dictionary for proxmark3
mfc_default_keys.dic.zip (5.7 MB)
dictionary for proxmark3
mfc_default_keys.dic.zip (5.7 MB)
dictionary for proxmark3 in txt format:
Cheers buddy, I just added those to our
(16^12) ~ (281,474,976,710,656) is the total possible amount of combinations of 12 hex characters
200,000,000 is 0.000071054273576% of that figure which means this script would have to run 1,407,375 times to generate 100% of possible combinations.
To test all possible combinations
48bits a key
106kbit/s transfer speed for mifare classic
2208 keys a second if disregarding other command bytes and the fact you canât just send 2208 keys in a row a second.
281,474,976,710,656/2208 = amount of seconds
Totals to:
4042 years, at a best case scenario as we are disregarding many factors like script changes, additional bytes in authentication commands, the time delays created by the WUP before sector authentication can even happen
And if every sector on that card had a different key than the last youâd be doing that *32. (129,344 years)
Not to mention after a certain point of continual spamming you will definitely wear out the silicone and the credential would just begin failing to communicate at all
I love what youâve done itâs great but 1/281,474,976,710,656 is a needle in a haystack made of haystacks in a barn made of haystacks.
If someone sees my math is wrong feel free to correct me I am writing this at 6am so tired brain go bonk but I think itâs sound.
Edit to add: Iâm so getting Two hundred and eighty one trillion, four hundred and seventy four billion nine hundred and seventy six million, seven hundred and ten thousand six hundred and fifty six
as a wraparound tattoo.
In that you are right, but as I knew something about the keys in my case, I shortened the search quite a bit, so to speak, I narrowed the search. Thatâs why I came up with the keys. Otherwise I would still be looking for them. Itâs a bit of luck too.
Can you use this card for sniff data ? Or you have to use promark for sniffing ?