Closed reliveinfire closed 1 year ago
i did not finish the full test, this card is full encryption, maybe at the last step the autopwn checks the keys and re-start to find the incorrect key, is this right?
after trace the code, the autopwn did not re run the hardnest for the incorrect key, the problems seem that found_key varible did not handle correctly in mfnestedhard
the easy way to fix this, it may clear the found_key variable every time in autopwn loop and autopwn can add new step for auto hardnest check for not found keys.
maybe we can add re-try mechanism or add retry parameter in hardnest command to recover this card type
i did this with script which issue hf md hardnest command. and it has chance to recover the correct key. also, i found that test_grab.py in experimental_lib can parse the terminal log, it would be helpful to auto update the key when brute force run hf md hardnest in script.
Hi sir, in some caes, the hf mf hardnested may fail to get the correct keys in autopwn, it stores the incorrect key value (i've use hf mf hardnested with script to find all correct keys)
case 1
correct one
but next fail case, it stores previous correct key
for nan cases, the fail found keys are supposed to store with nothing or special symbol.
is there better way to auto retry hf mf hardnest? i wrote one lua script to do this, but i dont know how to intercept the log. i just try every valid key many times and use terminal find to check if proxmark found the key.
thanks