aczid / crypto1_bs

Bitsliced Crypto-1 brute-forcer
205 stars 78 forks source link

I can't compile your project #9

Closed aleks921 closed 8 years ago

aleks921 commented 8 years ago

I want to compile your project libnfc_crypto1_crack. But i get error: not found #include < nfc/nfc.h >. How this fixed and compile your project ? Do I understand correctly that your program can without proksmarka, without sniffing, hackьmifare classic emulated? I will appreciate if you send me a compiled program

aczid commented 8 years ago

Can you give your virtual machine more cores? Or try booting a real Linux from USB? It will be faster.

aleks921 commented 8 years ago

I try booting Kali Linux from USB.

aczid commented 8 years ago

Also on 64-bit you no longer have the __asm__ / asm issue, right? :)

aleks921 commented 8 years ago

Yes, compile sucessfull with asm without __

aczid commented 8 years ago

I will remember this next time this comes up as an issue!

aleks921 commented 8 years ago

Ok, thank you.

aleks921 commented 8 years ago

Collected 4730 nonces... leftover complexity 1126131040256 (~2^40.03) - press enter to start brute-foCollected 4740 nonces... leftover complexity 1126131040256 (~2^40.03) - press enter to start brute-foCollected 4749 nonces... leftover complexity 79161478400 (~2^36.20) - initializing brute-force phase... Starting 2 threads to test 79161478400 states using 128-way bitslicing Cracking... 99.95% No solution found :( Why this fail.

aczid commented 8 years ago

Sometimes it just fails. Because it's a probabilistic attack. You only get 95% guarantee. Try again.

aleks921 commented 8 years ago

How many you get fail in this program before get key. Statistics interest me)

aczid commented 8 years ago

I've had it fail 10 times before it worked!

aleks921 commented 8 years ago

Oh, will try get key :))

aczid commented 8 years ago

Are you running from USB now? It's much faster, right? :)

aleks921 commented 8 years ago

Yes, i always with USB running this kali)

aczid commented 8 years ago

Oh I thought you had a VM.

aleks921 commented 8 years ago

No, VM very slowly. I like use on booting with USB)

aczid commented 8 years ago

Okay, at least now 2^37 after enough nonces finishes very fast, right?

aleks921 commented 8 years ago

Yes very fast finished.

aczid commented 8 years ago

Okay, nice to hear that. :) Maybe you can try at 2^38 or higher too - it's only 2x as long. Etc. 2^40 is quite a big number though, that's why that didn't work.

aleks921 commented 8 years ago

Now other card with emulation classic 1k try. Collected 6147 nonces... leftover complexity 1126131040256 (~2^40.03) - press enter to start brute-foCollected 6157 nonces... leftover complexity 68926322320 (~2^36.00) - initializing brute-force phase... Starting 2 threads to test 68926322320 states using 128-way bitslicing Cracking... 23%

aczid commented 8 years ago

If you start the brute-force phase and it doesn't go very fast and you want to try again, you should replace: fp = fopen(filename, "wb"); to fp = fopen(filename, "wb+"); to re-use the nonces you've already gathered.

aleks921 commented 8 years ago

thank, I change program)

aczid commented 8 years ago

Oh wait, that only works when you use the solve* programs next to this libnfc* program...

aczid commented 8 years ago

I didn't add the code to re-load the saved nonces yet... Sorry.

aczid commented 8 years ago

How is the other card doing?

aleks921 commented 8 years ago

other card mifare plus with emulation mifare classic. Now 50% and 2^36 numbers.

aczid commented 8 years ago

Ok please let me know how it goes.

aleks921 commented 8 years ago

log, of course.

Collected 6110 nonces... leftover complexity 1126131040256 (~2^40.03) - press enter to start brute-foCollected 6119 nonces... leftover complexity 1126131040256 (~2^40.03) - press enter to start brute-foCollected 6128 nonces... leftover complexity 1126131040256 (~2^40.03) - press enter to start brute-foCollected 6138 nonces... leftover complexity 1126131040256 (~2^40.03) - press enter to start brute-foCollected 6147 nonces... leftover complexity 1126131040256 (~2^40.03) - press enter to start brute-foCollected 6157 nonces... leftover complexity 68926322320 (~2^36.00) - initializing brute-force phase... Starting 2 threads to test 68926322320 states using 128-way bitslicing Cracking...73,77%

aleks921 commented 8 years ago

Cracking... 99.99% No solution found :(

aczid commented 8 years ago

Keep trying...

aleks921 commented 8 years ago

ok)

aleks921 commented 8 years ago

"Maybe you can try at 2^38" How stop program when 2^38, program have many 2^40 and last fastly on 2^36. How catch 2^38 in program.

aczid commented 8 years ago

No, it's all or nothing. Either you can go at 2^40, or at 2^36, or nothing.

aleks921 commented 8 years ago

2^40 you have sucessfull or not.

aczid commented 8 years ago

There is some uncertainty in the attack. This is described in the paper.

aleks921 commented 8 years ago

I right understand that on 2^40 program will very slowly but i have more chance find key than on 2^36

aczid commented 8 years ago

The crypto1 cipher uses 48 bits so the maximum keyspace is 2^48, but that's quite big. So we reduce it to a smaller space using some probabilities based on the encrypted nonces, and can check that with the encrypted parity bits.

aczid commented 8 years ago

Well, yeah. There is a trade-off between the online (nonce collecting) time and the offline (brute forcing) time. It could be that you would spend several hours more to reduce the space to under 2^37 but could actually do 2^40 of brute-force in that time.

aleks921 commented 8 years ago

Yes, i read about crypto-1 mifare classic practical attack. New attack about hardnested don't read yet. I see only today about this new attack. Do you try hack jcop41 card with emulation mifare classic in this program.

aczid commented 8 years ago

No, I have never heard of that. Javacard emulation of MFC?

aleks921 commented 8 years ago

Yes.

aczid commented 8 years ago

Okay, this sounds new to me, but I don't see why this attack would not work, because it attacks the protocol, not any specific chip. Please let me know about your results!

aleks921 commented 8 years ago

2 times trying, wait nonce package.

aleks921 commented 8 years ago

Now Collected 8115 nonces... leftover complexity 1126131040256 (~2^40.03) - press enter to start brute-foCollected 8124 nonces... leftover complexity 1126131040256 (~2^40.03) - press enter to start brute-foCollected 8134 nonces... leftover complexity 1126131040256 (~2^40.03) - press enter to start brute-fo

aleks921 commented 8 years ago

In first was this: foCollected 6157 nonces... leftover complexity 68926322320 (~2^36.00)

aczid commented 8 years ago

It all depends. There is some math going on in craptev1 that I don't fully understand. :)

aleks921 commented 8 years ago

Ok,understand))

aleks921 commented 8 years ago

I find keyB and want to read in card keyA across keyB. Do you can to say how without brut find KeyA know KeyB yet.

aleks921 commented 8 years ago

Problem with jcop42 card with emulation mifare classic 1k. (sak 28 ataq 0004) root@kali:~/crypto1_bs# ./libnfc_crypto1_crack a0a1a2a3a4a5 5 B 0 B Error while requesting plain tag-nonce Some other error occurred. Found tag with uid 6767b9d1, collecting nonces for key B of block 0 using known key B a0a1a2a3a4a5 for block 5 Don't move the tag!

aczid commented 8 years ago

Sorry, had to sleep for a bit. :) Don't move the tag, don't unplug usb, don't suspend your machine, etc. Unfortunately the newer cards don't allow the reading of key A with key B or vice versa. :( You have to crack them both.

aleks921 commented 8 years ago

I don,t move tag but this message only when i try hack card jcop41 with emulation MST. Can you fix this bag ?