-
Notifications
You must be signed in to change notification settings - Fork 78
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
No solution found :( while previously it did find one for this card #35
Comments
A workaround for this issue is to start bruteforcing when there's still a lot more complexity left. (somewhere around ~2^42.xxx). It then took a whole night of bruteforcing but it did manage to crack the key. I think this is not the right solution though. |
It's true that the craptev1 library doesn't always find a solution, and a workaround is to start the cracker with fewer nonces (a less well-determined system) just like you did. With the included .py scripts, it's possible to convert the .txt created by my tool to the .bin format used by the proxmark3 project and to use its host code to crack it. No actual proxmark3 device is required. |
You've got an URL to where the proxmark code exists? |
Here you go https://github.com/Proxmark/proxmark3 |
Hi, Here some attempts to port the tool from proxmark3: https://github.com/vk496/cropto1_bs Tried on
Would like to integrate libnfc, and after, into this repo :) Salu2 |
Hey, isn't this using way more nonces though then the current implementation? (Usually it starts bruteforcing at around 3000-4000 nonces) |
Nop, is only a simulation |
Hi, I made some progress with https://github.com/vk496/cropto1_bs. Right now is possible to use it with libnfc readers.
After cleaning the code, I think it would be better idea to integrate the functionality directly into https://github.com/nfc-tools/mfoc |
That's very cool!!! Would love to see this integrated within Mfoc :) |
Hello again! I have successfully integrated hardnested attack into mfoc. https://github.com/vk496/mfoc/tree/hardnested Is not ready yet to be merged into the official project, but is already working :) Salu2 |
How would you call it? |
I'm more interested in integrate the mod into official project instead of forking a new one. Missing only some makefile code to support arm builds and the mod should be merged nfc-tools/mfoc#60 |
Hello How to recovered the 2 missing files crapto1 and craptev1 because bra does not answer is what someone can send them to me? |
@vk496 has created an updated version of mfoc which applies the hardnested attack, please start using this tool. https://github.com/vk496/mfoc/tree/hardnested |
Has it already been merged to MFOC master? |
No, but the PR has been submitted there since last year. |
@aczid I encountered the same problem as him, I would like to ask you how to use your py to convert txt to bin, and do not connect devices in PM3 |
@vk496 I compiled it https://github.com/vk496/cropto1_ BS, but prompted no NFC device connection, want to ask how to use offline |
@vk496 For example, I want to run a file password named 1234.bin, how should I operate, thank you again |
Hi all,
I've been playing around with NFC cards for a bit and managed to get the keys for a specific card of mine using miLazyCracker: https://github.com/nfc-tools/miLazyCracker/
However, after trying exactly the same attack again on exactly the same NFC card the crypto1_bs tool keeps showing me the message
No solution found :(
My log:
And this is basically the loop where it gets stuck in. What could be the problem here?
The text was updated successfully, but these errors were encountered: