mfoc icon indicating copy to clipboard operation
mfoc copied to clipboard

Card is not vulnerable to nested attack

Open mirobertod opened this issue 7 years ago • 9 comments

Hello, I used the following command to perform a dump of my Mifare Classic 1K card:

mfoc -O my_dump.mdf

Then I used the following command to write the dump into a blank card:

nfc-mfclassic w A my_dump.mdf blank.mdf f Result:

NFC reader: ACS / ACR122U PICC Interface opened
  Found MIFARE Classic card:
  ISO/IEC 14443A (106 kbps) target:
      ATQA (SENS_RES): 00  04  
         UID (NFCID1): a0  b0  5b  56  
        SAK (SEL_RES): 08  
  Guessing size: seems to be a 1024-byte card
  Writing 64 blocks |...............................................................|
  Done, 63 of 64 blocks written.

After that I tried to read my new card with same command used at the beginning:

mfoc -O my_new_dump.mdf

And the result is:

Found Mifare Classic 1k tag
  ISO/IEC 14443A (106 kbps) target:
      ATQA (SENS_RES): 00  04  
  * UID size: single
  * bit frame anticollision supported
         UID (NFCID1): a0  b0  5b  56  
        SAK (SEL_RES): 08  
  * Not compliant with ISO/IEC 14443-4
  * Not compliant with ISO/IEC 18092
  
  Fingerprinting based on MIFARE type Identification Procedure:
  * MIFARE Classic 1K
  * MIFARE Plus (4 Byte UID or 4 Byte RID) 2K, Security level 1
  * SmartMX with MIFARE 1K emulation
  Other possible matches based on ATQA & SAK values:
  
  Try to authenticate to all sectors with default keys...
  Symbols: '.' no key found, '/' A key found, '\' B key found, 'x' both keys found
  [Key: ffffffffffff] -> [................]
  [Key: a0a1a2a3a4a5] -> [/...............]
  [Key: d3f7d3f7d3f7] -> [/...............]
  [Key: 000000000000] -> [/...............]
  [Key: b0b1b2b3b4b5] -> [/...............]
  [Key: 4d3a99c351dd] -> [/...............]
  [Key: 1a982c7e459a] -> [/...............]
  [Key: aabbccddeeff] -> [/...............]
  [Key: 714c5c886e97] -> [/...............]
  [Key: 587ee5f9350f] -> [/...............]
  [Key: a0478cc39091] -> [/...............]
  [Key: 533cb6c723f6] -> [/...............]
  [Key: 8fd0a4f256e9] -> [/...............]
  
  Sector 00 - Found   Key A: a0a1a2a3a4a5 Unknown Key B
  Sector 01 - Unknown Key A               Unknown Key B
  Sector 02 - Unknown Key A               Unknown Key B
  Sector 03 - Unknown Key A               Unknown Key B
  Sector 04 - Unknown Key A               Unknown Key B
  Sector 05 - Unknown Key A               Unknown Key B
  Sector 06 - Unknown Key A               Unknown Key B
  Sector 07 - Unknown Key A               Unknown Key B
  Sector 08 - Unknown Key A               Unknown Key B
  Sector 09 - Unknown Key A               Unknown Key B
  Sector 10 - Unknown Key A               Unknown Key B
  Sector 11 - Unknown Key A               Unknown Key B
  Sector 12 - Unknown Key A               Unknown Key B
  Sector 13 - Unknown Key A               Unknown Key B
  Sector 14 - Unknown Key A               Unknown Key B
  Sector 15 - Unknown Key A               Unknown Key B
  
  
  Using sector 00 as an exploit sector
  Card is not vulnerable to nested attack

I tried also with the mfcuk command but I cannot read.

Is there someone can help me explaining what happend? Thanks

mirobertod avatar Feb 09 '18 14:02 mirobertod

same issue...any solutions???

rainyl avatar Oct 28 '18 15:10 rainyl

Try hardnested crack.

XAS-712 avatar Feb 12 '19 00:02 XAS-712

same issue useing an old Gymcard (SAK08) . got Lucky with another Card (new Gymcard SAK88) and get Keys of Sector 04 -14. even with this one known key added to the mfoc command mfoc -P 500 -O GymCard_mfoc.mfd -k XXXXXXXXXXXX

Try to authenticate to all sectors with default keys...
Symbols: '.' no key found, '/' A key found, '\' B key found, 'x' both keys found
[Key: xxxxxxxxxxxx] -> [....///////////.]
[Key: ffffffffffff] -> [xxxx///////////x]
[Key: a0a1a2a3a4a5] -> [xxxx///////////x]
[Key: d3f7d3f7d3f7] -> [xxxx///////////x]
[Key: 000000000000] -> [xxxx///////////x]
[Key: b0b1b2b3b4b5] -> [xxxx///////////x]
[Key: 4d3a99c351dd] -> [xxxx///////////x]
[Key: 1a982c7e459a] -> [xxxx///////////x]
[Key: aabbccddeeff] -> [xxxx///////////x]
[Key: 714c5c886e97] -> [xxxx///////////x]
[Key: 587ee5f9350f] -> [xxxx///////////x]
[Key: a0478cc39091] -> [xxxx///////////x]
[Key: 533cb6c723f6] -> [xxxx///////////x]
[Key: 8fd0a4f256e9] -> [xxxx///////////x]

it wont work. Also tried a herdnested crack with miLazyCracker. MFOC not possible, detected hardened Mifare Classic got problems with the libnfc_cryptol_crack.

5trohm avatar Mar 12 '19 18:03 5trohm

I'm going back to the subject, someone has a solution, please?

scorpiodu23 avatar Dec 16 '19 10:12 scorpiodu23

Vou voltar ao assunto, alguém tem uma solução, por favor?

I can't find fault with my Mifare Plus 2k tag card he is not vulnerable to nested attack, someone has an idea or solution

mac3d0 avatar Feb 23 '20 16:02 mac3d0

so, i finally known that it because the card is not possible to be cracked by nested,

Try hardnested crack.

and his solution is the right way, thanks

rainyl avatar Mar 14 '20 01:03 rainyl

Could you show me the way I'm lost

Em sex., 13 de mar. de 2020 às 22:02, rainyhi [email protected] escreveu:

so, i finally known that it because the card is not possible to be cracked by nested,

Try hardnested crack.

and his solution is the right way, thanks

— You are receiving this because you commented. Reply to this email directly, view it on GitHub https://github.com/nfc-tools/mfoc/issues/53#issuecomment-598989743, or unsubscribe https://github.com/notifications/unsubscribe-auth/AKPETSYTDQHNDWWWIVR2ABDRHLJSTANCNFSM4EQAAECQ .

mac3d0 avatar Mar 17 '20 04:03 mac3d0

I would like a "tutorial" to learn

Em ter., 17 de mar. de 2020 às 01:57, Rafael Vitor [email protected] escreveu:

Could you show me the way I'm lost

Em sex., 13 de mar. de 2020 às 22:02, rainyhi [email protected] escreveu:

so, i finally known that it because the card is not possible to be cracked by nested,

Try hardnested crack.

and his solution is the right way, thanks

— You are receiving this because you commented. Reply to this email directly, view it on GitHub https://github.com/nfc-tools/mfoc/issues/53#issuecomment-598989743, or unsubscribe https://github.com/notifications/unsubscribe-auth/AKPETSYTDQHNDWWWIVR2ABDRHLJSTANCNFSM4EQAAECQ .

mac3d0 avatar Mar 17 '20 04:03 mac3d0

There is a tutorial here for the hardnested attack : https://samdecrock.medium.com/cracking-mifare-classic-nfc-cards-using-the-hardnested-attack-506aab3ea305

0xfalafel avatar Jun 14 '22 13:06 0xfalafel