-
Notifications
You must be signed in to change notification settings - Fork 231
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Diff Nt and Auth always equal #50
Comments
Hi, Does any one else have the same problem? |
Hi, |
I think your card is MIFARE Plus, this type of card is compatible with MIFARE Classic and the security flaw are fixed. |
Exactly! I reached that conclusion yesterday. It is still possible to discover A and B keys trying a hardnesting attack. |
Hello,
I let mfcuk run for a few hours without any results. I tried multiple systems (Archlinux, Debian and Ubuntu) with multiples commits with always the same problem. Did you find any fix or way to get a key from the card ? Thanks |
@boanerxe I was wondering if you ended up trying that solution or got past this? I am having the same issue right now |
@tavgar its been a while since I touched some of this. off the top of my head I believe it meant that card vulnerability was fixed by the manufacturer. I believe after that I was able to still get data off my card as others already found keys for it. I was never able to get closer using mfcuk (some of this may be wrong as it’s from my memory. i’ll try to check later and see what I did) |
@snallapa Got some keys using mfoc-hardnested but it gets stuck in an infinite loop at sector 33 |
@tavgar hmm yeah I never ran into that |
Hello, I am running mfcuk on a single key from a single sector. It is running for long time but what is surprising to me is that I always get Diff Nt and Auth equals:
Let me entertain you!
uid:
type: 08
key: 000000000000
block: 03
diff Nt: 5936
auths: 5936
I tried with many different timeouts (including 250/250). Result is the same. Any idea?
The text was updated successfully, but these errors were encountered: