inforge che sul web in generale.
Ho una mifare classic 1k con settori 0 e 1 protetti e le chiavi non sono presenti nella lista delle conosciute. Dato che gli altri settori hanno chiave FFFFFFFFFFFF, ho provato ad attaccarla con pn532 e Mfoc.
Codice:
Found Mifare Classic 1k tag
ISO/IEC 14443A (106 kbps) target:
    ATQA (SENS_RES): 00  04 
* UID size: single
* bit frame anticollision supported
       UID (NFCID1): ac  04  c1  72 
      SAK (SEL_RES): 08 
* Not compliant with ISO/IEC 14443-4
* Not compliant with ISO/IEC 18092

Fingerprinting based on MIFARE type Identification Procedure:
* MIFARE Classic 1K
* MIFARE Plus (4 Byte UID or 4 Byte RID) 2K, Security level 1
* SmartMX with MIFARE 1K emulation
Other possible matches based on ATQA & SAK values:

Try to authenticate to all sectors with default keys...
Symbols: '.' no key found, '/' A key found, '\' B key found, 'x' both keys found
[Key: ffffffffffff] -> [..xxxxxxxxxxxxxx]
[Key: a0a1a2a3a4a5] -> [..xxxxxxxxxxxxxx]
[Key: d3f7d3f7d3f7] -> [..xxxxxxxxxxxxxx]
[Key: 000000000000] -> [..xxxxxxxxxxxxxx]
[Key: b0b1b2b3b4b5] -> [..xxxxxxxxxxxxxx]
[Key: 4d3a99c351dd] -> [..xxxxxxxxxxxxxx]
[Key: 1a982c7e459a] -> [..xxxxxxxxxxxxxx]
[Key: aabbccddeeff] -> [..xxxxxxxxxxxxxx]
[Key: 714c5c886e97] -> [..xxxxxxxxxxxxxx]
[Key: 587ee5f9350f] -> [..xxxxxxxxxxxxxx]
[Key: a0478cc39091] -> [..xxxxxxxxxxxxxx]
[Key: 533cb6c723f6] -> [..xxxxxxxxxxxxxx]
[Key: 8fd0a4f256e9] -> [..xxxxxxxxxxxxxx]

Sector 00 - Unknown Key A               Unknown Key B
Sector 01 - Unknown Key A               Unknown Key B
Sector 02 - Found   Key A: ffffffffffff Found   Key B: ffffffffffff
Sector 03 - Found   Key A: ffffffffffff Found   Key B: ffffffffffff
Sector 04 - Found   Key A: ffffffffffff Found   Key B: ffffffffffff
Sector 05 - Found   Key A: ffffffffffff Found   Key B: ffffffffffff
Sector 06 - Found   Key A: ffffffffffff Found   Key B: ffffffffffff
Sector 07 - Found   Key A: ffffffffffff Found   Key B: ffffffffffff
Sector 08 - Found   Key A: ffffffffffff Found   Key B: ffffffffffff
Sector 09 - Found   Key A: ffffffffffff Found   Key B: ffffffffffff
Sector 10 - Found   Key A: ffffffffffff Found   Key B: ffffffffffff
Sector 11 - Found   Key A: ffffffffffff Found   Key B: ffffffffffff
Sector 12 - Found   Key A: ffffffffffff Found   Key B: ffffffffffff
Sector 13 - Found   Key A: ffffffffffff Found   Key B: ffffffffffff
Sector 14 - Found   Key A: ffffffffffff Found   Key B: ffffffffffff
Sector 15 - Found   Key A: ffffffffffff Found   Key B: ffffffffffff
Pur avendo impostato i probes a 10000, alla fine non riesce e dice che forse dovrei aumentare i probes. Ho notato che il valore "distance" resta fisso a 64, mentre online ho visto che molti ottengono valori più alti e che cambiano durante l'esecuzione.
Codice:
Sector: 0, type A, probe 149, distance 64 .....
mfoc: ERROR: No success, maybe you should increase the probes
Poi provato con milazycracker ed ha lo stesso comportamento. Non credo che la scheda sia hardened perchè ne ho provato un'altra ed effettivamente mfoc mi avvisa subito che devo usare un attacco hardnested, cosa che non accade quando provo ad attaccare la prima carta.
Ho provato anche con Mfcuk ma anche qui senza fortuna
Codice:
mfcuk - 0.3.8
Mifare Classic DarkSide Key Recovery Tool - 0.3
by Andrei Costin, [email protected], http://andreicostin.com


INFO: Connected to NFC reader: pn532_usb



INITIAL ACTIONS MATRIX - UID ac 04 c1 72 - TYPE 0x08 (MC1K)
---------------------------------------------------------------------
Sector    |    Key A    |ACTS | RESL    |    Key B    |ACTS | RESL
---------------------------------------------------------------------
0    |  000000000000    | . R | . .    |  000000000000    | . . | . .
1    |  000000000000    | . . | . .    |  000000000000    | . . | . .
2    |  000000000000    | . . | . .    |  000000000000    | . . | . .
3    |  000000000000    | . . | . .    |  000000000000    | . . | . .
4    |  000000000000    | . . | . .    |  000000000000    | . . | . .
5    |  000000000000    | . . | . .    |  000000000000    | . . | . .
6    |  000000000000    | . . | . .    |  000000000000    | . . | . .
7    |  000000000000    | . . | . .    |  000000000000    | . . | . .
8    |  000000000000    | . . | . .    |  000000000000    | . . | . .
9    |  000000000000    | . . | . .    |  000000000000    | . . | . .
10    |  000000000000    | . . | . .    |  000000000000    | . . | . .
11    |  000000000000    | . . | . .    |  000000000000    | . . | . .
12    |  000000000000    | . . | . .    |  000000000000    | . . | . .
13    |  000000000000    | . . | . .    |  000000000000    | . . | . .
14    |  000000000000    | . . | . .    |  000000000000    | . . | . .
15    |  000000000000    | . . | . .    |  000000000000    | . . | . .


VERIFY:
    Key A sectors: 0 1 2 3 4 5 6 7 8 9 a b c d e f
    Key B sectors: 0 1 2 3 4 5 6 7 8 9 a b c d e f


ACTION RESULTS MATRIX AFTER VERIFY - UID ac 04 c1 72 - TYPE 0x08 (MC1K)
---------------------------------------------------------------------
Sector    |    Key A    |ACTS | RESL    |    Key B    |ACTS | RESL
---------------------------------------------------------------------
0    |  000000000000    | . R | . .    |  000000000000    | . . | . .
1    |  000000000000    | . . | . .    |  000000000000    | . . | . .
2    |  000000000000    | . . | . .    |  000000000000    | . . | . .
3    |  000000000000    | . . | . .    |  000000000000    | . . | . .
4    |  000000000000    | . . | . .    |  000000000000    | . . | . .
5    |  000000000000    | . . | . .    |  000000000000    | . . | . .
6    |  000000000000    | . . | . .    |  000000000000    | . . | . .
7    |  000000000000    | . . | . .    |  000000000000    | . . | . .
8    |  000000000000    | . . | . .    |  000000000000    | . . | . .
9    |  000000000000    | . . | . .    |  000000000000    | . . | . .
10    |  000000000000    | . . | . .    |  000000000000    | . . | . .
11    |  000000000000    | . . | . .    |  000000000000    | . . | . .
12    |  000000000000    | . . | . .    |  000000000000    | . . | . .
13    |  000000000000    | . . | . .    |  000000000000    | . . | . .
14    |  000000000000    | . . | . .    |  000000000000    | . . | . .
15    |  000000000000    | . . | . .    |  000000000000    | . . | . .


RECOVER:  0
-----------------------------------------------------
Let me entertain you!
    uid: ac04c172
   type: 08
    key: 000000000000
  block: 03
diff Nt: 0
  auths: 0
-----------------------------------------------------

-----------------------------------------------------
Let me entertain you!
    uid: ac04c172
   type: 08
    key: 000000000000
  block: 03
diff Nt: 1
  auths: 1
-----------------------------------------------------

-----------------------------------------------------
Let me entertain you!
    uid: ac04c172
   type: 08
    key: 000000000000
  block: 03
diff Nt: 1
  auths: 2
-----------------------------------------------------

-----------------------------------------------------
Let me entertain you!
    uid: ac04c172
   type: 08
    key: 000000000000
  block: 03
diff Nt: 1
  auths: 3
-----------------------------------------------------

-----------------------------------------------------
Questo è ciò che ottengo con Mfcuk, gli auths aumentano ma "diff Nt" resta sempre 1, l'attacco èandato avanti per quasi un'ora senza cambiamenti, allora l'ho interrotto.
Non so più cosa fare, ci sbatto la testa su da giorni e ancora non ho trovato mezza soluzione
Messaggio unito automaticamente:

Aggiornamento: Ho provato ad usare mfoc e milazycracker su altri tag su cui ho impostato chiavi personalizzate e nessun software riesce a funzionare quindi credo che il problema non sia la scheda in se ma la mia configurazione. Se qualcuno è così gentile da guidarmi sarebbe fantastico. Ovviamente se servono altre informazioni chiedete
Messaggio unito automaticamente:

Nessuno sa darmi una mano?
 
D

Deleted member 278105

Ciao a tutti, premetto che ho letto tantissime discussioni sia qui su inforge che sul web in generale.
Ho una mifare classic 1k con settori 0 e 1 protetti e le chiavi non sono presenti nella lista delle conosciute. Dato che gli altri settori hanno chiave FFFFFFFFFFFF, ho provato ad attaccarla con pn532 e Mfoc.
Codice:
Found Mifare Classic 1k tag
ISO/IEC 14443A (106 kbps) target:
    ATQA (SENS_RES): 00  04
* UID size: single
* bit frame anticollision supported
       UID (NFCID1): ac  04  c1  72
      SAK (SEL_RES): 08
* Not compliant with ISO/IEC 14443-4
* Not compliant with ISO/IEC 18092

Fingerprinting based on MIFARE type Identification Procedure:
* MIFARE Classic 1K
* MIFARE Plus (4 Byte UID or 4 Byte RID) 2K, Security level 1
* SmartMX with MIFARE 1K emulation
Other possible matches based on ATQA & SAK values:

Try to authenticate to all sectors with default keys...
Symbols: '.' no key found, '/' A key found, '\' B key found, 'x' both keys found
[Key: ffffffffffff] -> [..xxxxxxxxxxxxxx]
[Key: a0a1a2a3a4a5] -> [..xxxxxxxxxxxxxx]
[Key: d3f7d3f7d3f7] -> [..xxxxxxxxxxxxxx]
[Key: 000000000000] -> [..xxxxxxxxxxxxxx]
[Key: b0b1b2b3b4b5] -> [..xxxxxxxxxxxxxx]
[Key: 4d3a99c351dd] -> [..xxxxxxxxxxxxxx]
[Key: 1a982c7e459a] -> [..xxxxxxxxxxxxxx]
[Key: aabbccddeeff] -> [..xxxxxxxxxxxxxx]
[Key: 714c5c886e97] -> [..xxxxxxxxxxxxxx]
[Key: 587ee5f9350f] -> [..xxxxxxxxxxxxxx]
[Key: a0478cc39091] -> [..xxxxxxxxxxxxxx]
[Key: 533cb6c723f6] -> [..xxxxxxxxxxxxxx]
[Key: 8fd0a4f256e9] -> [..xxxxxxxxxxxxxx]

Sector 00 - Unknown Key A               Unknown Key B
Sector 01 - Unknown Key A               Unknown Key B
Sector 02 - Found   Key A: ffffffffffff Found   Key B: ffffffffffff
Sector 03 - Found   Key A: ffffffffffff Found   Key B: ffffffffffff
Sector 04 - Found   Key A: ffffffffffff Found   Key B: ffffffffffff
Sector 05 - Found   Key A: ffffffffffff Found   Key B: ffffffffffff
Sector 06 - Found   Key A: ffffffffffff Found   Key B: ffffffffffff
Sector 07 - Found   Key A: ffffffffffff Found   Key B: ffffffffffff
Sector 08 - Found   Key A: ffffffffffff Found   Key B: ffffffffffff
Sector 09 - Found   Key A: ffffffffffff Found   Key B: ffffffffffff
Sector 10 - Found   Key A: ffffffffffff Found   Key B: ffffffffffff
Sector 11 - Found   Key A: ffffffffffff Found   Key B: ffffffffffff
Sector 12 - Found   Key A: ffffffffffff Found   Key B: ffffffffffff
Sector 13 - Found   Key A: ffffffffffff Found   Key B: ffffffffffff
Sector 14 - Found   Key A: ffffffffffff Found   Key B: ffffffffffff
Sector 15 - Found   Key A: ffffffffffff Found   Key B: ffffffffffff
Pur avendo impostato i probes a 10000, alla fine non riesce e dice che forse dovrei aumentare i probes. Ho notato che il valore "distance" resta fisso a 64, mentre online ho visto che molti ottengono valori più alti e che cambiano durante l'esecuzione.
Codice:
Sector: 0, type A, probe 149, distance 64 .....
mfoc: ERROR: No success, maybe you should increase the probes
Poi provato con milazycracker ed ha lo stesso comportamento. Non credo che la scheda sia hardened perchè ne ho provato un'altra ed effettivamente mfoc mi avvisa subito che devo usare un attacco hardnested, cosa che non accade quando provo ad attaccare la prima carta.
Ho provato anche con Mfcuk ma anche qui senza fortuna
Codice:
mfcuk - 0.3.8
Mifare Classic DarkSide Key Recovery Tool - 0.3
by Andrei Costin, [email protected], http://andreicostin.com


INFO: Connected to NFC reader: pn532_usb



INITIAL ACTIONS MATRIX - UID ac 04 c1 72 - TYPE 0x08 (MC1K)
---------------------------------------------------------------------
Sector    |    Key A    |ACTS | RESL    |    Key B    |ACTS | RESL
---------------------------------------------------------------------
0    |  000000000000    | . R | . .    |  000000000000    | . . | . .
1    |  000000000000    | . . | . .    |  000000000000    | . . | . .
2    |  000000000000    | . . | . .    |  000000000000    | . . | . .
3    |  000000000000    | . . | . .    |  000000000000    | . . | . .
4    |  000000000000    | . . | . .    |  000000000000    | . . | . .
5    |  000000000000    | . . | . .    |  000000000000    | . . | . .
6    |  000000000000    | . . | . .    |  000000000000    | . . | . .
7    |  000000000000    | . . | . .    |  000000000000    | . . | . .
8    |  000000000000    | . . | . .    |  000000000000    | . . | . .
9    |  000000000000    | . . | . .    |  000000000000    | . . | . .
10    |  000000000000    | . . | . .    |  000000000000    | . . | . .
11    |  000000000000    | . . | . .    |  000000000000    | . . | . .
12    |  000000000000    | . . | . .    |  000000000000    | . . | . .
13    |  000000000000    | . . | . .    |  000000000000    | . . | . .
14    |  000000000000    | . . | . .    |  000000000000    | . . | . .
15    |  000000000000    | . . | . .    |  000000000000    | . . | . .


VERIFY:
    Key A sectors: 0 1 2 3 4 5 6 7 8 9 a b c d e f
    Key B sectors: 0 1 2 3 4 5 6 7 8 9 a b c d e f


ACTION RESULTS MATRIX AFTER VERIFY - UID ac 04 c1 72 - TYPE 0x08 (MC1K)
---------------------------------------------------------------------
Sector    |    Key A    |ACTS | RESL    |    Key B    |ACTS | RESL
---------------------------------------------------------------------
0    |  000000000000    | . R | . .    |  000000000000    | . . | . .
1    |  000000000000    | . . | . .    |  000000000000    | . . | . .
2    |  000000000000    | . . | . .    |  000000000000    | . . | . .
3    |  000000000000    | . . | . .    |  000000000000    | . . | . .
4    |  000000000000    | . . | . .    |  000000000000    | . . | . .
5    |  000000000000    | . . | . .    |  000000000000    | . . | . .
6    |  000000000000    | . . | . .    |  000000000000    | . . | . .
7    |  000000000000    | . . | . .    |  000000000000    | . . | . .
8    |  000000000000    | . . | . .    |  000000000000    | . . | . .
9    |  000000000000    | . . | . .    |  000000000000    | . . | . .
10    |  000000000000    | . . | . .    |  000000000000    | . . | . .
11    |  000000000000    | . . | . .    |  000000000000    | . . | . .
12    |  000000000000    | . . | . .    |  000000000000    | . . | . .
13    |  000000000000    | . . | . .    |  000000000000    | . . | . .
14    |  000000000000    | . . | . .    |  000000000000    | . . | . .
15    |  000000000000    | . . | . .    |  000000000000    | . . | . .


RECOVER:  0
-----------------------------------------------------
Let me entertain you!
    uid: ac04c172
   type: 08
    key: 000000000000
  block: 03
diff Nt: 0
  auths: 0
-----------------------------------------------------

-----------------------------------------------------
Let me entertain you!
    uid: ac04c172
   type: 08
    key: 000000000000
  block: 03
diff Nt: 1
  auths: 1
-----------------------------------------------------

-----------------------------------------------------
Let me entertain you!
    uid: ac04c172
   type: 08
    key: 000000000000
  block: 03
diff Nt: 1
  auths: 2
-----------------------------------------------------

-----------------------------------------------------
Let me entertain you!
    uid: ac04c172
   type: 08
    key: 000000000000
  block: 03
diff Nt: 1
  auths: 3
-----------------------------------------------------

-----------------------------------------------------
Questo è ciò che ottengo con Mfcuk, gli auths aumentano ma "diff Nt" resta sempre 1, l'attacco èandato avanti per quasi un'ora senza cambiamenti, allora l'ho interrotto.
Non so più cosa fare, ci sbatto la testa su da giorni e ancora non ho trovato mezza soluzione
Messaggio unito automaticamente:

Aggiornamento: Ho provato ad usare mfoc e milazycracker su altri tag su cui ho impostato chiavi personalizzate e nessun software riesce a funzionare quindi credo che il problema non sia la scheda in se ma la mia configurazione. Se qualcuno è così gentile da guidarmi sarebbe fantastico. Ovviamente se servono altre informazioni chiedete
Messaggio unito automaticamente:

Nessuno sa darmi una mano?
È una microel? Hanno il prng fixed quindi non è vurnerabile a nessun attacco mfoc, mfuc e milazy, l'unica soluzione è usare il proxmark sniffare una chiave e poi trovare l'altra, stessa cosa vale per quel tag che hai impostato chiavi personalizzate, se è un magic tag gen 1 ha un prng alto non le troverai mai, ciao
 

Mm2810

Utente Iron
16 Maggio 2022
8
2
2
7
Forse mi sono espresso male, non metto in dubbio ciò che hai detto, mi chiedevo se c'era un modo per riconoscere questo tipo di carta magari dalle informazioni che ottengo durante la lettura
 

NextPro

Utente Iron
29 Luglio 2020
1
0
0
13
Ciao a tutti, premetto che ho letto tantissime discussioni sia qui su inforge che sul web in generale.
Ho una mifare classic 1k con settori 0 e 1 protetti e le chiavi non sono presenti nella lista delle conosciute. Dato che gli altri settori hanno chiave FFFFFFFFFFFF, ho provato ad attaccarla con pn532 e Mfoc.

Potresti dirmi quale pn532 stai usando? Potresti darmi un link dove acquistarlo? Grazie.
 

zecchi69

Utente Bronze
11 Giugno 2016
25
3
4
40
Ciao buonasera a tutti io sono riuscito a trovare delle chiavi della chiavetta in questione pero ora non so se ci sono tutte e sopratutto dove andare a editare per aggiungere il credito ,,,,se si puo ...vi posto il dump e le foto della chiavetta in questione ...... chivetta Argenta.png Argenta_fronte.png
qualcuno sa dove mettere mano ??
grazie in anticipo
 

Allegati

  • secondodump.txt
    2.2 KB · Visualizzazioni: 13

zecchi69

Utente Bronze
11 Giugno 2016
25
3
4
40
Ciao buonasera a tutti io sono riuscito a trovare delle chiavi della chiavetta in questione pero ora non so se ci sono tutte e sopratutto dove andare a editare per aggiungere il credito ,,,,se si puo ...vi posto il dump e le foto della chiavetta in questione ...... Visualizza allegato 67090 Visualizza allegato 67091
qualcuno sa dove mettere mano ??
grazie in anticipo
allego dump dopo una ricarica di 3 euro .........ora c'è un credito totale di 7 euro ... 2022-12-19_21h40_20.png quindi presumo che il settore da editare sia questo ...cioe l 11 ma inn che modo ???
 

Allegati

  • terzodump.txt
    2.2 KB · Visualizzazioni: 13

ultradj83

Utente Iron
3 Febbraio 2023
3
0
0
2
Buongiorno a tutti.

E' possibile risolvere questa situazione?

Codice:
─$ miLazyCracker  
Found Mifare Classic Mini tag
ISO/IEC 14443A (106 kbps) target:
    ATQA (SENS_RES): 00  04
* UID size: single
* bit frame anticollision supported
       UID (NFCID1): fd  a1  2b  74
      SAK (SEL_RES): 09
* Not compliant with ISO/IEC 14443-4
* Not compliant with ISO/IEC 18092

Fingerprinting based on MIFARE type Identification Procedure:
* MIFARE Mini 0.3K
* SmartMX with MIFARE 1K emulation
Other possible matches based on ATQA & SAK values:

Try to authenticate to all sectors with default keys...
Symbols: '.' no key found, '/' A key found, '\' B key found, 'x' both keys found
[Key: ffffffffffff] -> [.....]
[Key: a0a1a2a3a4a5] -> [/....]
[Key: d3f7d3f7d3f7] -> [/....]
[Key: 000000000000] -> [/....]
[Key: b0b1b2b3b4b5] -> [/....]
[Key: 4d3a99c351dd] -> [/....]
[Key: 1a982c7e459a] -> [/....]
[Key: aabbccddeeff] -> [/....]
[Key: 714c5c886e97] -> [/....]
[Key: 587ee5f9350f] -> [/....]
[Key: a0478cc39091] -> [/....]
[Key: 533cb6c723f6] -> [/....]
[Key: 8fd0a4f256e9] -> [/....]

Sector 00 - Found   Key A: a0a1a2a3a4a5 Unknown Key B
Sector 01 - Unknown Key A               Unknown Key B
Sector 02 - Unknown Key A               Unknown Key B
Sector 03 - Unknown Key A               Unknown Key B
Sector 04 - Unknown Key A               Unknown Key B


Using sector 00 as an exploit sector
Card is not vulnerable to nested attack
MFOC not possible, detected hardened Mifare Classic
Trying HardNested Attack...
libnfc_crypto1_crack a0a1a2a3a4a5 0 A 16 B mfc_fda12b74_foundKeys.txt
Found tag with uid fda12b74, collecting nonces for key B of block 16 (sector 4) using known key A a0a1a2a3a4a5 for block 0 (sector 0)
Collected 4762 nonces... leftover complexity 8600042471424 (~2^42.97) - press enter to start brute-force phase
Collected 4768 nonces... leftover complexity 8600042471424 (~2^42.97) - initializing brute-force phase...
Starting 4 threads to test 190577073196 states using 128-way bitslicing
Cracking... 100.00%
No solution found :(
MFOC not possible, detected hardened Mifare Classic
Trying HardNested Attack...
libnfc_crypto1_crack a0a1a2a3a4a5 0 A 16 B mfc_fda12b74_foundKeys.txt
Found tag with uid fda12b74, collecting nonces for key B of block 16 (sector 4) using known key A a0a1a2a3a4a5 for block 0 (sector 0)
Collected 4910 nonces... leftover complexity 294072679876 (~2^38.10) - initializing brute-force phase...
Starting 4 threads to test 294072679876 states using 128-way bitslicing
Cracking...  99.96%
No solution found :(
MFOC not possible, detected hardened Mifare Classic
Trying HardNested Attack...
libnfc_crypto1_crack a0a1a2a3a4a5 0 A 16 B mfc_fda12b74_foundKeys.txt
Found tag with uid fda12b74, collecting nonces for key B of block 16 (sector 4) using known key A a0a1a2a3a4a5 for block 0 (sector 0)
Collected 5132 nonces... leftover complexity 190577073196 (~2^37.47) - initializing brute-force phase...
Starting 4 threads to test 190577073196 states using 128-way bitslicing
Cracking...  99.97%
No solution found :(
MFOC not possible, detected hardened Mifare Classic
Trying HardNested Attack...
libnfc_crypto1_crack a0a1a2a3a4a5 0 A 16 B mfc_fda12b74_foundKeys.txt
Found tag with uid fda12b74, collecting nonces for key B of block 16 (sector 4) using known key A a0a1a2a3a4a5 for block 0 (sector 0)
Collected 4091 nonces... leftover complexity 8600042471424 (~2^42.97) - press enter to start brute-force phase
Collected 4097 nonces... leftover complexity 8600042471424 (~2^42.97) - initializing brute-force phase...
Starting 4 threads to test 8600042471424 states using 128-way bitslicing
**Cracking...   0.00%/usr/local/bin/miLazyCracker: line 127: 96558 Segmentation fault      "${mycmd[@]}"**
MFOC not possible, detected hardened Mifare Classic
Trying HardNested Attack...
libnfc_crypto1_crack a0a1a2a3a4a5 0 A 16 B mfc_fda12b74_foundKeys.txt
Found tag with uid fda12b74, collecting nonces for key B of block 16 (sector 4) using known key A a0a1a2a3a4a5 for block 0 (sector 0)
Collected 4956 nonces... leftover complexity 190577073196 (~2^37.47) - initializing brute-force phase...
Starting 4 threads to test 190577073196 states using 128-way bitslicing
Cracking...  99.98%
No solution found :(

Grazie.
 

paulin37

Utente Bronze
1 Aprile 2020
61
2
2
25
cose ? una HI o
Buongiorno a tutti.

E' possibile risolvere questa situazione?

Codice:
─$ miLazyCracker 
Found Mifare Classic Mini tag
ISO/IEC 14443A (106 kbps) target:
    ATQA (SENS_RES): 00  04
* UID size: single
* bit frame anticollision supported
       UID (NFCID1): fd  a1  2b  74
      SAK (SEL_RES): 09
* Not compliant with ISO/IEC 14443-4
* Not compliant with ISO/IEC 18092

Fingerprinting based on MIFARE type Identification Procedure:
* MIFARE Mini 0.3K
* SmartMX with MIFARE 1K emulation
Other possible matches based on ATQA & SAK values:

Try to authenticate to all sectors with default keys...
Symbols: '.' no key found, '/' A key found, '\' B key found, 'x' both keys found
[Key: ffffffffffff] -> [.....]
[Key: a0a1a2a3a4a5] -> [/....]
[Key: d3f7d3f7d3f7] -> [/....]
[Key: 000000000000] -> [/....]
[Key: b0b1b2b3b4b5] -> [/....]
[Key: 4d3a99c351dd] -> [/....]
[Key: 1a982c7e459a] -> [/....]
[Key: aabbccddeeff] -> [/....]
[Key: 714c5c886e97] -> [/....]
[Key: 587ee5f9350f] -> [/....]
[Key: a0478cc39091] -> [/....]
[Key: 533cb6c723f6] -> [/....]
[Key: 8fd0a4f256e9] -> [/....]

Sector 00 - Found   Key A: a0a1a2a3a4a5 Unknown Key B
Sector 01 - Unknown Key A               Unknown Key B
Sector 02 - Unknown Key A               Unknown Key B
Sector 03 - Unknown Key A               Unknown Key B
Sector 04 - Unknown Key A               Unknown Key B


Using sector 00 as an exploit sector
Card is not vulnerable to nested attack
MFOC not possible, detected hardened Mifare Classic
Trying HardNested Attack...
libnfc_crypto1_crack a0a1a2a3a4a5 0 A 16 B mfc_fda12b74_foundKeys.txt
Found tag with uid fda12b74, collecting nonces for key B of block 16 (sector 4) using known key A a0a1a2a3a4a5 for block 0 (sector 0)
Collected 4762 nonces... leftover complexity 8600042471424 (~2^42.97) - press enter to start brute-force phase
Collected 4768 nonces... leftover complexity 8600042471424 (~2^42.97) - initializing brute-force phase...
Starting 4 threads to test 190577073196 states using 128-way bitslicing
Cracking... 100.00%
No solution found :(
MFOC not possible, detected hardened Mifare Classic
Trying HardNested Attack...
libnfc_crypto1_crack a0a1a2a3a4a5 0 A 16 B mfc_fda12b74_foundKeys.txt
Found tag with uid fda12b74, collecting nonces for key B of block 16 (sector 4) using known key A a0a1a2a3a4a5 for block 0 (sector 0)
Collected 4910 nonces... leftover complexity 294072679876 (~2^38.10) - initializing brute-force phase...
Starting 4 threads to test 294072679876 states using 128-way bitslicing
Cracking...  99.96%
No solution found :(
MFOC not possible, detected hardened Mifare Classic
Trying HardNested Attack...
libnfc_crypto1_crack a0a1a2a3a4a5 0 A 16 B mfc_fda12b74_foundKeys.txt
Found tag with uid fda12b74, collecting nonces for key B of block 16 (sector 4) using known key A a0a1a2a3a4a5 for block 0 (sector 0)
Collected 5132 nonces... leftover complexity 190577073196 (~2^37.47) - initializing brute-force phase...
Starting 4 threads to test 190577073196 states using 128-way bitslicing
Cracking...  99.97%
No solution found :(
MFOC not possible, detected hardened Mifare Classic
Trying HardNested Attack...
libnfc_crypto1_crack a0a1a2a3a4a5 0 A 16 B mfc_fda12b74_foundKeys.txt
Found tag with uid fda12b74, collecting nonces for key B of block 16 (sector 4) using known key A a0a1a2a3a4a5 for block 0 (sector 0)
Collected 4091 nonces... leftover complexity 8600042471424 (~2^42.97) - press enter to start brute-force phase
Collected 4097 nonces... leftover complexity 8600042471424 (~2^42.97) - initializing brute-force phase...
Starting 4 threads to test 8600042471424 states using 128-way bitslicing
**Cracking...   0.00%/usr/local/bin/miLazyCracker: line 127: 96558 Segmentation fault      "${mycmd[@]}"**
MFOC not possible, detected hardened Mifare Classic
Trying HardNested Attack...
libnfc_crypto1_crack a0a1a2a3a4a5 0 A 16 B mfc_fda12b74_foundKeys.txt
Found tag with uid fda12b74, collecting nonces for key B of block 16 (sector 4) using known key A a0a1a2a3a4a5 for block 0 (sector 0)
Collected 4956 nonces... leftover complexity 190577073196 (~2^37.47) - initializing brute-force phase...
Starting 4 threads to test 190577073196 states using 128-way bitslicing
Cracking...  99.98%
No solution found :(

Grazie
cose ? una HI oppure MIZIP ?
Messaggio unito automaticamente:

cose ? una HI o

cose ? una HI oppure MIZIP ?
| SEC | key A | key B |
+-----+----------------------------+--------------------------+
| 000 | A0A1A2A3A4A5 | B4C132439EEF |
| 001 | F4B371517444 | DA5879F2F355 |
| 002 | 56D4E2436F8E | 5893645F1935 |
| 003 | 1FD36ADBD1A8 | 8139EED77DDA |
| 004 | CCDB9C5BB931 | 9B67DA860689 |