Domanda Proxmark e Mifare Classic 1k: Dump file is PARTIAL complete

pigronico

Utente Bronze
10 Ottobre 2015
8
3
0
46
Ciao ragazzi, uso una proxmark3 e ho un problema con una tessera Mifare Classic 1k (ISO 14443-A tag), quando provo a lanciare autopwn mi da questo messaggio:

[usb] pm3 --> hf mf autopwn
[#] 1 static nonce 01200145
[!] no known key was supplied, key recovery might fail
[+] loaded 45 keys from hardcoded default array
[=] running strategy 1
[=] Chunk 0.6s | found 0/32 keys (45)
[=] running strategy 2
[=] ..
[=] Chunk 4.8s | found 14/32 keys (45)
[+] target sector 2 key type A -- found valid key [ D3F7D3F7D3F7 ] (used for nested / hardnested attack)
[+] target sector 3 key type A -- found valid key [ D3F7D3F7D3F7 ]
[+] target sector 4 key type A -- found valid key [ D3F7D3F7D3F7 ]
[+] target sector 5 key type A -- found valid key [ D3F7D3F7D3F7 ]
[+] target sector 6 key type A -- found valid key [ D3F7D3F7D3F7 ]
[+] target sector 7 key type A -- found valid key [ D3F7D3F7D3F7 ]
[+] target sector 8 key type A -- found valid key [ D3F7D3F7D3F7 ]
[+] target sector 9 key type A -- found valid key [ D3F7D3F7D3F7 ]
[+] target sector 10 key type A -- found valid key [ D3F7D3F7D3F7 ]
[+] target sector 11 key type A -- found valid key [ D3F7D3F7D3F7 ]
[+] target sector 12 key type A -- found valid key [ D3F7D3F7D3F7 ]
[+] target sector 13 key type A -- found valid key [ D3F7D3F7D3F7 ]
[+] target sector 14 key type A -- found valid key [ D3F7D3F7D3F7 ]
[+] target sector 15 key type A -- found valid key [ D3F7D3F7D3F7 ]

[+] found keys:

[+] -----+-----+--------------+---+--------------+----
[+] Sec | Blk | key A |res| key B |res
[+] -----+-----+--------------+---+--------------+----
[+] 000 | 003 | ------------ | 0 | ------------ | 0
[+] 001 | 007 | ------------ | 0 | ------------ | 0
[+] 002 | 011 | D3F7D3F7D3F7 | D | ------------ |
[+] 003 | 015 | D3F7D3F7D3F7 | D | ------------ |
[+] 004 | 019 | D3F7D3F7D3F7 | D | ------------ |
[+] 005 | 023 | D3F7D3F7D3F7 | D | ------------ |
[+] 006 | 027 | D3F7D3F7D3F7 | D | ------------ |
[+] 007 | 031 | D3F7D3F7D3F7 | D | ------------ |
[+] 008 | 035 | D3F7D3F7D3F7 | D | ------------ |
[+] 009 | 039 | D3F7D3F7D3F7 | D | ------------ |
[+] 010 | 043 | D3F7D3F7D3F7 | D | ------------ |
[+] 011 | 047 | D3F7D3F7D3F7 | D | ------------ |
[+] 012 | 051 | D3F7D3F7D3F7 | D | ------------ |
[+] 013 | 055 | D3F7D3F7D3F7 | D | ------------ |
[+] 014 | 059 | D3F7D3F7D3F7 | D | ------------ |
[+] 015 | 063 | D3F7D3F7D3F7 | D | ------------ |
[+] -----+-----+--------------+---+--------------+----
[+] ( 0:Failed / 1:Success )


[=] FILE PATH: hf-mf-F9A1624C-key-2.bin
[+] Generating binary key file
[+] Found keys have been dumped to hf-mf-F9A1624C-key-2.bin
[=] FYI! --> 0xFFFFFFFFFFFF <-- has been inserted for unknown keys where res is 0
[+] transferring keys to simulator memory (Cmd Error: 04 can occur)
[=] fast dump reported back failure w KEY A, swapping to KEY B
[=] fast dump reported back failure w KEY B
[=] Dump file is PARTIAL complete
[=] downloading the card content from emulator memory
[=] FILE PATH: hf-mf-F9A1624C-dump-2.bin
[+] saved 1024 bytes to binary file hf-mf-F9A1624C-dump-2.bin
[=] FILE PATH: hf-mf-F9A1624C-dump-2.eml
[+] saved 64 blocks to text file hf-mf-F9A1624C-dump-2.eml
[=] FILE PATH: hf-mf-F9A1624C-dump-2.json
[+] saved to json file hf-mf-F9A1624C-dump-2.json
[=] autopwn execution time: 12 seconds

Qualche consiglio?
 
Ciao, Artoni80 giustamente devi provare un attacco nested & hardnested, altrimenti prima solo per test hf mf chk e poi hf mf autopwn, a volte questi buoni. Buona giornata.