nfc-tools / miLazyCracker

Mifare Classic Plus - Hardnested Attack Implementation for SCL3711 LibNFC USB reader
325 stars 62 forks source link

Mifare Plus with no known key #11

Open KaezerR opened 5 years ago

KaezerR commented 5 years ago

Hello,

First of all I thank the creators of these wonderful tools that make it easy for us! But I happen to have a problem, and I hope to find the solution here! I have a Mifare Classic 1k card, whose security makes me think of a Mifare Classic 1k Plus. Of course I try to clone it to have another copy. As said before when I play mfcuk Diff Nt and Auth have all the time the same value over 2000. I do not know any sequence of the card, I still try several combolist through mfoc (keylist) but that did not give anything. I also tried to go through MilazyCracker (with crapto1 / craptev1), same result (mfoc: ERROR: No sector encrypted with the default key, exiting ...). I asked myself a question a little crazy, unless you have other solutions to offer me ahah. Is it possible to ask mfoc to test all possible combinations (with as parameter: characters abcdef0123456789, length 12), on a single sector (eg 0: A) for a day to fall on the right combination. Knowing that generating a file with all combinations would represent a file of 3 Peta bytes, rather huge. Once this combination is found, execute the basic mfoc "nested" attack to recover the remaining 15 and 16 sectors. I count if it is possible to run on a raspberry pi (low consumption, ...). The attack will be extremely, extremely, extremely long, ... I know, ... but I have no choice. There is the problem of the power outage, and we must start all over again, problematic with an attack of such length. I hope I have not rushed you with my questions but I am in my last ditches. If you wish to have additional information, and if you have other solutions, do not hesitate! Thank you very much in advance ! PS: My apologies if you find spelling mistakes, I'm French :-)

SPECTERR.