Cloning MIFARE Classic with PM3 Iceman

Try:
hf mf autopwn -f mfc_default_keys

That’ll retry it with the default dictionary

I thought it did that automatically, good to know!

hf mf autopwn -f mfc_default_keys
[!] no known key was supplied, key recovery might fail
[+] loaded 5 user keys
[+] loaded 61 keys from hardcoded default array
[+] Loaded 1793 keys from dictionary file C:\ProxSpace\pm3\proxmark3\client\dictionaries/mfc_default_keys.dic
[=] running strategy 1
[=] running strategy 2
[=] …
[=] …
[=] …
[=] …
[=] …
[=] …
[=] …
[=] …
[=] …
[=] …
[=] …
[=] …
[=] …
[=] …
[=] …
[=] …
[=] …
[=] …
[=] …
[=] …
[=] …
[=] …
[=] Expected execution time is about 25seconds on average
[=] Press pm3 button to abort

[=] Running darkside …
[-] Card is not vulnerable to Darkside attack (doesn’t send NACK on authentication requests).

[-] No usable key was found!
[usb] pm3

I think that means we’re back to trying to sniff a usable key

1 Like