Try:
hf mf autopwn -f mfc_default_keys
That’ll retry it with the default dictionary
I thought it did that automatically, good to know!
Try:
hf mf autopwn -f mfc_default_keys
That’ll retry it with the default dictionary
I thought it did that automatically, good to know!
hf mf autopwn -f mfc_default_keys
[!] no known key was supplied, key recovery might fail
[+] loaded 5 user keys
[+] loaded 61 keys from hardcoded default array
[+] Loaded 1793 keys from dictionary file C:\ProxSpace\pm3\proxmark3\client\dictionaries/mfc_default_keys.dic
[=] running strategy 1
[=] running strategy 2
[=] …
[=] …
[=] …
[=] …
[=] …
[=] …
[=] …
[=] …
[=] …
[=] …
[=] …
[=] …
[=] …
[=] …
[=] …
[=] …
[=] …
[=] …
[=] …
[=] …
[=] …
[=] …
[=] Expected execution time is about 25seconds on average
[=] Press pm3 button to abort
[=] Running darkside …
[-] Card is not vulnerable to Darkside attack (doesn’t send NACK on authentication requests).
[-] No usable key was found!
[usb] pm3 →
I think that means we’re back to trying to sniff a usable key