-
Notifications
You must be signed in to change notification settings - Fork 939
Description
Hi to all, Im trying to get access to this card. Tried to sniff or darksearch without any success.
BTW the card is in use in South-East Asia and there is no financial advantage to have a clone of it....just wanna have it, loll
Any help or idea is much appreciated.
[usb] pm3 --> hf mfdes info
[=] ---------------------------------- Tag Information ----------------------------------
[+] UID: 04 1F 62 52 E8 1A 90
[+] Batch number: 20 88 54 30 30
[+] Production date: week 42 / 2023
[+] Product type: MIFARE DESFire native IC (physical card)
[=] --- Hardware Information
[=] raw: 04010133001805
[=] Vendor Id: NXP Semiconductors Germany
[=] Type: 0x01 ( DESFire )
[=] Subtype: 0x01
[=] Version: 33.0 ( DESFire EV3 )
[=] Storage size: 0x18 ( 4096 bytes )
[=] Protocol: 0x05 ( ISO 14443-2, 14443-3 )
[=] --- Software Information
[=] raw: 04010103001805
[=] Vendor Id: NXP Semiconductors Germany
[=] Type: 0x01 ( DESFire )
[=] Subtype: 0x01
[=] Version: 3.0
[=] Storage size: 0x18 ( 4096 bytes )
[=] Protocol: 0x05 ( ISO 14443-3, 14443-4 )
[=] --------------------------------- Card capabilities ---------------------------------
[=] 3.0 - DESFire Ev3, Originality check, proximity check, badass EAL6 ?
[=] --- Tag Signature
[=] IC signature public key name: DESFire Ev3
[=] IC signature public key value: 041DB46C145D0A36539C6544BD6D9B0A
[=] : A62FF91EC48CBC6ABAE36E0089A46F0D
[=] : 08C8A715EA40A63313B92E90DDC17302
[=] : 30E0458A33276FB743
[=] Elliptic curve parameters: NID_secp224r1
[=] TAG IC Signature: CE1E246F0AD37475283880783E7889F2
[=] : 8BC1D6E9E06754D93F9A10C35620F506
[=] : C3AC536EC08028CDD22C8A0D4EA52FA8
[=] : BF4031E8B14E8E6F
[+] Signature verification: successful
[+] ------------------------------------ PICC level -------------------------------------
[+] Applications count: 0 free memory 480 bytes
[+] PICC level auth commands:
[+] Auth.............. YES
[+] Auth ISO.......... YES
[+] Auth AES.......... NO
[+] Auth Ev2.......... NO
[+] Auth ISO Native... YES
[+] Auth LRP.......... NO
[=] --- Free memory
[+] Available free memory on card : 480 bytes
[=] Standalone DESFire
[usb] pm3 --> hf mf fchk
[+] loaded 61 hardcoded keys
[=] Running strategy 1
[]Testing 61/ 61 100.00%
[=] Running strategy 2
[/]Testing 61/ 61 100.00%
[=] Time in checkkeys (fast) 28.5s
[!] No keys found
[usb] pm3 --> hw version
[ Proxmark3 RFID instrument ]
[ Client ]
Iceman/master/v4.18994-552-g325376d7e-suspect 2024-11-21 20:36:26 a3319015f
compiled with............. MinGW-w64 13.2.0
platform.................. Windows (64b) / x86_64
Readline support.......... present
QT GUI support............ present
native BT support......... absent
Python script support..... absent
Python SWIG support....... absent
Lua script support........ present ( 5.4.6 )
Lua SWIG support.......... present
[ Proxmark3 ]
firmware.................. PM3 GENERIC
[ ARM ]
bootrom: Iceman/master/v4.18994-552-g325376d7e-suspect 2024-11-21 20:35:52 a3319015f
os: Iceman/master/v4.18994-552-g325376d7e-suspect 2024-11-21 20:36:00 a3319015f
compiled with GCC 12.2.0
[ FPGA ]
fpga_pm3_hf.ncd image 2s30vq100 2024-02-03 15:12:20
fpga_pm3_lf.ncd image 2s30vq100 2024-02-03 15:12:10
fpga_pm3_felica.ncd image 2s30vq100 2024-02-03 15:12:41
fpga_pm3_hf_15.ncd image 2s30vq100 2024-02-03 15:12:31
[ Hardware ]
--= uC: AT91SAM7S512 Rev A
--= Embedded Processor: ARM7TDMI
--= Internal SRAM size: 64K bytes
--= Architecture identifier: AT91SAM7Sxx Series
--= Embedded flash memory 512K bytes ( 65% used )
[usb] pm3 -->