You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
While the title is just a bad pun, the problem is an error which throws successfully. I already searched the internet. The only thing I found was another issue which didn't have an answer (but was closed).
So here is my output:
At first this looks very promising but in fact there is an error. I did try to map the contents with the help of "Mifare Classic Tool" which actually suceeded in decrypting a few sectors.
Now the question: How can MFOC tell me that all sectors got the default keys, when MCT uses the same list and tells me that a few sectors could not be decrypted?
Okay I checked the source code... It seems like the error is thrown in line 476 in mfoc.c but I don't know how the "Success" came here.
Maybe it helps: this card is a smartcard with the "atrust-acos" OS
The text was updated successfully, but these errors were encountered:
I've emulated a MIFARE SMART 4K tag using command proxmark3> hf mf sim *4 u 1FCE788E
then I've put my ACR122U on the proxmark and ran mfoc in debug mode in visual studio and could reproduce a maybe similar issue:
I think the error is in this part of code ..
I tried to comment in code all gotoerror from line 663 to 712 when code reaches the error at "nfc_initiator_mifare_cmd"
and the tag dump was saved (good 4K size) but it was just full of 00 :-/
My knowledge isn't good enough to understand why it fails now
proxmark3 emulating a 4K card and ACR122U reading:
@tacticalDevC as your error indicates "success" maybe you can try to comment this code in mfoc.c
--> //nfc_perror(r.pdi, "nfc_initiator_mifare_cmd"); //goto error;
While the title is just a bad pun, the problem is an error which throws successfully. I already searched the internet. The only thing I found was another issue which didn't have an answer (but was closed).
So here is my output:
At first this looks very promising but in fact there is an error. I did try to map the contents with the help of "Mifare Classic Tool" which actually suceeded in decrypting a few sectors.
Now the question: How can MFOC tell me that all sectors got the default keys, when MCT uses the same list and tells me that a few sectors could not be decrypted?
Okay I checked the source code... It seems like the error is thrown in line 476 in
mfoc.c
but I don't know how the "Success" came here.Maybe it helps: this card is a smartcard with the "atrust-acos" OS
The text was updated successfully, but these errors were encountered: