Error: No response from Proxmark3 and Error: Static encrypted nonce detected. Aborted

Hi there. Just got my proxmark on aliexpress and it’s giving me some strange errors on certain cards. On one card, I am getting a message saying “Error: No response from Proxmark3.” and on another card, I am getting an error saying "Error: Static encrypted nonce detected. Aborted. I am quite new to this so I was wondering if anybody knows what this means and if it’s possible to fix this issue. I already have the latest firmware installed and have the client installed by following the instructions from the guide here. All help is appreciated. All I tried was running the “hf mf autopwn” command. It should be a Mifare 1k card.

[usb] pm3 --> hf mf autopwn
[!] no known key was supplied, key recovery might fail
[+] loaded 45 keys from hardcoded default array
[=] running strategy 1
[=] .
[=] Chunk 3.7s | found 17/32 keys (45)
[=] running strategy 2
[=] .
[=] Chunk 3.7s | found 17/32 keys (45)
[+] target sector   0 key type B -- found valid key [ FFFFFFFFFFFF ] (used for nested / hardnested attack)
[+] target sector   1 key type B -- found valid key [ FFFFFFFFFFFF ]
[+] target sector   2 key type A -- found valid key [ FFFFFFFFFFFF ]
[+] target sector   2 key type B -- found valid key [ FFFFFFFFFFFF ]
[+] target sector   3 key type B -- found valid key [ FFFFFFFFFFFF ]
[+] target sector   4 key type B -- found valid key [ FFFFFFFFFFFF ]
[+] target sector   5 key type B -- found valid key [ FFFFFFFFFFFF ]
[+] target sector   6 key type B -- found valid key [ FFFFFFFFFFFF ]
[+] target sector   7 key type B -- found valid key [ FFFFFFFFFFFF ]
[+] target sector   8 key type B -- found valid key [ FFFFFFFFFFFF ]
[+] target sector   9 key type B -- found valid key [ FFFFFFFFFFFF ]
[+] target sector  10 key type B -- found valid key [ FFFFFFFFFFFF ]
[+] target sector  11 key type B -- found valid key [ FFFFFFFFFFFF ]
[+] target sector  12 key type B -- found valid key [ FFFFFFFFFFFF ]
[+] target sector  13 key type B -- found valid key [ FFFFFFFFFFFF ]
[+] target sector  14 key type B -- found valid key [ FFFFFFFFFFFF ]
[+] target sector  15 key type B -- found valid key [ FFFFFFFFFFFF ]
[-] Tag isn't vulnerable to Nested Attack (PRNG is probably not predictable).
[-] Nested attack failed --> try hardnested
[=] Hardnested attack starting...
[=] ---------+---------+---------------------------------------------------------+-----------------+-------
[=]          |         |                                                         | Expected to brute force
[=]  Time    | #nonces | Activity                                                | #states         | time
[=] ---------+---------+---------------------------------------------------------+-----------------+-------
[=]        0 |       0 | Start using 16 threads and AVX2 SIMD core               |                 |
[=]        0 |       0 | Brute force benchmark: 1578 million (2^30.6) keys/s     | 140737488355328 |   25h
[=]        4 |       0 | Using 235 precalculated bitflip state tables            | 140737488355328 |   25h
[#] AcquireEncryptedNonces finished

[!!] Error: Static encrypted nonce detected. Aborted.

And this is what I get on card 2.

[usb] pm3 --> hf mf autopwn
[!] no known key was supplied, key recovery might fail
[+] loaded 45 keys from hardcoded default array
[=] running strategy 1
[=] Chunk 1.5s | found 30/32 keys (45)
[=] running strategy 2
[=] Chunk 1.2s | found 30/32 keys (45)
[+] target sector   0 key type A -- found valid key [ A0A1A2A3A4A5 ] (used for nested / hardnested attack)
[+] target sector   0 key type B -- found valid key [ B578F38A5C61 ]
[+] target sector   2 key type A -- found valid key [ A0A1A2A3A4A5 ]
[+] target sector   2 key type B -- found valid key [ 0000014B5C31 ]
[+] target sector   3 key type A -- found valid key [ FFFFFFFFFFFF ]
[+] target sector   3 key type B -- found valid key [ FFFFFFFFFFFF ]
[+] target sector   4 key type A -- found valid key [ FFFFFFFFFFFF ]
[+] target sector   4 key type B -- found valid key [ FFFFFFFFFFFF ]
[+] target sector   5 key type A -- found valid key [ FFFFFFFFFFFF ]
[+] target sector   5 key type B -- found valid key [ FFFFFFFFFFFF ]
[+] target sector   6 key type A -- found valid key [ FFFFFFFFFFFF ]
[+] target sector   6 key type B -- found valid key [ 96A301BCE267 ]
[+] target sector   7 key type A -- found valid key [ FFFFFFFFFFFF ]
[+] target sector   7 key type B -- found valid key [ FFFFFFFFFFFF ]
[+] target sector   8 key type A -- found valid key [ FFFFFFFFFFFF ]
[+] target sector   8 key type B -- found valid key [ FFFFFFFFFFFF ]
[+] target sector   9 key type A -- found valid key [ FFFFFFFFFFFF ]
[+] target sector   9 key type B -- found valid key [ FFFFFFFFFFFF ]
[+] target sector  10 key type A -- found valid key [ FFFFFFFFFFFF ]
[+] target sector  10 key type B -- found valid key [ FFFFFFFFFFFF ]
[+] target sector  11 key type A -- found valid key [ FFFFFFFFFFFF ]
[+] target sector  11 key type B -- found valid key [ FFFFFFFFFFFF ]
[+] target sector  12 key type A -- found valid key [ FFFFFFFFFFFF ]
[+] target sector  12 key type B -- found valid key [ FFFFFFFFFFFF ]
[+] target sector  13 key type A -- found valid key [ FFFFFFFFFFFF ]
[+] target sector  13 key type B -- found valid key [ FFFFFFFFFFFF ]
[+] target sector  14 key type A -- found valid key [ FFFFFFFFFFFF ]
[+] target sector  14 key type B -- found valid key [ FFFFFFFFFFFF ]
[+] target sector  15 key type A -- found valid key [ FFFFFFFFFFFF ]
[+] target sector  15 key type B -- found valid key [ FFFFFFFFFFFF ]
[#] Nested: 00000000 vs 00000000

[!!] Error: No response from Proxmark3.

Static encrypted nonce is an odd behavior of some chinese knockoff mifare classic cards. Unfortunately the proxmark just hasn’t been programmed to deal with these yet.

I see. Odd because I was testing it with a card I got from a hotel so that’s weird. Any idea about the second one saying “[#] Nested: 00000000 vs 00000000 [!!] Error: No response from Proxmark3.” and then just it stopping there?

interesting. can you screenshot your startup screen once the pm3 client starts? it will show the hardware version, firmware versions, and client version information.

Static encrypted detection was added in a pretty recent version. Previously it would just hang at hardnested and then crash out.

In terms of the second card, have you tried running nested manually?

This is what I see upon startup when I go to try to use it.

[=] Using UART port COM6
[=] Communicating with PM3 over USB-CDC


  8888888b.  888b     d888  .d8888b.
  888   Y88b 8888b   d8888 d88P  Y88b
  888    888 88888b.d88888      .d88P
  888   d88P 888Y88888P888     8888"
  8888888P"  888 Y888P 888      "Y8b.
  888        888  Y8P  888 888    888
  888        888   "   888 Y88b  d88P
  888        888       888  "Y8888P"    [  ]


  [ Proxmark3 RFID instrument ]

    MCU....... AT91SAM7S512 Rev A
    Memory.... 512 Kb ( 60% used )

    Client.... Iceman/master/v4.16191-34-gf9dbf1e34 2023-02-07 14:40:24
    Bootrom... Iceman/master/v4.16191-34-gf9dbf1e34 2023-02-07 14:39:55
    OS........ Iceman/master/v4.16191-34-gf9dbf1e34 2023-02-07 14:40:06
    Target.... PM3 GENERIC


[usb] pm3 -->

When I try to run nested, this is what happens. Any ideas on what’s going on?

[usb] pm3 --> hf mf autopwn
[!] no known key was supplied, key recovery might fail
[+] loaded 45 keys from hardcoded default array
[=] running strategy 1
[=] Chunk 1.5s | found 30/32 keys (45)
[=] running strategy 2
[=] Chunk 1.2s | found 30/32 keys (45)
[+] target sector   0 key type A -- found valid key [ A0A1A2A3A4A5 ] (used for nested / hardnested attack)
[+] target sector   0 key type B -- found valid key [ B578F38A5C61 ]
[+] target sector   2 key type A -- found valid key [ A0A1A2A3A4A5 ]
[+] target sector   2 key type B -- found valid key [ 0000014B5C31 ]
[+] target sector   3 key type A -- found valid key [ FFFFFFFFFFFF ]
[+] target sector   3 key type B -- found valid key [ FFFFFFFFFFFF ]
[+] target sector   4 key type A -- found valid key [ FFFFFFFFFFFF ]
[+] target sector   4 key type B -- found valid key [ FFFFFFFFFFFF ]
[+] target sector   5 key type A -- found valid key [ FFFFFFFFFFFF ]
[+] target sector   5 key type B -- found valid key [ FFFFFFFFFFFF ]
[+] target sector   6 key type A -- found valid key [ FFFFFFFFFFFF ]
[+] target sector   6 key type B -- found valid key [ 96A301BCE267 ]
[+] target sector   7 key type A -- found valid key [ FFFFFFFFFFFF ]
[+] target sector   7 key type B -- found valid key [ FFFFFFFFFFFF ]
[+] target sector   8 key type A -- found valid key [ FFFFFFFFFFFF ]
[+] target sector   8 key type B -- found valid key [ FFFFFFFFFFFF ]
[+] target sector   9 key type A -- found valid key [ FFFFFFFFFFFF ]
[+] target sector   9 key type B -- found valid key [ FFFFFFFFFFFF ]
[+] target sector  10 key type A -- found valid key [ FFFFFFFFFFFF ]
[+] target sector  10 key type B -- found valid key [ FFFFFFFFFFFF ]
[+] target sector  11 key type A -- found valid key [ FFFFFFFFFFFF ]
[+] target sector  11 key type B -- found valid key [ FFFFFFFFFFFF ]
[+] target sector  12 key type A -- found valid key [ FFFFFFFFFFFF ]
[+] target sector  12 key type B -- found valid key [ FFFFFFFFFFFF ]
[+] target sector  13 key type A -- found valid key [ FFFFFFFFFFFF ]
[+] target sector  13 key type B -- found valid key [ FFFFFFFFFFFF ]
[+] target sector  14 key type A -- found valid key [ FFFFFFFFFFFF ]
[+] target sector  14 key type B -- found valid key [ FFFFFFFFFFFF ]
[+] target sector  15 key type A -- found valid key [ FFFFFFFFFFFF ]
[+] target sector  15 key type B -- found valid key [ FFFFFFFFFFFF ]
[#] Nested: 00000000 vs 00000000

[!!] Error: No response from Proxmark3.

[usb] pm3 --> hf mf nested --1k --blk 0 -k A0A1A2A3A4A5
[+] Testing known keys. Sector count 16
[=] Chunk 1.5s | found 30/32 keys (46)
[+] Time to check 45 known keys: 1 seconds

[+] enter nested key recovery
[#] Nested: 00000000 vs 00000000
[!!] Command execute timeout

[usb] pm3 -->         

Could potentially be another symptom of a static encrypted card. But that’s just a guess.

If I try to run hardnested this is what happens. Not sure what I’m doing here or if it even helps.

[usb] pm3 --> hf mf hardnested -t --tk a0a1a2a3a4a5
[=] Target block no   0, target key type: A, known target key: a0a1a2a3a4a5
[=] File action: none, Slow: No, Tests: 1
[=] Hardnested attack starting...
[=] ---------+---------+---------------------------------------------------------+-----------------+-------
[=]          |         |                                                         | Expected to brute force
[=]  Time    | #nonces | Activity                                                | #states         | time
[=] ---------+---------+---------------------------------------------------------+-----------------+-------
[=]        0 |       0 | Start using 16 threads and AVX2 SIMD core               |                 |
[=]        0 |       0 | Brute force benchmark: 1485 million (2^30.5) keys/s     | 140737488355328 |   26h
[=]        0 |       0 | Starting Test #1 ...                                    | 140737488355328 |   26h
[=]        4 |       0 | Using 235 precalculated bitflip state tables            | 140737488355328 |   26h
[=]        5 |       0 | Simulating key a0a1a2a3a4a5, cuid 494cdad9 ...          | 140737488355328 |   26h
[=]        6 |     113 | Apply bit flip properties                               |    131766345728 |   89s
[=]        7 |     226 | Apply bit flip properties                               |      5896594432 |    4s
[=]        8 |     339 | Apply bit flip properties                               |      1434183936 |    1s
[=]        9 |     451 | Apply bit flip properties                               |      1247843200 |    1s
[=]        9 |     563 | Apply bit flip properties                               |      1247843200 |    1s
[=]       10 |     676 | Apply bit flip properties                               |      1247843200 |    1s
[=]       10 |     788 | Apply bit flip properties                               |      1247843200 |    1s
[=]       10 |     898 | Apply bit flip properties                               |      1247843200 |    1s
[=]       10 |    1008 | Apply bit flip properties                               |      1247843200 |    1s
[=]       10 |    1116 | Apply bit flip properties                               |      1247843200 |    1s
[=]       10 |    1227 | Apply bit flip properties                               |      1247843200 |    1s
[=]       10 |    1335 | Apply bit flip properties                               |      1247843200 |    1s
[=]       11 |    1443 | Apply Sum property. Sum(a0) = 120                       |       343442304 |    0s
[=]       11 |    1443 | (Ignoring Sum(a8) properties)                           |       343442304 |    0s
[=]       13 |    1443 | (Test: Key found)                                       |               0 |    0s
[=]       13 |    1443 | Brute force phase completed.  Key found: A0A1A2A3A4A5   |               0 |    0s
[usb] pm3 -->   

Why are you targeting a block you already have a key for?

Yea just realized that didn’t know what I was doing. But yea the autopwn isn’t working for either of the two cards. Is there any updates of static encrypted cards and if it could be copied or is that not possible at the moment?

The same thing happens to me and while I am learning to sniff, I made this:

I was trying with dictionary. :sweat_smile:

[usb] pm3 → hf mf chk -a --tblk 11 -f mis_keys.dic
[+] loaded 32811839 keys from dictionary file C:\Users\APOFIS\Downloads\ProxSpace\client\dictionaries/mis_keys.dic
[=] Start check for keys…
[=] …

are keys that I have generated and that are not repeated. created with python

Hi :slight_smile: is there any way to share this keys.dic file with us? :slight_smile: