-
Notifications
You must be signed in to change notification settings - Fork 229
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Attack never gets past stage 1 #30
Comments
Original comment by |
Original comment by |
Original comment by |
Original comment by |
Original comment by |
|
Original comment by |
Original comment by |
If you were looking for more information once Google Code is shut down, "mfcuk revision 65" in many of these blog posts is commit 1b6d022. The commit date is Sun Sep 23 10:29:36 2012 +0000, the message is:
I have still not had luck in getting libnfc 1.5.1 and mfcuk r65 working with a unknown card working. However, the issue with the pn532->uart not being detected was resolved by these libnfc configure options:
If you have at least one known key on the card, use mfoc instead of mfcuk. This is reliable even with recent libnfc (1.7.0). |
I've now made this operational with a pn532 chip. I used nfc-tools/libnfc@6752951, and 1b6d022, and installed these into a different prefix (like the instructions in the comment above mine) with a different It takes 45 - 90 minutes to dump a "behaving" card with the software. You should use There may be a way to modify mfcuk to fix misbehaving cards but I have not explored this. My strategy has been to tell mfcuk to break only a single sector (this is quicker), then using the keys it acquired to seed mfoc, which is much faster but only works if at least one key is known. You can specify this with the
If you have at least one of each of the A and B keys, you can recover all keys on the card. mfoc also works fine with current libnfc, so you only need to do funky LD_LIBRARY_PATH and multiple prefix tricks with mfcuk. I have not attempted to fix the software with current libnfc, as unfortunately each attempt at breaking a card takes about an hour. |
"Misbehaving cards" where "diff Nt" continues to increment with "auths" above 300 can indicate a couple of different issues:
If your cards are part of a system, it's probable that the key is generated by a function of the card's UID and sector number. If you have enough older cards (not MF Plus) which are vulnerable, you should be able to figure out the key derivation function once you have a mathematically significant number of samples. |
Interesting read. Thank you :) |
@micolous I have followed your instructions in using nfc-tools/libnfc@6752951, and 1b6d022. However, while doing make on mfcuk, I encountered the following error.
According to [https://github.com/nfc-tools/libnfc/issues/182](issue 182), it is a linkage problem. I followed the prefix used here, http://barisguvercin.com/mifare-1k-cracking/. Any ideas on how to solve it? Possible to upload your binaries? Edit: For anyone who is facing similar problems in future, I recommend you download Kali 2.0. All the libraries and binaries are compatible and working nicely. Plug and play. Live USB. MFCUK, MFOC and libnfc all working. |
Thanks Benjamin. 2016-06-10 14:55 GMT+02:00 Benjamin Lim notifications@github.com:
|
Anyone found a solution? I'm having the same problem. 56k auths and only 200 Nts. I'm using Kali Linux and a PN532. |
Try ./mfcuk -C -R 3 -S 250 - s 250 -v 3 |
Has anyone got the solution? |
Too old issue. |
Hi, nfc_initiator_transceive_bits(pnd, abtArEnc, 64, abtArEncPar, abtRx, sizeof(abtRx), abtRxPar); https://github.com/nfc-tools/mfcuk/blob/master/src/mfcuk.c line 600 maybe this is related to Known Issues: |
I can also confirm that I am having this issue. What makes this strange is that I am experiencing it even with cards that I have successfully cracked before. |
Original issue reported on code.google.com by
sgunder...@bigfoot.com
on 5 Jun 2014 at 8:31The text was updated successfully, but these errors were encountered: