Hi all. I am trying fidlle on my mifare cards and tokens for entrance doors.
I have SCL3711 RW dongle. Good device. Preised all over the net. But I do have some problems. I am not linux guru. I know pure basics.
this are the errors.
ERROR 1
Code:
root@kali:~# mfoc -O key1.mfd
ISO/IEC 14443A (106 kbps) target:
ATQA (SENS_RES): 00 04
* UID size: single
* bit frame anticollision supported
UID (NFCID1): 0d 54 0c 01
SAK (SEL_RES): 08
* Not compliant with ISO/IEC 14443-4
* Not compliant with ISO/IEC 18092
Fingerprinting based on MIFARE type Identification Procedure:
* MIFARE Classic 1K
* MIFARE Plus (4 Byte UID or 4 Byte RID) 2K, Security level 1
* SmartMX with MIFARE 1K emulation
Other possible matches based on ATQA & SAK values:
Try to authenticate to all sectors with default keys...
Symbols: '.' no key found, '/' A key found, '\' B key found, 'x' both keys found
[Key: ffffffffffff] -> [//./////////////]
[Key: a0a1a2a3a4a5] -> [//./////////////]
[Key: d3f7d3f7d3f7] -> [//./////////////]
[Key: 000000000000] -> [xx\xxxxxxxxxxxxx]
[Key: b0b1b2b3b4b5] -> [xx\xxxxxxxxxxxxx]
[Key: 4d3a99c351dd] -> [xx\xxxxxxxxxxxxx]
[Key: 1a982c7e459a] -> [xx\xxxxxxxxxxxxx]
[Key: aabbccddeeff] -> [xx\xxxxxxxxxxxxx]
[Key: 714c5c886e97] -> [xx\xxxxxxxxxxxxx]
[Key: 587ee5f9350f] -> [xx\xxxxxxxxxxxxx]
[Key: a0478cc39091] -> [xx\xxxxxxxxxxxxx]
[Key: 533cb6c723f6] -> [xx\xxxxxxxxxxxxx]
[Key: 8fd0a4f256e9] -> [xx\xxxxxxxxxxxxx]
Sector 00 - FOUND_KEY [A] Sector 00 - FOUND_KEY [b]
Sector 01 - FOUND_KEY [A] Sector 01 - FOUND_KEY [b]
Sector 02 - UNKNOWN_KEY [A] Sector 02 - FOUND_KEY [b]
Sector 03 - FOUND_KEY [A] Sector 03 - FOUND_KEY [b]
Sector 04 - FOUND_KEY [A] Sector 04 - FOUND_KEY [b]
Sector 05 - FOUND_KEY [A] Sector 05 - FOUND_KEY [b]
Sector 06 - FOUND_KEY [A] Sector 06 - FOUND_KEY [b]
Sector 07 - FOUND_KEY [A] Sector 07 - FOUND_KEY [b]
Sector 08 - FOUND_KEY [A] Sector 08 - FOUND_KEY [b]
Sector 09 - FOUND_KEY [A] Sector 09 - FOUND_KEY [b]
Sector 10 - FOUND_KEY [A] Sector 10 - FOUND_KEY [b]
Sector 11 - FOUND_KEY [A] Sector 11 - FOUND_KEY [b]
Sector 12 - FOUND_KEY [A] Sector 12 - FOUND_KEY [b]
Sector 13 - FOUND_KEY [A] Sector 13 - FOUND_KEY [b]
Sector 14 - FOUND_KEY [A] Sector 14 - FOUND_KEY [b]
Sector 15 - FOUND_KEY [A] Sector 15 - FOUND_KEY [b]
Using sector 00 as an exploit sector
Sector: 2, type A, probe 0, distance 23874 .error libnfc.driver.pn53x_usbUnable to write to USB (Connection timed out)
nfc_initiator_init: Unknown error
So what is the solution.
nfc-list state
nfc-list uses libnfc 1.7.0-rc7
NFC device: SCM Micro / SCL3711-NFC&RW opened
Running kali linux with all preinstalled exploit tools installed on vmware
ERROR 2
Code:
root@kali:~# nfc-mfclassic r a key.mfd
error libnfc.chip.pn53x Unexpected PN53x reply!
NFC reader: SCM Micro / SCL3711-NFC&RW opened
Found MIFARE Classic card:
ISO/IEC 14443A (106 kbps) target:
ATQA (SENS_RES): 00 04
UID (NFCID1): 0d 54 0c 01
SAK (SEL_RES): 08
Guessing size: seems to be a 1024-byte card
Reading out 64 blocks |....................................................nfc_initiator_transceive_bytes: Mifare Authentication Failed
nfc_initiator_transceive_bytes: Mifare Authentication Failed
nfc_initiator_transceive_bytes: Mifare Authentication Failed
nfc_initiator_transceive_bytes: Mifare Authentication Failed
nfc_initiator_transceive_bytes: Mifare Authentication Failed
nfc_initiator_transceive_bytes: Mifare Authentication Failed
nfc_initiator_transceive_bytes: Mifare Authentication Failed
nfc_initiator_transceive_bytes: Mifare Authentication Failed
nfc_initiator_transceive_bytes: Mifare Authentication Failed
!
Error: authentication failed for block 0x0b