Proxmark3 community

Research, development and trades concerning the powerful Proxmark3 device.

Remember; sharing is caring. Bring something back to the community.


"Learn the tools of the trade the hard way." +Fravia

You are not logged in.

Announcement

Time changes and with it the technology
Proxmark3 @ discord

Users of this forum, please be aware that information stored on this site is not private.

#1 2019-09-17 15:43:06

Dranked
Contributor
Registered: 2019-09-14
Posts: 16

Mifare Classic 1k Badge

Hey guys
I'm kinda new to this RFID section. I read this badge. It has like 5 entries. Is there any way to manipulate it and add more entries?

[=] Checking for known tags...

[-] Searching for ISO14443-A tag... UID : 10 5C DD 76
ATQA : 00 04
 SAK : 08 [2]
TYPE : NXP MIFARE CLASSIC 1k | Plus 2k SL1 | 1k Ev1
[=] proprietary non iso14443-4 card found, RATS not supported
[=] Answers to magic commands: NO
[+] Prng detection: WEAK

[+] Valid ISO14443-A tag  found

Later I used the command ''hf mf autopwn'' and I got this .json file:

{
  "Created": "proxmark3",
  "FileType": "mfcard",
  "blocks": {
    "0": "105CDD76E7880400468F755559803011",
    "1": "EA00C02E000000000000000000000000",
    "2": "00000000000000000000000000000000",
    "3": "A0A1A2A3A4A5787788C1B0B1B2B3B4B5",
    "4": "0FC000000620C3000000000000000000",
    "5": "0000000080FFFFAA0000000000000000",
    "6": "00000000000000000000000000000000",
    "7": "A0A1A2A3A4A50F00FFAA00008627C10A",
    "8": "00000000000000000000000000000000",
    "9": "00000000000000000000000000000000",
    "10": "00000000000000000000000000000000",
    "11": "FFFFFFFFFFFF00000000FFFFFFFFFFFF",
    "12": "00000000000000000000000000000000",
    "13": "00000000000000000000000000000000",
    "14": "00000000000000000000000000000000",
    "15": "FFFFFFFFFFFF00000000FFFFFFFFFFFF",
    "16": "00000000000000000000000000000000",
    "17": "00000000000000000000000000000000",
    "18": "00000000000000000000000000000000",
    "19": "FFFFFFFFFFFF00000000FFFFFFFFFFFF",
    "20": "00000000000000000000000000000000",
    "21": "00000000000000000000000000000000",
    "22": "00000000000000000000000000000000",
    "23": "FFFFFFFFFFFF00000000FFFFFFFFFFFF",
    "24": "00000000000000000000000000000000",
    "25": "00000000000000000000000000000000",
    "26": "00000000000000000000000000000000",
    "27": "FFFFFFFFFFFF00000000FFFFFFFFFFFF",
    "28": "00000000000000000000000000000000",
    "29": "00000000000000000000000000000000",
    "30": "00000000000000000000000000000000",
    "31": "FFFFFFFFFFFF00000000FFFFFFFFFFFF",
    "32": "00000000000000000000000000000000",
    "33": "00000000000000000000000000000000",
    "34": "00000000000000000000000000000000",
    "35": "FFFFFFFFFFFF00000000FFFFFFFFFFFF",
    "36": "00000000000000000000000000000000",
    "37": "00000000000000000000000000000000",
    "38": "00000000000000000000000000000000",
    "39": "FFFFFFFFFFFF00000000FFFFFFFFFFFF",
    "40": "00000000000000000000000000000000",
    "41": "00000000000000000000000000000000",
    "42": "00000000000000000000000000000000",
    "43": "FFFFFFFFFFFF00000000FFFFFFFFFFFF",
    "44": "00000000000000000000000000000000",
    "45": "00000000000000000000000000000000",
    "46": "00000000000000000000000000000000",
    "47": "FFFFFFFFFFFF00000000FFFFFFFFFFFF",
    "48": "00000000000000000000000000000000",
    "49": "00000000000000000000000000000000",
    "50": "00000000000000000000000000000000",
    "51": "FFFFFFFFFFFF00000000FFFFFFFFFFFF",
    "52": "00000000000000000000000000000000",
    "53": "00000000000000000000000000000000",
    "54": "00000000000000000000000000000000",
    "55": "FFFFFFFFFFFF00000000FFFFFFFFFFFF",
    "56": "00000000000000000000000000000000",
    "57": "00000000000000000000000000000000",
    "58": "00000000000000000000000000000000",
    "59": "FFFFFFFFFFFF00000000FFFFFFFFFFFF",
    "60": "00000000000000000000000000000000",
    "61": "00000000000000000000000000000000",
    "62": "00000000000000000000000000000000",
    "63": "FFFFFFFFFFFF00000000FFFFFFFFFFFF"
  },
  "Card": {
    "UID": "105CDD76",
    "SAK": "88",
    "ATQA": "0400"
  },
  "SectorKeys": {
    "0": {
      "KeyA": "A0A1A2A3A4A5",
      "KeyB": "B0B1B2B3B4B5",
      "AccessConditions": "787788C1",
      "AccessConditionsText": {
        "block0": "rdAB wrB",
        "block1": "rdAB wrB",
        "block2": "rdAB wrB",
        "block3": "wrAbyB rdCbyAB wrCbyB wrBbyB",
        "UserData": "C1"
      }
    },
    "1": {
      "KeyA": "A0A1A2A3A4A5",
      "KeyB": "00008627C10A",
      "AccessConditions": "0F00FFAA",
      "AccessConditionsText": {
        "block4": "rdB wrB",
        "block5": "rdB wrB",
        "block6": "rdB wrB",
        "block7": "wrAbyB rdCbyAB wrCbyB wrBbyB",
        "UserData": "AA"
      }
    },
    "2": {
      "KeyA": "FFFFFFFFFFFF",
      "KeyB": "FFFFFFFFFFFF",
      "AccessConditions": "00000000",
      "AccessConditionsText": {
        "block8": "rdAB wrAB incAB dectrAB",
        "block9": "rdAB wrAB incAB dectrAB",
        "block10": "rdAB wrAB incAB dectrAB",
        "block11": "rdAbyA rdCbyA rdBbyA wrBbyA",
        "UserData": "00"
      }
    },
    "3": {
      "KeyA": "FFFFFFFFFFFF",
      "KeyB": "FFFFFFFFFFFF",
      "AccessConditions": "00000000",
      "AccessConditionsText": {
        "block12": "rdAB wrAB incAB dectrAB",
        "block13": "rdAB wrAB incAB dectrAB",
        "block14": "rdAB wrAB incAB dectrAB",
        "block15": "rdAbyA rdCbyA rdBbyA wrBbyA",
        "UserData": "00"
      }
    },
    "4": {
      "KeyA": "FFFFFFFFFFFF",
      "KeyB": "FFFFFFFFFFFF",
      "AccessConditions": "00000000",
      "AccessConditionsText": {
        "block16": "rdAB wrAB incAB dectrAB",
        "block17": "rdAB wrAB incAB dectrAB",
        "block18": "rdAB wrAB incAB dectrAB",
        "block19": "rdAbyA rdCbyA rdBbyA wrBbyA",
        "UserData": "00"
      }
    },
    "5": {
      "KeyA": "FFFFFFFFFFFF",
      "KeyB": "FFFFFFFFFFFF",
      "AccessConditions": "00000000",
      "AccessConditionsText": {
        "block20": "rdAB wrAB incAB dectrAB",
        "block21": "rdAB wrAB incAB dectrAB",
        "block22": "rdAB wrAB incAB dectrAB",
        "block23": "rdAbyA rdCbyA rdBbyA wrBbyA",
        "UserData": "00"
      }
    },
    "6": {
      "KeyA": "FFFFFFFFFFFF",
      "KeyB": "FFFFFFFFFFFF",
      "AccessConditions": "00000000",
      "AccessConditionsText": {
        "block24": "rdAB wrAB incAB dectrAB",
        "block25": "rdAB wrAB incAB dectrAB",
        "block26": "rdAB wrAB incAB dectrAB",
        "block27": "rdAbyA rdCbyA rdBbyA wrBbyA",
        "UserData": "00"
      }
    },
    "7": {
      "KeyA": "FFFFFFFFFFFF",
      "KeyB": "FFFFFFFFFFFF",
      "AccessConditions": "00000000",
      "AccessConditionsText": {
        "block28": "rdAB wrAB incAB dectrAB",
        "block29": "rdAB wrAB incAB dectrAB",
        "block30": "rdAB wrAB incAB dectrAB",
        "block31": "rdAbyA rdCbyA rdBbyA wrBbyA",
        "UserData": "00"
      }
    },
    "8": {
      "KeyA": "FFFFFFFFFFFF",
      "KeyB": "FFFFFFFFFFFF",
      "AccessConditions": "00000000",
      "AccessConditionsText": {
        "block32": "rdAB wrAB incAB dectrAB",
        "block33": "rdAB wrAB incAB dectrAB",
        "block34": "rdAB wrAB incAB dectrAB",
        "block35": "rdAbyA rdCbyA rdBbyA wrBbyA",
        "UserData": "00"
      }
    },
    "9": {
      "KeyA": "FFFFFFFFFFFF",
      "KeyB": "FFFFFFFFFFFF",
      "AccessConditions": "00000000",
      "AccessConditionsText": {
        "block36": "rdAB wrAB incAB dectrAB",
        "block37": "rdAB wrAB incAB dectrAB",
        "block38": "rdAB wrAB incAB dectrAB",
        "block39": "rdAbyA rdCbyA rdBbyA wrBbyA",
        "UserData": "00"
      }
    },
    "10": {
      "KeyA": "FFFFFFFFFFFF",
      "KeyB": "FFFFFFFFFFFF",
      "AccessConditions": "00000000",
      "AccessConditionsText": {
        "block40": "rdAB wrAB incAB dectrAB",
        "block41": "rdAB wrAB incAB dectrAB",
        "block42": "rdAB wrAB incAB dectrAB",
        "block43": "rdAbyA rdCbyA rdBbyA wrBbyA",
        "UserData": "00"
      }
    },
    "11": {
      "KeyA": "FFFFFFFFFFFF",
      "KeyB": "FFFFFFFFFFFF",
      "AccessConditions": "00000000",
      "AccessConditionsText": {
        "block44": "rdAB wrAB incAB dectrAB",
        "block45": "rdAB wrAB incAB dectrAB",
        "block46": "rdAB wrAB incAB dectrAB",
        "block47": "rdAbyA rdCbyA rdBbyA wrBbyA",
        "UserData": "00"
      }
    },
    "12": {
      "KeyA": "FFFFFFFFFFFF",
      "KeyB": "FFFFFFFFFFFF",
      "AccessConditions": "00000000",
      "AccessConditionsText": {
        "block48": "rdAB wrAB incAB dectrAB",
        "block49": "rdAB wrAB incAB dectrAB",
        "block50": "rdAB wrAB incAB dectrAB",
        "block51": "rdAbyA rdCbyA rdBbyA wrBbyA",
        "UserData": "00"
      }
    },
    "13": {
      "KeyA": "FFFFFFFFFFFF",
      "KeyB": "FFFFFFFFFFFF",
      "AccessConditions": "00000000",
      "AccessConditionsText": {
        "block52": "rdAB wrAB incAB dectrAB",
        "block53": "rdAB wrAB incAB dectrAB",
        "block54": "rdAB wrAB incAB dectrAB",
        "block55": "rdAbyA rdCbyA rdBbyA wrBbyA",
        "UserData": "00"
      }
    },
    "14": {
      "KeyA": "FFFFFFFFFFFF",
      "KeyB": "FFFFFFFFFFFF",
      "AccessConditions": "00000000",
      "AccessConditionsText": {
        "block56": "rdAB wrAB incAB dectrAB",
        "block57": "rdAB wrAB incAB dectrAB",
        "block58": "rdAB wrAB incAB dectrAB",
        "block59": "rdAbyA rdCbyA rdBbyA wrBbyA",
        "UserData": "00"
      }
    },
    "15": {
      "KeyA": "FFFFFFFFFFFF",
      "KeyB": "FFFFFFFFFFFF",
      "AccessConditions": "00000000",
      "AccessConditionsText": {
        "block60": "rdAB wrAB incAB dectrAB",
        "block61": "rdAB wrAB incAB dectrAB",
        "block62": "rdAB wrAB incAB dectrAB",
        "block63": "rdAbyA rdCbyA rdBbyA wrBbyA",
        "UserData": "00"
      }
    }
  }
}

Last edited by Dranked (2019-09-17 16:27:53)

Offline

#2 2019-09-18 09:24:56

Ollibolli
Contributor
Registered: 2019-04-27
Posts: 51

Re: Mifare Classic 1k Badge

Hello,

i do not know, if you can use "autopwn" for a "WEAK"-tag!

Try "hf mf nested 1 0 A a0a1a2a3a4a5 d" to get a dump of your tag!

Offline

#3 2019-09-18 12:24:57

Dranked
Contributor
Registered: 2019-09-14
Posts: 16

Re: Mifare Classic 1k Badge

Ollibolli wrote:

Hello,

i do not know, if you can use "autopwn" for a "WEAK"-tag!

Try "hf mf nested 1 0 A a0a1a2a3a4a5 d" to get a dump of your tag!

Hey, thanks for the commands. I'm gonna test them out and give you output.

Last edited by Dranked (2019-09-18 12:25:28)

Offline

#4 2019-09-25 08:58:45

Dranked
Contributor
Registered: 2019-09-14
Posts: 16

Re: Mifare Classic 1k Badge

Could someone instruct me where to find the entry amount and manipulate it? Thanks

Offline

#5 2019-09-25 09:05:45

Ollibolli
Contributor
Registered: 2019-04-27
Posts: 51

Re: Mifare Classic 1k Badge

Does dumping folded?

Offline

#6 2019-10-02 14:55:29

Dranked
Contributor
Registered: 2019-09-14
Posts: 16

Re: Mifare Classic 1k Badge

Ollibolli wrote:

Does dumping folded?

I'm finding it out will give you an output. Btw could you maybe help me to compile the EMV and Smartcard feature?
Thanks

Offline

#7 2019-10-03 12:08:00

Ollibolli
Contributor
Registered: 2019-04-27
Posts: 51

Re: Mifare Classic 1k Badge

Sorry, i can not compile anything...

Offline

#8 2019-10-04 13:00:49

Dranked
Contributor
Registered: 2019-09-14
Posts: 16

Re: Mifare Classic 1k Badge

Ollibolli wrote:

Sorry, i can not compile anything...

I meant to install the EMV and Smartcard feature.

Offline

#9 2019-10-04 15:58:36

Ollibolli
Contributor
Registered: 2019-04-27
Posts: 51

Re: Mifare Classic 1k Badge

What do you exactly mean?

Offline

#10 2019-10-06 17:01:11

Dranked
Contributor
Registered: 2019-09-14
Posts: 16

Re: Mifare Classic 1k Badge

I can't use those features.

Offline

#11 2019-10-07 12:22:38

Ollibolli
Contributor
Registered: 2019-04-27
Posts: 51

Re: Mifare Classic 1k Badge

Where to install?

Offline

#12 2019-10-07 13:11:28

Dranked
Contributor
Registered: 2019-09-14
Posts: 16

Re: Mifare Classic 1k Badge

To use the feature on the proxmark, because it gives me errors.

Offline

Board footer

Powered by FluxBB