Ciao ragazzi, uso una proxmark3 e ho un problema con una tessera Mifare Classic 1k (ISO 14443-A tag), quando provo a lanciare autopwn mi da questo messaggio:
Qualche consiglio?
[usb] pm3 --> hf mf autopwn [#] 1 static nonce 01200145 [!] no known key was supplied, key recovery might fail [+] loaded 45 keys from hardcoded default array [=] running strategy 1 [=] Chunk 0.6s | found 0/32 keys (45) [=] running strategy 2 [=] .. [=] Chunk 4.8s | found 14/32 keys (45) [+] target sector 2 key type A -- found valid key [ D3F7D3F7D3F7 ] (used for nested / hardnested attack) [+] target sector 3 key type A -- found valid key [ D3F7D3F7D3F7 ] [+] target sector 4 key type A -- found valid key [ D3F7D3F7D3F7 ] [+] target sector 5 key type A -- found valid key [ D3F7D3F7D3F7 ] [+] target sector 6 key type A -- found valid key [ D3F7D3F7D3F7 ] [+] target sector 7 key type A -- found valid key [ D3F7D3F7D3F7 ] [+] target sector 8 key type A -- found valid key [ D3F7D3F7D3F7 ] [+] target sector 9 key type A -- found valid key [ D3F7D3F7D3F7 ] [+] target sector 10 key type A -- found valid key [ D3F7D3F7D3F7 ] [+] target sector 11 key type A -- found valid key [ D3F7D3F7D3F7 ] [+] target sector 12 key type A -- found valid key [ D3F7D3F7D3F7 ] [+] target sector 13 key type A -- found valid key [ D3F7D3F7D3F7 ] [+] target sector 14 key type A -- found valid key [ D3F7D3F7D3F7 ] [+] target sector 15 key type A -- found valid key [ D3F7D3F7D3F7 ] [+] found keys: [+] -----+-----+--------------+---+--------------+---- [+] Sec | Blk | key A |res| key B |res [+] -----+-----+--------------+---+--------------+---- [+] 000 | 003 | ------------ | 0 | ------------ | 0 [+] 001 | 007 | ------------ | 0 | ------------ | 0 [+] 002 | 011 | D3F7D3F7D3F7 | D | ------------ | [+] 003 | 015 | D3F7D3F7D3F7 | D | ------------ | [+] 004 | 019 | D3F7D3F7D3F7 | D | ------------ | [+] 005 | 023 | D3F7D3F7D3F7 | D | ------------ | [+] 006 | 027 | D3F7D3F7D3F7 | D | ------------ | [+] 007 | 031 | D3F7D3F7D3F7 | D | ------------ | [+] 008 | 035 | D3F7D3F7D3F7 | D | ------------ | [+] 009 | 039 | D3F7D3F7D3F7 | D | ------------ | [+] 010 | 043 | D3F7D3F7D3F7 | D | ------------ | [+] 011 | 047 | D3F7D3F7D3F7 | D | ------------ | [+] 012 | 051 | D3F7D3F7D3F7 | D | ------------ | [+] 013 | 055 | D3F7D3F7D3F7 | D | ------------ | [+] 014 | 059 | D3F7D3F7D3F7 | D | ------------ | [+] 015 | 063 | D3F7D3F7D3F7 | D | ------------ | [+] -----+-----+--------------+---+--------------+---- [+] ( 0:Failed / 1:Success ) [=] FILE PATH: hf-mf-F9A1624C-key-2.bin [+] Generating binary key file [+] Found keys have been dumped to hf-mf-F9A1624C-key-2.bin [=] FYI! --> 0xFFFFFFFFFFFF <-- has been inserted for unknown keys where res is 0 [+] transferring keys to simulator memory (Cmd Error: 04 can occur) [=] fast dump reported back failure w KEY A, swapping to KEY B [=] fast dump reported back failure w KEY B [=] Dump file is PARTIAL complete [=] downloading the card content from emulator memory [=] FILE PATH: hf-mf-F9A1624C-dump-2.bin [+] saved 1024 bytes to binary file hf-mf-F9A1624C-dump-2.bin [=] FILE PATH: hf-mf-F9A1624C-dump-2.eml [+] saved 64 blocks to text file hf-mf-F9A1624C-dump-2.eml [=] FILE PATH: hf-mf-F9A1624C-dump-2.json [+] saved to json file hf-mf-F9A1624C-dump-2.json [=] autopwn execution time: 12 seconds |
Qualche consiglio?