Проблемы чтения и записи карт MIFARE с ПК
Я бы прочитал и написал карту mifare с картридером ACR122U. У меня есть все ключи, но nfc-mfclassic не может прочитать файл ключей, почему? Файл дампа правильный? Почему файл дампа не совпадает с выводом видео? Неужели я что-то не так? Файл дампа неправильный? Я не понимаю Есть еще один метод для чтения и записи mifare классических тегов с помощью ключевого файла? Спасибо вам всем.
root@DESKTOP-VUM18JR:~# mfoc -f keys.txt -O keys.mfd
The custom key 0xA4CF1E372438 has been added to the default keys
The custom key 0x06A88D253FF2 has been added to the default keys
The custom key 0x4FAF05BD81D4 has been added to the default keys
The custom key 0x9CA7F33DE94D has been added to the default keys
The custom key 0xB4C132439EEF has been added to the default keys
The custom key 0xB53E298E9C33 has been added to the default keys
The custom key 0x37F534237653 has been added to the default keys
The custom key 0xEE5FBEAB12BC has been added to the default keys
The custom key 0xF4018AFA69EF has been added to the default keys
Found Mifare Classic Mini tag
ISO/IEC 14443A (106 kbps) target:
ATQA (SENS_RES): 00 04
* UID size: single
* bit frame anticollision supported
UID (NFCID1): ad dd 44 12
SAK (SEL_RES): 09
* Not compliant with ISO/IEC 14443-4
* Not compliant with ISO/IEC 18092
Fingerprinting based on MIFARE type Identification Procedure:
* MIFARE Mini 0.3K
* SmartMX with MIFARE 1K emulation
Other possible matches based on ATQA & SAK values:
Try to authenticate to all sectors with default keys...
Symbols: '.' no key found, '/' A key found, '\' B key found, 'x' both keys found
[Key: a4cf1e372438] -> [./...]
[Key: 06a88d253ff2] -> [.//..]
[Key: 4faf05bd81d4] -> [.///.]
[Key: 9ca7f33de94d] -> [.////]
[Key: b4c132439eef] -> [\////]
[Key: b53e298e9c33] -> [\x///]
[Key: 37f534237653] -> [\xx//]
[Key: ee5fbeab12bc] -> [\xxx/]
[Key: f4018afa69ef] -> [\xxxx]
[Key: ffffffffffff] -> [\xxxx]
[Key: a0a1a2a3a4a5] -> [xxxxx]
[Key: d3f7d3f7d3f7] -> [xxxxx]
[Key: 000000000000] -> [xxxxx]
[Key: b0b1b2b3b4b5] -> [xxxxx]
[Key: 4d3a99c351dd] -> [xxxxx]
[Key: 1a982c7e459a] -> [xxxxx]
[Key: aabbccddeeff] -> [xxxxx]
[Key: 714c5c886e97] -> [xxxxx]
[Key: 587ee5f9350f] -> [xxxxx]
[Key: a0478cc39091] -> [xxxxx]
[Key: 533cb6c723f6] -> [xxxxx]
[Key: 8fd0a4f256e9] -> [xxxxx]
Sector 00 - FOUND_KEY [A] Sector 00 - FOUND_KEY [B]
Sector 01 - FOUND_KEY [A] Sector 01 - FOUND_KEY [B]
Sector 02 - FOUND_KEY [A] Sector 02 - FOUND_KEY [B]
Sector 03 - FOUND_KEY [A] Sector 03 - FOUND_KEY [B]
Sector 04 - FOUND_KEY [A] Sector 04 - FOUND_KEY [B]
We have all sectors encrypted with the default keys..
Auth with all sectors succeeded, dumping keys to a file!
Block 19, type A, key 9ca7f33de94d :00 00 00 00 00 00 78 77 88 00 00 00 00 00 00 00
Block 18, type A, key 9ca7f33de94d :55 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Block 17, type A, key 9ca7f33de94d :00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01
Block 16, type A, key 9ca7f33de94d :00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Block 15, type A, key 4faf05bd81d4 :00 00 00 00 00 00 78 77 88 00 00 00 00 00 00 00
Block 14, type A, key 4faf05bd81d4 :55 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Block 13, type A, key 4faf05bd81d4 :00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01
Block 12, type A, key 4faf05bd81d4 :00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Block 11, type A, key 06a88d253ff2 :00 00 00 00 00 00 78 77 88 11 00 00 00 00 00 00
Block 10, type A, key 06a88d253ff2 :55 03 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Block 09, type A, key 06a88d253ff2 :00 14 00 14 00 00 00 00 00 00 00 00 00 00 00 03
Block 08, type A, key 06a88d253ff2 :00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 02
Block 07, type A, key a4cf1e372438 :00 00 00 00 00 00 78 77 88 15 00 00 00 00 00 00
Block 06, type A, key a4cf1e372438 :aa 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Block 05, type A, key a4cf1e372438 :01 00 00 01 00 00 80 01 00 01 00 00 00 00 80 01
Block 04, type A, key a4cf1e372438 :01 00 00 6d 17 00 80 5d 4b 01 00 00 00 00 ec 02
Block 03, type A, key a0a1a2a3a4a5 :00 00 00 00 00 00 78 77 88 c1 00 00 00 00 00 00
Block 02, type A, key a0a1a2a3a4a5 :00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Block 01, type A, key a0a1a2a3a4a5 :62 00 48 88 49 88 4a 88 4b 88 00 00 00 00 00 00
Block 00, type A, key a0a1a2a3a4a5 :ad dd 44 12 26 89 04 00 c8 34 00 20 00 00 00 16
root@DESKTOP-VUM18JR:~# hexdump -vC keys.mfd
00000000 ad dd 44 12 26 89 04 00 c8 34 00 20 00 00 00 16 |..D.&....4. ....|
00000010 62 00 48 88 49 88 4a 88 4b 88 00 00 00 00 00 00 |b.H.I.J.K.......|
00000020 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 |................|
00000030 a0 a1 a2 a3 a4 a5 78 77 88 c1 b4 c1 32 43 9e ef |......xw....2C..|
00000040 01 00 00 6d 17 00 80 5d 4b 01 00 00 00 00 ec 02 |...m...]K.......|
00000050 01 00 00 01 00 00 80 01 00 01 00 00 00 00 80 01 |................|
00000060 aa 02 00 00 |....|
00000064
root@DESKTOP-VUM18JR:~# nfc-mfclassic r a mizip.mfd keys.mfd
NFC reader: ACS / ACR122U PICC Interface opened
Found MIFARE Classic card:
ISO/IEC 14443A (106 kbps) target:
ATQA (SENS_RES): 00 04
UID (NFCID1): ad dd 44 12
SAK (SEL_RES): 09
Guessing size: seems to be a 320-byte card
Could not read keys file: keys.mfd
root@DESKTOP-VUM18JR:~#