nfc-tools / mfcuk

MiFare Classic Universal toolKit (MFCUK)
GNU General Public License v2.0
954 stars 226 forks source link

Diff Nt and Auth always equal #50

Open alexislg2 opened 6 years ago

alexislg2 commented 6 years ago

Hello, I am running mfcuk on a single key from a single sector. It is running for long time but what is surprising to me is that I always get Diff Nt and Auth equals:

Let me entertain you! uid: type: 08 key: 000000000000 block: 03 diff Nt: 5936 auths: 5936

I tried with many different timeouts (including 250/250). Result is the same. Any idea?

boanerxe commented 6 years ago

Hi, I'm having the same problem here. After a long time running it starts to give errors when diff Nt reachs 65535. I'm using a chinese pn532 board, and I've tried all interfaces (uart, i2c and spi). I've tried in my computer and also in a raspberry pi. I have also tried several combinations mfcuk and libnfc, always happening the same.

Does any one else have the same problem?

vwcity commented 6 years ago

Hi, I have the same problem. I think some manufacturer fix the flaw on their chips. I don't known how they fix the flaw, any idea ?

vwcity commented 6 years ago

I think your card is MIFARE Plus, this type of card is compatible with MIFARE Classic and the security flaw are fixed.

boanerxe commented 6 years ago

Exactly! I reached that conclusion yesterday. It is still possible to discover A and B keys trying a hardnesting attack. That can be done using the tool libnfc_crypto1_crack, or more easily (and automated) using miLazyCracker, which can be found in this github repository.

M-Gregoire commented 6 years ago

Hello, I have the exact same problem you describe :

-----------------------------------------------------
Let me entertain you!
    uid: 
   type: 08
    key: 000000000000
  block: 03
diff Nt: 15
  auths: 15
-----------------------------------------------------

-----------------------------------------------------
Let me entertain you!
    uid: 
   type: 08
    key: 000000000000
  block: 03
diff Nt: 16
  auths: 16
-----------------------------------------------------

-----------------------------------------------------
Let me entertain you!
    uid: 
   type: 08
    key: 000000000000
  block: 03
diff Nt: 17
  auths: 17
-----------------------------------------------------

-----------------------------------------------------
Let me entertain you!
    uid: 
   type: 08
    key: 000000000000
  block: 03
diff Nt: 18
  auths: 18
-----------------------------------------------------

-----------------------------------------------------
Let me entertain you!
    uid: 
   type: 08
    key: 000000000000
  block: 03
diff Nt: 19
  auths: 19
-----------------------------------------------------

I let mfcuk run for a few hours without any results. I tried multiple systems (Archlinux, Debian and Ubuntu) with multiples commits with always the same problem.

Did you find any fix or way to get a key from the card ?

Thanks

snallapa commented 2 years ago

@boanerxe I was wondering if you ended up trying that solution or got past this? I am having the same issue right now

tavgar commented 1 year ago

@snallapa @boanerxe I'm having the same issue anyone solved it?

snallapa commented 1 year ago

@tavgar its been a while since I touched some of this. off the top of my head I believe it meant that card vulnerability was fixed by the manufacturer. I believe after that I was able to still get data off my card as others already found keys for it. I was never able to get closer using mfcuk (some of this may be wrong as it’s from my memory. i’ll try to check later and see what I did)

tavgar commented 1 year ago

@snallapa Got some keys using mfoc-hardnested but it gets stuck in an infinite loop at sector 33

snallapa commented 1 year ago

@tavgar hmm yeah I never ran into that