-
-
Notifications
You must be signed in to change notification settings - Fork 906
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
No key found or bad sector / How to get keys #224
Comments
The détails of the card |
Hi, have a look at the getting started section of the readme. there are the names of 2 tools that can help you. Also check out miLazyCracker. This tool should be able to do everything for you. |
Thank you for your answer, I'm under Kali, is this a good version? I will try to install miLazyCracker is you make a return if I get there, thanks again. |
You are welcome. And Kali should be fine. mfcuk and mfoc are even preinstalled. Maybe mfoc is enough to recover the key. But you can try miLazyCracker as well. |
Mfoc is not enough, there are 5 sectors all the keys are ffffffffffff except for the sector 1 where it does not find there key A nor B, I tried to install miLazyCracker but after I do not know what write as command or if it installs without error |
mfoc does not only check if the keys are I can't help you with myLazyCracker. I never used it. I've heard from people that it works fine. According to the readme, you just have to run it. Maybe watching the presentation of the creator will help you. |
|
Hello , here are the mistakes I have |
Hi. There are a lot of issues here.
There is no general solution to that. You have to work it out your self. Maybe it is best you try mfoc first. It should be easier to install. Maybe it does get the job done. |
mfcuk - 0.3.8 INFO: Connected to NFC reader: ACS / ACR122U PICC Interface VERIFY: root@kali:~# mfoc -P 3 -O /dev/null
Fingerprinting based on MIFARE type Identification Procedure:
Try to authenticate to all sectors with default keys... Sector 00 - Found Key A: ffffffffffff Found Key B: ffffffffffff Using sector 00 as an exploit sector |
root@kali:
Fingerprinting based on MIFARE type Identification Procedure:
Try to authenticate to all sectors with default keys... Sector 00 - Found Key A: ffffffffffff Found Key B: ffffffffffff Using sector 00 as an exploit sector |
Ok, so |
how install libnfc_crypto1_crack ? |
I don't know. It looks like you have to install crypto1_bs. But there issues because some code is missing. Have a look at aczid/crypto1_bs#29. Maybe you get is to work (with some googleing). Of course you can always by a Proxmark3. This device can crack the keys "out of the box". |
HI, I have a mifare card and the problem is that I can not read sector 1 with MCT on Android, how can I find the key? I also have the ACR122u reader, thank you for your help, Regards Dimitri
The text was updated successfully, but these errors were encountered: