0% found this document useful (0 votes)
5 views

Pn53x Forward o

The document details the addition of multiple custom keys to default keys for a card reading device, specifically for Mifare Classic 1K tags. It describes the process of unlocking the card, reading data, and successfully authenticating with found keys. The overall execution time for the operations is recorded as 27 seconds.

Uploaded by

xiwu1779364668
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views

Pn53x Forward o

The document details the addition of multiple custom keys to default keys for a card reading device, specifically for Mifare Classic 1K tags. It describes the process of unlocking the card, reading data, and successfully authenticating with found keys. The overall execution time for the operations is recorded as 27 seconds.

Uploaded by

xiwu1779364668
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 5

------------开始------------

The custom key 0xa11daea16aed has been added to the default keys
The custom key 0xc2f3ccef0b38 has been added to the default keys
The custom key 0xd6facad6519e has been added to the default keys
The custom key 0x41abaca1dcef has been added to the default keys
The custom key 0xc2f3ccef721a has been added to the default keys
The custom key 0xd6facad60d3e has been added to the default keys
The custom key 0xbd1c419e6b02 has been added to the default keys
The custom key 0xe165e1bc12a2 has been added to the default keys
The custom key 0xc2f3ccef58a4 has been added to the default keys
The custom key 0xd6facad69aac has been added to the default keys
The custom key 0x2a36d3204190 has been added to the default keys
The custom key 0xc2f3ccef7325 has been added to the default keys
The custom key 0xd6facad611d1 has been added to the default keys
The custom key 0x81c575cab236 has been added to the default keys
The custom key 0xc2f3ccef5b9f has been added to the default keys
The custom key 0xd6facad60487 has been added to the default keys
The custom key 0xb435f81b42bb has been added to the default keys
The custom key 0xc2f3ccefc525 has been added to the default keys
The custom key 0xd6facad6f1d3 has been added to the default keys
The custom key 0x51df24caa867 has been added to the default keys
The custom key 0xc2f3ccefb8a5 has been added to the default keys
The custom key 0xd6facad687d5 has been added to the default keys
The custom key 0x37d6aa21a1e9 has been added to the default keys
The custom key 0xc2f3ccefab4e has been added to the default keys
The custom key 0xd6facad6310a has been added to the default keys
The custom key 0x8891e07d351c has been added to the default keys
The custom key 0x9ba7b50130b8 has been added to the default keys
The custom key 0x64584afecf47 has been added to the default keys
The custom key 0xc2f3cceffd42 has been added to the default keys
The custom key 0xd6facad6d7e2 has been added to the default keys
普通 PCR532 设备
先解卡,然后利用解卡密钥写卡
Card type: S50
Found Mifare Classic 1k tag
Uid :65BB74CB
ISO/IEC 14443A (106 kbps) target:
ATQA (SENS_RES): 00 04
* UID size: single
* bit frame anticollision supported
UID (NFCID1): 65 bb 74 cb
SAK (SEL_RES): 08
* Not compliant with ISO/IEC 14443-4
* Not compliant with ISO/IEC 18092

Fingerprinting based on MIFARE type Identification Procedure:


* MIFARE Classic 1K
* MIFARE Plus (4 Byte UID or 4 Byte RID) 2K, Security level 1
* SmartMX with MIFARE 1K emulation
Other possible matches based on ATQA & SAK values:

Try to authenticate to all sectors with default keys...


Symbols: '.' no key found, '/' A key found, '\' B key found, 'x' both keys found
Remains: [32]
[Key: ffffffffffff] -> [..xxxxxxxx.xxxxx]
Remains: [6]
[Key: a0a1a2a3a4a5] -> [..xxxxxxxx.xxxxx]
Remains: [6]
[Key: d3f7d3f7d3f7] -> [..xxxxxxxx.xxxxx]
Remains: [6]
[Key: 000000000000] -> [..xxxxxxxx.xxxxx]
Remains: [6]
[Key: a11daea16aed] -> [..xxxxxxxx.xxxxx]
Remains: [6]
[Key: c2f3ccef0b38] -> [..xxxxxxxx.xxxxx]
Remains: [6]
[Key: d6facad6519e] -> [..xxxxxxxx.xxxxx]
Remains: [6]
[Key: 41abaca1dcef] -> [..xxxxxxxx.xxxxx]
Remains: [6]
[Key: c2f3ccef721a] -> [..xxxxxxxx.xxxxx]
Remains: [6]
[Key: d6facad60d3e] -> [..xxxxxxxx.xxxxx]
Remains: [6]
[Key: bd1c419e6b02] -> [..xxxxxxxx.xxxxx]
Remains: [6]
[Key: e165e1bc12a2] -> [..xxxxxxxx.xxxxx]
Remains: [6]
[Key: c2f3ccef58a4] -> [..xxxxxxxx.xxxxx]
Remains: [6]
[Key: d6facad69aac] -> [..xxxxxxxx.xxxxx]
Remains: [6]
[Key: 2a36d3204190] -> [..xxxxxxxx.xxxxx]
Remains: [6]
[Key: c2f3ccef7325] -> [..xxxxxxxx.xxxxx]
Remains: [6]
[Key: d6facad611d1] -> [..xxxxxxxx.xxxxx]
Remains: [6]
[Key: 81c575cab236] -> [..xxxxxxxx.xxxxx]
Remains: [6]
[Key: c2f3ccef5b9f] -> [..xxxxxxxx.xxxxx]
Remains: [6]
[Key: d6facad60487] -> [..xxxxxxxx.xxxxx]
Remains: [6]
[Key: b435f81b42bb] -> [..xxxxxxxx.xxxxx]
Remains: [6]
[Key: c2f3ccefc525] -> [..xxxxxxxx.xxxxx]
Remains: [6]
[Key: d6facad6f1d3] -> [..xxxxxxxx.xxxxx]
Remains: [6]
[Key: 51df24caa867] -> [..xxxxxxxx.xxxxx]
Remains: [6]
[Key: c2f3ccefb8a5] -> [..xxxxxxxx.xxxxx]
Remains: [6]
[Key: d6facad687d5] -> [..xxxxxxxx.xxxxx]
Remains: [6]
[Key: 37d6aa21a1e9] -> [..xxxxxxxx.xxxxx]
Remains: [6]
[Key: c2f3ccefab4e] -> [..xxxxxxxx.xxxxx]
Remains: [6]
[Key: d6facad6310a] -> [..xxxxxxxx.xxxxx]
Remains: [6]
[Key: 8891e07d351c] -> [..xxxxxxxx.xxxxx]
Remains: [6]
[Key: 9ba7b50130b8] -> [..xxxxxxxx.xxxxx]
Remains: [6]
[Key: 64584afecf47] -> [..xxxxxxxx.xxxxx]
Remains: [6]
[Key: c2f3cceffd42] -> [..xxxxxxxx.xxxxx]
Remains: [6]
[Key: d6facad6d7e2] -> [..xxxxxxxx.xxxxx]
Remains: [6]
[Key: b0b1b2b3b4b5] -> [..xxxxxxxx.xxxxx]
Remains: [6]
[Key: aabbccddeeff] -> [..xxxxxxxx.xxxxx]
Remains: [6]

Sector 00 - Unknown Key A Unknown Key B


Sector 01 - Unknown Key A Unknown Key B
Sector 02 - Found Key A: ffffffffffff Found Key B: ffffffffffff
Sector 03 - Found Key A: ffffffffffff Found Key B: ffffffffffff
Sector 04 - Found Key A: ffffffffffff Found Key B: ffffffffffff
Sector 05 - Found Key A: ffffffffffff Found Key B: ffffffffffff
Sector 06 - Found Key A: ffffffffffff Found Key B: ffffffffffff
Sector 07 - Found Key A: ffffffffffff Found Key B: ffffffffffff
Sector 08 - Found Key A: ffffffffffff Found Key B: ffffffffffff
Sector 09 - Found Key A: ffffffffffff Found Key B: ffffffffffff
Sector 10 - Unknown Key A Unknown Key B
Sector 11 - Found Key A: ffffffffffff Found Key B: ffffffffffff
Sector 12 - Found Key A: ffffffffffff Found Key B: ffffffffffff
Sector 13 - Found Key A: ffffffffffff Found Key B: ffffffffffff
Sector 14 - Found Key A: ffffffffffff Found Key B: ffffffffffff
Sector 15 - Found Key A: ffffffffffff Found Key B: ffffffffffff
Using sector 02 as an exploit sector
Sector: 0, type A, probe 0, distance 64
扇区: 0, 密钥 A, 探测次数 0, distance 64

发现无漏洞卡,PCR532 高性能模式无漏洞解卡,秒解模式开启!!
获取密钥成功,马上进行验证

Found Key: A [c2f3ccefe38c]


Data read with Key A revealed Key B: [d6facad62820]
- checking Auth: OK
Found Key: B [d6facad62820]

Sector: 1, type A, probe 0, distance 64


扇区: 1, 密钥 A, 探测次数 0, distance 64

发现无漏洞卡,PCR532 高性能模式无漏洞解卡,秒解模式开启!!
获取密钥成功,马上进行验证

Found Key: A [988d5f08fa1c]


Data read with Key A revealed Key B: [988d5f08fa1c]
- checking Auth: OK
Found Key: B [988d5f08fa1c]

Sector: 10, type A


Data read with Key A revealed Key B: [988d5f08fa1c]
- checking Auth: OK
Found Key: B [988d5f08fa1c]
Found Key: A [988d5f08fa1c]
Auth with all sectors succeeded, dumping keys to a file!
----------------------------------------------------------------
开始写普通操作!!!
Writing 64 blocks |
Writing blocks:ssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssss
Done, 64 of 64 blocks write.

格式化成功

INFO: 整体执行时间为(s): 27.000000

------------结束------------

------------开始------------
The custom key 0xa11daea16aed has been added to the default keys
The custom key 0xc2f3ccef0b38 has been added to the default keys
The custom key 0xd6facad6519e has been added to the default keys
The custom key 0x41abaca1dcef has been added to the default keys
The custom key 0xc2f3ccef721a has been added to the default keys
The custom key 0xd6facad60d3e has been added to the default keys
The custom key 0xbd1c419e6b02 has been added to the default keys
The custom key 0xe165e1bc12a2 has been added to the default keys
The custom key 0xc2f3ccef58a4 has been added to the default keys
The custom key 0xd6facad69aac has been added to the default keys
The custom key 0x2a36d3204190 has been added to the default keys
The custom key 0xc2f3ccef7325 has been added to the default keys
The custom key 0xd6facad611d1 has been added to the default keys
The custom key 0x81c575cab236 has been added to the default keys
The custom key 0xc2f3ccef5b9f has been added to the default keys
The custom key 0xd6facad60487 has been added to the default keys
The custom key 0xb435f81b42bb has been added to the default keys
The custom key 0xc2f3ccefc525 has been added to the default keys
The custom key 0xd6facad6f1d3 has been added to the default keys
The custom key 0x51df24caa867 has been added to the default keys
The custom key 0xc2f3ccefb8a5 has been added to the default keys
The custom key 0xd6facad687d5 has been added to the default keys
The custom key 0x37d6aa21a1e9 has been added to the default keys
The custom key 0xc2f3ccefab4e has been added to the default keys
The custom key 0xd6facad6310a has been added to the default keys
The custom key 0x8891e07d351c has been added to the default keys
The custom key 0x9ba7b50130b8 has been added to the default keys
The custom key 0x64584afecf47 has been added to the default keys
The custom key 0xc2f3cceffd42 has been added to the default keys
The custom key 0xd6facad6d7e2 has been added to the default keys
The custom key 0xc2f3ccefe38c has been added to the default keys
The custom key 0xd6facad62820 has been added to the default keys
The custom key 0x988d5f08fa1c has been added to the default keys
普通 PCR532 设备
先解卡,然后利用解卡密钥写卡
Card type: S50
Found Mifare Classic 1k tag
Uid :65BB74CB
ISO/IEC 14443A (106 kbps) target:
ATQA (SENS_RES): 00 04
* UID size: single
* bit frame anticollision supported
UID (NFCID1): 65 bb 74 cb
SAK (SEL_RES): 08
* Not compliant with ISO/IEC 14443-4
* Not compliant with ISO/IEC 18092

Fingerprinting based on MIFARE type Identification Procedure:


* MIFARE Classic 1K
* MIFARE Plus (4 Byte UID or 4 Byte RID) 2K, Security level 1
* SmartMX with MIFARE 1K emulation
Other possible matches based on ATQA & SAK values:

Try to authenticate to all sectors with default keys...


Symbols: '.' no key found, '/' A key found, '\' B key found, 'x' both keys found
Remains: [32]
[Key: ffffffffffff] -> [xxxxxxxxxxxxxxxx]
Remains: [0]

Sector 00 - Found Key A: ffffffffffff Found Key B: ffffffffffff


Sector 01 - Found Key A: ffffffffffff Found Key B: ffffffffffff
Sector 02 - Found Key A: ffffffffffff Found Key B: ffffffffffff
Sector 03 - Found Key A: ffffffffffff Found Key B: ffffffffffff
Sector 04 - Found Key A: ffffffffffff Found Key B: ffffffffffff
Sector 05 - Found Key A: ffffffffffff Found Key B: ffffffffffff
Sector 06 - Found Key A: ffffffffffff Found Key B: ffffffffffff
Sector 07 - Found Key A: ffffffffffff Found Key B: ffffffffffff
Sector 08 - Found Key A: ffffffffffff Found Key B: ffffffffffff
Sector 09 - Found Key A: ffffffffffff Found Key B: ffffffffffff
Sector 10 - Found Key A: ffffffffffff Found Key B: ffffffffffff
Sector 11 - Found Key A: ffffffffffff Found Key B: ffffffffffff
Sector 12 - Found Key A: ffffffffffff Found Key B: ffffffffffff
Sector 13 - Found Key A: ffffffffffff Found Key B: ffffffffffff
Sector 14 - Found Key A: ffffffffffff Found Key B: ffffffffffff
Sector 15 - Found Key A: ffffffffffff Found Key B: ffffffffffff
We have all sectors encrypted with the default keys..

开始写普通操作!!!
Writing 64 blocks |
Writing blocks:ssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssss
Done, 64 of 64 blocks write.

写卡成功

INFO: 整体执行时间为(s): 9.000000

------------结束------------

You might also like