Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

crapto1 / craptev1 website is down #29

Closed
matxbox opened this issue Jun 18, 2018 · 35 comments
Closed

crapto1 / craptev1 website is down #29

matxbox opened this issue Jun 18, 2018 · 35 comments

Comments

@matxbox
Copy link

@matxbox matxbox commented Jun 18, 2018

Hi @aczid, first of all thanks for your work. I am trying to build crypto1_bs but it gives me a 404 not found error when make tries to get the crapto1 and craptev1 packages. I went to the website you included in the makefile, under the get_ calls, and it gives me again 404 not found.
I searched a lot but i don't know where to find those two, do you have something like a link to another mirror or else? Thanks in advance
Mattia

@3skr0
Copy link

@3skr0 3skr0 commented Jun 18, 2018

hello. same issue here

@aczid
Copy link
Owner

@aczid aczid commented Jun 19, 2018

Hi, I'm sorry but I have no control over the CraptEV1 code distribution. Its license explicitly forbids redistribution, that's why it might be hard to find online.
That comment in the README you quote is very outdated but yes, the software was unavailable for this very license violation back then in 2016.
The software has been available at the original URL for at least the past year, but has suddenly gone offline again. Please just keep an eye out for it to re-appear there.

@askerlee
Copy link

@askerlee askerlee commented Jun 23, 2018

I requested these two files from Bla and he sent them to me immediately :D

@matxbox
Copy link
Author

@matxbox matxbox commented Jun 24, 2018

It worked for me too, Bla sent me the files about 10 min after I asked him!

@aczid
Copy link
Owner

@aczid aczid commented Jun 26, 2018

Reopening this for visibility.

@aczid aczid reopened this Jun 26, 2018
@aczid aczid changed the title crapto1 and craptev1 not found crapto1 / craptev1 website is down Jun 26, 2018
@target111
Copy link

@target111 target111 commented Jun 26, 2018

Hey there, I sent bla an email requesting those files about 2 days ago but he has yet to respond.. any other way I could obtain them?

@aczid
Copy link
Owner

@aczid aczid commented Jun 26, 2018

The four word license states "No redistribution. No modifications."
You can only legally get it from bla.

@eyJhb
Copy link

@eyJhb eyJhb commented Jun 27, 2018

Trying to message Bla too, I really hate having to bug. Hope Bla returns with the files !

@TriV3
Copy link

@TriV3 TriV3 commented Jul 2, 2018

How can i contact Bla, in the hope to get the craptev1 and crapto1 libraries?

@target111
Copy link

@target111 target111 commented Jul 2, 2018

@TriV3 their gmail: blapost@gmail.com

@Ricco29
Copy link

@Ricco29 Ricco29 commented Jul 10, 2018

Hi I have the same problem but I have no news of Bla. can someone send me the files?
thank you
Eric

EDIT :it's ok, BLA send me the files

@iPowerTech
Copy link

@iPowerTech iPowerTech commented Aug 29, 2018

Hi bro, the hardnested attack performed by craptev1 code was included into pm3 client. Maybe is possible to rewrite an open library porting all needed method from pm3 hardnested source... also me asked bla that files whit no response :/

@Erhold
Copy link

@Erhold Erhold commented Sep 8, 2018

Hello everyone,
As many, I'm currently looking for the two archives craptev1 and crapto1. Of course, my first move was to email Bla but, eh, no one can be available at all time.
If anyone feels kind enough to send them to me at xxxyyyzzz (address deleted), that would be super nice from him / her ;-)
Thanks in advance and have a good day,
E.

Edit : Bla answered me very soon after my first message ==> thanks a lot anyway ;-) I guess I have to get to work now...

@aczid
Copy link
Owner

@aczid aczid commented Sep 9, 2018

Just a reminder to everybody that redistribution of bla's code is not allowed by its license.
The way forward is to port the existing hardnested attack from the proxmark3 codebase (GPL licensed) to a new project that interfaces with libnfc. I hinted at this in the README.

@aczid aczid closed this as completed Jan 21, 2019
Repository owner deleted a comment from AMV007 Jan 21, 2019
Repository owner deleted a comment from dyland98 Jan 21, 2019
Repository owner deleted a comment from xdemx Jan 21, 2019
Repository owner deleted a comment from ButtersStotch123 Jan 21, 2019
Repository owner deleted a comment from KaZ25 Jan 21, 2019
Repository owner deleted a comment from valeminel Jan 21, 2019
Repository owner deleted a comment from SimeoneVilardo Jan 21, 2019
Repository owner deleted a comment from valeminel Jan 21, 2019
Repository owner deleted a comment from valeminel Jan 21, 2019
Repository owner deleted a comment from valeminel Jan 21, 2019
Repository owner deleted a comment from KaZ25 Jan 21, 2019
Repository owner deleted a comment from 3skr0 Jan 21, 2019
Repository owner deleted a comment from 3skr0 Jan 21, 2019
Repository owner deleted a comment from cenzo85 Jan 21, 2019
Repository owner deleted a comment from target111 Jan 21, 2019
@aczid
Copy link
Owner

@aczid aczid commented Jan 21, 2019

It looks like this will not be fixed. You can not get the files legally anywhere except from bla.
@vk496 is working on integrating the proxmark3 implementation in an update for mfoc, at https://github.com/vk496/mfoc/tree/hardnested

@EnnioEvo
Copy link

@EnnioEvo EnnioEvo commented Feb 24, 2019

It looks like this will not be fixed. You can not get the files legally anywhere except from bla.
@vk496 is working on integrating the proxmark3 implementation in an update for mfoc, at https://github.com/vk496/mfoc/tree/hardnested

Does this hardnested work? Has someone tried it?

@iceman1001
Copy link
Contributor

@iceman1001 iceman1001 commented Feb 24, 2019

just get a proxmark3 device and you will have full support for the fastest hardnested implementation currently in the whole world.

@eyJhb
Copy link

@eyJhb eyJhb commented Feb 26, 2019

@iceman1001 what a ridiculous notion ... Yeah I will just shit out 275 EUR for a proxmark 3 device.

@iceman1001
Copy link
Contributor

@iceman1001 iceman1001 commented Feb 26, 2019

@eyJhb It was a solution suggestion, If you don't like it, its fine. Your options now is to hope the fix at vk496 will be finished and merged to mfoc, by the looks at it I would say it may take some time. Or find the old hardnested solver that works with other devices.

A quick search on aliexpress gives alternatives, https://www.aliexpress.com/wholesale?catId=0&initiative_id=AS_20190226005332&SearchText=proxmark3

@eyJhb
Copy link

@eyJhb eyJhb commented Feb 26, 2019

@iceman1001 there wasn't asked for a solution, it was a simple question of whether it worked or if anybody had tried it... - And saying, "just buy this world class equipment that costs a shit load of money", wouldn't really have been the best solution either if it were the case. :)

@iceman1001
Copy link
Contributor

@iceman1001 iceman1001 commented Feb 26, 2019

@eyJhb keep it up! I am sure you will find your answers

@dimitrire
Copy link

@dimitrire dimitrire commented Feb 26, 2019

Hello everyone, could someone tell me where can I find crapto1 / craptev1 please?

@EnnioEvo
Copy link

@EnnioEvo EnnioEvo commented Feb 26, 2019

Write to blapost@gmail.com, he gave me the files just in one day.

@SPECTERR
Copy link

@SPECTERR SPECTERR commented Feb 27, 2019

Hello everyone ! I'm not very good in this field, it's been a while since I deviated from this notions. That's why I would like to know, after recovering the two missing files, where should I place them to have a functional miLazyCracker? Thank you very much in advance !

@dimitrire
Copy link

@dimitrire dimitrire commented Feb 27, 2019

Ecrivez à blapost@gmail.com , il m'a donné les fichiers juste en une journée.

Write to blapost@gmail.com, he gave me the files just in one day.

Thank you

@dimitrire
Copy link

@dimitrire dimitrire commented Feb 28, 2019

Hello everyone, I wanted to install miLaziCracker but here is what it means to intallation

root@kali:~/miLazyCracker# ./miLazyCrackerFreshInstall.sh

  • sudo apt-get install git libnfc-bin autoconf libnfc-dev
    Reading package lists... Done
    Building dependency tree
    Reading state information... Done
    autoconf is already the newest version (2.69-11).
    git is already the newest version (1:2.20.1-2).
    libnfc-bin is already the newest version (1.7.1-4+b1).
    libnfc-dev is already the newest version (1.7.1-4+b1).
    The following package was automatically installed and is no longer required:
    libperl5.26
    Use 'sudo apt autoremove' to remove it.
    0 upgraded, 0 newly installed, 0 to remove and 537 not upgraded.
  • '[' -d mfoc ']'
  • cd mfoc
  • git reset --hard
    HEAD is now at ba072f1 update debian dir with up-to-date packaging
  • git clean -dfx
    Removing aclocal.m4
    Removing autom4te.cache/
    Removing config.log
    Removing configure
    Removing src/mfoc.c.orig
    Removing src/mfoc.c.rej
    Removing src/mfoc.h.rej
  • patch -p1
    patching file src/mfoc.c
    Hunk #1 succeeded at 72 with fuzz 2 (offset 14 lines).
    Hunk #2 FAILED at 159.
    Hunk #3 succeeded at 257 (offset 15 lines).
    Hunk #4 FAILED at 471.
    Hunk #5 FAILED at 554.
    Hunk #6 FAILED at 770.
    Hunk #7 FAILED at 1029.
    5 out of 7 hunks FAILED -- saving rejects to file src/mfoc.c.rej
  • patch -p1
    patching file src/mfoc.c
    Reversed (or previously applied) patch detected! Assume -R? [n] y
    Hunk #1 succeeded at 777 (offset 21 lines).
  • patch -p1
    patching file src/mfoc.c
    Reversed (or previously applied) patch detected! Assume -R? [n] y
    Hunk #1 succeeded at 321 (offset 14 lines).
    Hunk #2 succeeded at 332 with fuzz 1 (offset 14 lines).
  • patch -p1
    patching file src/mfoc.c
    Reversed (or previously applied) patch detected! Assume -R? [n] y
    Hunk #2 FAILED at 99.
    Hunk #3 succeeded at 327 with fuzz 1 (offset 11 lines).
    Hunk #4 succeeded at 864 (offset 11 lines).
    Hunk #5 succeeded at 911 (offset 11 lines).
    Hunk #6 FAILED at 911.
    2 out of 6 hunks FAILED -- saving rejects to file src/mfoc.c.rej
    patching file src/mfoc.h
    Reversed (or previously applied) patch detected! Assume -R? [n] y
  • autoreconf -vfi
    autoreconf: Entering directory `.'
    autoreconf: configure.ac: not using Gettext
    autoreconf: running: aclocal --force
    autoreconf: configure.ac: tracing
    autoreconf: configure.ac: not using Libtool
    autoreconf: running: /usr/bin/autoconf --force
    configure.ac:17: error: possibly undefined macro: AC_MSG_ERROR
    If this token and others are legitimate, please use m4_pattern_allow.
    See the Autoconf documentation.
    autoreconf: /usr/bin/autoconf failed with exit status: 1
  • ./configure
    configure: error: cannot find install-sh, install.sh, or shtool in "." "./.." "./../.."
  • make
    make: *** No targets specified and no makefile found. Stop.
  • sudo make install
    make: *** No rule to make target 'install'. Stop.
  • '[' -d crypto1_bs ']'
  • cd crypto1_bs
  • git reset --hard
    HEAD is now at 89de1ba Merge pull request #28 from dkgitdev/patch-1
  • git clean -dfx
    Removing libnfc_crypto1_crack.c.orig
  • patch -p1
    patching file libnfc_crypto1_crack.c
    Hunk #1 succeeded at 730 with fuzz 2 (offset 17 lines).
  • make get_craptev1
    wget http://crapto1.netgarage.org/craptev1-v1.1.tar.xz
    --2019-02-28 15:19:45-- http://crapto1.netgarage.org/craptev1-v1.1.tar.xz
    Resolving crapto1.netgarage.org (crapto1.netgarage.org)... 176.9.4.150
    Connecting to crapto1.netgarage.org (crapto1.netgarage.org)|176.9.4.150|:80... connected.
    HTTP request sent, awaiting response... 404 Not Found
    2019-02-28 15:19:45 ERROR 404: Not Found.

make: *** [Makefile:34: get_craptev1] Error 8

make: *** [Makefile:38: get_crapto1] Error 8

  • make
    gcc -std=gnu99 -O3 -march=native solve_bs.c crypto1_bs.c crypto1_bs_crack.c crapto1-v3.3/crapto1.c crapto1-v3.3/crypto1.c -I crapto1-v3.3/ craptev1-v1.1/craptev1.c -I craptev1-v1.1/ -o solve_bs -lpthread -lm
    make: gcc: Command not found
    make: *** [Makefile:19: solve_bs] Error 127
  • sudo cp -a libnfc_crypto1_crack /usr/local/bin
    cp: cannot stat 'libnfc_crypto1_crack': No such file or directory
  • sudo cp -a miLazyCracker.sh /usr/local/bin/miLazyCracker
  • echo Done.
    Done.

There are errors to the installation, I still launched the script and here is what it marks in loop

root@kali:~/miLazyCracker# ./miLazyCracker.sh
Found Mifare Classic Mini tag
ISO/IEC 14443A (106 kbps) target:
ATQA (SENS_RES): 00 04

  • UID size: single
  • bit frame anticollision supported
    UID (NFCID1): 3b c9 f5 a9
    SAK (SEL_RES): 09
  • Not compliant with ISO/IEC 14443-4
  • Not compliant with ISO/IEC 18092

Fingerprinting based on MIFARE type Identification Procedure:

  • MIFARE Mini 0.3K
  • SmartMX with MIFARE 1K emulation
    Other possible matches based on ATQA & SAK values:

Try to authenticate to all sectors with default keys...
Symbols: '.' no key found, '/' A key found, '' B key found, 'x' both keys found
[Key: ffffffffffff] -> [x.xxx]
[Key: a0a1a2a3a4a5] -> [x.xxx]
[Key: d3f7d3f7d3f7] -> [x.xxx]
[Key: 000000000000] -> [x.xxx]
[Key: b0b1b2b3b4b5] -> [x.xxx]
[Key: 4d3a99c351dd] -> [x.xxx]
[Key: 1a982c7e459a] -> [x.xxx]
[Key: aabbccddeeff] -> [x.xxx]
[Key: 714c5c886e97] -> [x.xxx]
[Key: 587ee5f9350f] -> [x.xxx]
[Key: a0478cc39091] -> [x.xxx]
[Key: 533cb6c723f6] -> [x.xxx]
[Key: 8fd0a4f256e9] -> [x.xxx]

Sector 00 - Found Key A: ffffffffffff Found Key B: ffffffffffff
Sector 01 - Unknown Key A Unknown Key B
Sector 02 - Found Key A: ffffffffffff Found Key B: ffffffffffff
Sector 03 - Found Key A: ffffffffffff Found Key B: ffffffffffff
Sector 04 - Found Key A: ffffffffffff Found Key B: ffffffffffff

Using sector 00 as an exploit sector
Card is not vulnerable to nested attack
MFOC not possible, detected hardened Mifare Classic
Trying HardNested Attack...
libnfc_crypto1_crack ffffffffffff 16 B 4 B mfc_3bc9f5a9_foundKeys.txt
./miLazyCracker.sh: line 87: libnfc_crypto1_crack: command not found
MFOC not possible, detected hardened Mifare Classic
Trying HardNested Attack...
libnfc_crypto1_crack ffffffffffff 16 B 4 B mfc_3bc9f5a9_foundKeys.txt
./miLazyCracker.sh: line 87: libnfc_crypto1_crack: command not found
MFOC not possible, detected hardened Mifare Classic
Trying HardNested Attack...
libnfc_crypto1_crack ffffffffffff 16 B 4 B mfc_3bc9f5a9_foundKeys.txt
./miLazyCracker.sh: line 87: libnfc_crypto1_crack: command not found
MFOC not possible, detected hardened Mifare Classic
Trying HardNested Attack...
libnfc_crypto1_crack ffffffffffff 16 B 4 B mfc_3bc9f5a9_foundKeys.txt
./miLazyCracker.sh: line 87: libnfc_crypto1_crack: command not found
MFOC not possible, detected hardened Mifare Classic
Trying HardNested Attack...
libnfc_crypto1_crack ffffffffffff 16 B 4 B mfc_3bc9f5a9_foundKeys.txt
./miLazyCracker.sh: line 87: libnfc_crypto1_crack: command not found
MFOC not possible, detected hardened Mifare Classic
Trying HardNested Attack...
libnfc_crypto1_crack ffffffffffff 16 B 4 B mfc_3bc9f5a9_foundKeys.txt
./miLazyCracker.sh: line 87: libnfc_crypto1_crack: command not found
MFOC not possible, detected hardened Mifare Classic
Trying HardNested Attack...
libnfc_crypto1_crack ffffffffffff 16 B 4 B mfc_3bc9f5a9_foundKeys.txt
./miLazyCracker.sh: line 87: libnfc_crypto1_crack: command not found
MFOC not possible, detected hardened Mifare Classic
Trying HardNested Attack...
libnfc_crypto1_crack ffffffffffff 16 B 4 B mfc_3bc9f5a9_foundKeys.txt
./miLazyCracker.sh: line 87: libnfc_crypto1_crack: command not found
MFOC not possible, detected hardened Mifare Classic

Does anyone have the solution please
Best Regards Dimitri

@aczid
Copy link
Owner

@aczid aczid commented Feb 28, 2019

I don't think miLazyCracker actually works. Anyway, it's not my software and therefore it's not supported here.

@EnnioEvo
Copy link

@EnnioEvo EnnioEvo commented Feb 28, 2019

miLazyCracker works, just:

  • Run miLazyCrackerFreshInstall
  • put the 2 files crapto1 and craptoev1 in the folder crypto_bs, and in the same folder open "MakeFile" and delete the two wget lines that try to download the 2 files from internet.
  • open miLazyCrackerFreshInstall and manually run the lines from the first "make"

@dimitrire
Copy link

@dimitrire dimitrire commented Mar 1, 2019

Thank you for your answer, I will try later, but what'' and in the same folder open "MakeFile" and delete the two wget lines that try to download the 2 files from internet.' '

And' 'and manually run the lines from the first "make"' '.

@SPECTERR
Copy link

@SPECTERR SPECTERR commented Mar 1, 2019

Hello,

First of all thank you for your answers, also thank you for giving me the instructions of executions. Only one last question bothers me, having no news of bla I searched and found the two tar files on the internet (tedious), so I managed to recover them, but I do not know if it is the good ones (these date from 2009), in the worst case a person could transfer them to me so that I can make a comparison?

Thank you very much in advance

milcrack@yopmail.com

@eatbigger
Copy link

@eatbigger eatbigger commented Mar 1, 2019

dimitrire did you get the files from bla? If you did I can help you from there.

@dimitrire
Copy link

@dimitrire dimitrire commented Mar 2, 2019

Yes, I have the files

@ghost
Copy link

@ghost ghost commented Apr 30, 2019

Hello How to recovered the 2 missing files crapto1 and craptev1 because bra does not answer is what someone can send them to me?
IcoderX@protonmail.ch

@aczid
Copy link
Owner

@aczid aczid commented May 1, 2019

@vk496 has created an updated version of mfoc which applies the hardnested attack, please start using this tool. https://github.com/vk496/mfoc/tree/hardnested
I've tested the tool and it works fine (but could still be faster). Thank you @vk496!

@aczid
Copy link
Owner

@aczid aczid commented May 1, 2019

Closing this issue for good.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests