RfidResearchGroup / proxmark3

Iceman Fork - Proxmark3
http://www.icedev.se
GNU General Public License v3.0
3.72k stars 998 forks source link

hf mf cload -f fail #2204

Closed zhjygit closed 8 months ago

zhjygit commented 8 months ago

image [usb] pm3 --> hf mf autopwn [!] ⚠️ no known key was supplied, key recovery might fail [+] loaded 58 keys from hardcoded default array [=] running strategy 1 [=] Chunk 0.3s | found 32/32 keys (58) [+] target sector 0 key type A -- found valid key [ FFFFFFFFFFFF ] (used for nested / hardnested attack) [+] target sector 0 key type B -- found valid key [ FFFFFFFFFFFF ] [+] target sector 1 key type A -- found valid key [ FFFFFFFFFFFF ] [+] target sector 1 key type B -- found valid key [ FFFFFFFFFFFF ] [+] target sector 2 key type A -- found valid key [ FFFFFFFFFFFF ] [+] target sector 2 key type B -- found valid key [ FFFFFFFFFFFF ] [+] target sector 3 key type A -- found valid key [ FFFFFFFFFFFF ] [+] target sector 3 key type B -- found valid key [ FFFFFFFFFFFF ] [+] target sector 4 key type A -- found valid key [ FFFFFFFFFFFF ] [+] target sector 4 key type B -- found valid key [ FFFFFFFFFFFF ] [+] target sector 5 key type A -- found valid key [ FFFFFFFFFFFF ] [+] target sector 5 key type B -- found valid key [ FFFFFFFFFFFF ] [+] target sector 6 key type A -- found valid key [ FFFFFFFFFFFF ] [+] target sector 6 key type B -- found valid key [ FFFFFFFFFFFF ] [+] target sector 7 key type A -- found valid key [ FFFFFFFFFFFF ] [+] target sector 7 key type B -- found valid key [ FFFFFFFFFFFF ] [+] target sector 8 key type A -- found valid key [ FFFFFFFFFFFF ] [+] target sector 8 key type B -- found valid key [ FFFFFFFFFFFF ] [+] target sector 9 key type A -- found valid key [ FFFFFFFFFFFF ] [+] target sector 9 key type B -- found valid key [ FFFFFFFFFFFF ] [+] target sector 10 key type A -- found valid key [ FFFFFFFFFFFF ] [+] target sector 10 key type B -- found valid key [ FFFFFFFFFFFF ] [+] target sector 11 key type A -- found valid key [ FFFFFFFFFFFF ] [+] target sector 11 key type B -- found valid key [ FFFFFFFFFFFF ] [+] target sector 12 key type A -- found valid key [ FFFFFFFFFFFF ] [+] target sector 12 key type B -- found valid key [ FFFFFFFFFFFF ] [+] target sector 13 key type A -- found valid key [ FFFFFFFFFFFF ] [+] target sector 13 key type B -- found valid key [ FFFFFFFFFFFF ] [+] target sector 14 key type A -- found valid key [ FFFFFFFFFFFF ] [+] target sector 14 key type B -- found valid key [ FFFFFFFFFFFF ] [+] target sector 15 key type A -- found valid key [ FFFFFFFFFFFF ] [+] target sector 15 key type B -- found valid key [ FFFFFFFFFFFF ]

[+] found keys:

[+] -----+-----+--------------+---+--------------+---- [+] Sec | Blk | key A |res| key B |res [+] -----+-----+--------------+---+--------------+---- [+] 000 | 003 | FFFFFFFFFFFF | D | FFFFFFFFFFFF | D [+] 001 | 007 | FFFFFFFFFFFF | D | FFFFFFFFFFFF | D [+] 002 | 011 | FFFFFFFFFFFF | D | FFFFFFFFFFFF | D [+] 003 | 015 | FFFFFFFFFFFF | D | FFFFFFFFFFFF | D [+] 004 | 019 | FFFFFFFFFFFF | D | FFFFFFFFFFFF | D [+] 005 | 023 | FFFFFFFFFFFF | D | FFFFFFFFFFFF | D [+] 006 | 027 | FFFFFFFFFFFF | D | FFFFFFFFFFFF | D [+] 007 | 031 | FFFFFFFFFFFF | D | FFFFFFFFFFFF | D [+] 008 | 035 | FFFFFFFFFFFF | D | FFFFFFFFFFFF | D [+] 009 | 039 | FFFFFFFFFFFF | D | FFFFFFFFFFFF | D [+] 010 | 043 | FFFFFFFFFFFF | D | FFFFFFFFFFFF | D [+] 011 | 047 | FFFFFFFFFFFF | D | FFFFFFFFFFFF | D [+] 012 | 051 | FFFFFFFFFFFF | D | FFFFFFFFFFFF | D [+] 013 | 055 | FFFFFFFFFFFF | D | FFFFFFFFFFFF | D [+] 014 | 059 | FFFFFFFFFFFF | D | FFFFFFFFFFFF | D [+] 015 | 063 | FFFFFFFFFFFF | D | FFFFFFFFFFFF | D [+] -----+-----+--------------+---+--------------+---- [=] ( D:Dictionary / S:darkSide / U:User / R:Reused / N:Nested / H:Hardnested / C:statiCnested / A:keyA )

[+] Generating binary key file [+] Found keys have been dumped to /home/iot/hf-mf-546AFF0C-key-001.bin [=] --[ FFFFFFFFFFFF ]-- has been inserted for unknown keys where res is 0 [=] transferring keys to simulator memory ( ok ) [=] dumping card content to emulator memory (Cmd Error: 04 can occur) [=] downloading card content from emulator memory [+] saved 1024 bytes to binary file /home/iot/hf-mf-546AFF0C-dump-001.bin [+] saved to json file /home/iot/hf-mf-546AFF0C-dump-001.json [=] autopwn execution time: 2 seconds [usb] pm3 -->

And then, with the same cuid card, I can not load bin file of itself from autopwn, as follows: hf mf cload -f /home/iot/hf-mf-546AFF0C-dump-001.bin [+] loaded 1024 bytes from binary file /home/iot/hf-mf-546AFF0C-dump-001.bin [=] Copying to magic gen1a card [=] .[#] wupC1 error [!] ⚠️ Can't set magic card block: 0 image

image

iceman1001 commented 8 months ago

That is because you are trying to run hf mf cload which targets Gen1a magic cards and you are trying to run it against a CUID/Gen2 magic card.

It must fail.

For your purpose, I suggest hf mf restore -h
and use the discord server in the future for such questions.