RfidResearchGroup / proxmark3

Iceman Fork - Proxmark3
http://www.icedev.se
GNU General Public License v3.0
3.84k stars 1.02k forks source link

Mifare Magic card UID #933

Closed mwalker33 closed 4 years ago

mwalker33 commented 4 years ago

Describe the bug When I run 'hf mf auto' on a Mifare Magic Card UID, it did not exist correctly. When run on a real mifare classic, it worked as expected.

To Reproduce Steps to reproduce the behavior:

  1. Place UID Majic Card on proxmark
  2. run "hf mf auto"

Expected behavior Regardless of if the card can support a test or not, exit cleanly.

sample output

[usb] pm3 --> hf mf auto
[!] no known key was supplied, key recovery might fail
[+] loaded 23 keys from hardcoded default array
[=] running strategy 1

[=] Chunk: 0.9s | found 30/32 keys (23)

[=] running strategy 2

[=] Chunk: 0.9s | found 30/32 keys (23)

[+] target sector:  0 key type: A -- found valid key [FF FF FF FF FF FF ] (used for nested / hardnested attack)
[+] target sector:  0 key type: B -- found valid key [FF FF FF FF FF FF ]
[+] target sector:  2 key type: A -- found valid key [FF FF FF FF FF FF ]
[+] target sector:  2 key type: B -- found valid key [FF FF FF FF FF FF ]
[+] target sector:  3 key type: A -- found valid key [FF FF FF FF FF FF ]
[+] target sector:  3 key type: B -- found valid key [FF FF FF FF FF FF ]
[+] target sector:  4 key type: A -- found valid key [FF FF FF FF FF FF ]
[+] target sector:  4 key type: B -- found valid key [FF FF FF FF FF FF ]
[+] target sector:  5 key type: A -- found valid key [FF FF FF FF FF FF ]
[+] target sector:  5 key type: B -- found valid key [FF FF FF FF FF FF ]
[+] target sector:  6 key type: A -- found valid key [FF FF FF FF FF FF ]
[+] target sector:  6 key type: B -- found valid key [FF FF FF FF FF FF ]
[+] target sector:  7 key type: A -- found valid key [FF FF FF FF FF FF ]
[+] target sector:  7 key type: B -- found valid key [FF FF FF FF FF FF ]
[+] target sector:  8 key type: A -- found valid key [FF FF FF FF FF FF ]
[+] target sector:  8 key type: B -- found valid key [FF FF FF FF FF FF ]
[+] target sector:  9 key type: A -- found valid key [00 00 00 00 00 00 ]
[+] target sector:  9 key type: B -- found valid key [00 00 00 00 00 00 ]
[+] target sector: 10 key type: A -- found valid key [FF FF FF FF FF FF ]
[+] target sector: 10 key type: B -- found valid key [FF FF FF FF FF FF ]
[+] target sector: 11 key type: A -- found valid key [FF FF FF FF FF FF ]
[+] target sector: 11 key type: B -- found valid key [FF FF FF FF FF FF ]
[+] target sector: 12 key type: A -- found valid key [FF FF FF FF FF FF ]
[+] target sector: 12 key type: B -- found valid key [FF FF FF FF FF FF ]
[+] target sector: 13 key type: A -- found valid key [FF FF FF FF FF FF ]
[+] target sector: 13 key type: B -- found valid key [FF FF FF FF FF FF ]
[+] target sector: 14 key type: A -- found valid key [FF FF FF FF FF FF ]
[+] target sector: 14 key type: B -- found valid key [FF FF FF FF FF FF ]
[+] target sector: 15 key type: A -- found valid key [FF FF FF FF FF FF ]
[+] target sector: 15 key type: B -- found valid key [FF FF FF FF FF FF ]
[-] Nested attack failed, trying again (1/10)

[!] Button pressed. Aborted.

[usb] pm3 -->  

Notes: All keys Except Sector "1" where found. Button was not pressed. LEDs A,C and D left on. - Pressing button does clear the LEDs back to all off.

Desktop (please complete the following information):

[+] Displaying LF tuning graph. Divisor 88 is 134.83 kHz, 95 is 125.00 kHz.

iceman1001 commented 4 years ago

Try pulling and test now

mwalker33 commented 4 years ago

That works. All good.

Thanks

iceman1001 commented 4 years ago

some more fixes, staticnested should be working better inside autopwn, samething with generating uid filename for keyfile. I am closing this one now.