Code Monkey home page Code Monkey logo

milazycracker's Introduction

miLazyCracker

Mifare Classic Plus - Hardnested Attack Implementation for LibNFC USB readers (SCL3711, ASK LoGO, etc)

Installation:

./miLazyCrackerFreshInstall.sh

Usage example: place a tag and enjoy

mkdir mydumps
cd mydumps
miLazyCracker

Possible issue:

error	libnfc.driver.pn53x_usb	Unable to set USB configuration (Device or resource busy)

Fix:

sudo modprobe -r pn533_usb

This tool is comprised of work from:

milazycracker's People

Contributors

asib avatar davidberdik avatar doegox avatar iamnotsuperman avatar indocomsoft avatar overlinden avatar priv avatar rapperskull avatar target111 avatar yoshiman avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

milazycracker's Issues

Salto PFD04K Transponder

Hi,
I have a SALTO PFD04K Keychain Transponder. With a normal chinese copier is not possible to read.

Details what I found via google:
https://clonemykey.com/copy-wizard/new-key/key-fob/salto-key-fobs/salto-pfd04k-key-fob/

Manufacture: Salto Systems
Alternative Names: AC-SAL-PFD04KB
Format Names: Mifare® DESFire® EV1
Technology: Radio Frequency Identification (RFID) using High Frequency Data Transfer
Key Type: High Frequency Contactless/Proximity Key Fob
Dimensions: Unknown
Weight: Unknown
Material: ABS Plastic with ultrasonic welding
Antenna Size: Unknown
Antenna Geometry: Round
Modulation: ISO/IEC 14443-4
Interface: ISO/IEC 14443-4
Typical Range: Less than 1 inch
Bit Length: N/A
Possible Combinations: N/A
Facility Code Range: N/A
Storage Capacity: Up to 8K (8192 bytes) depending on sub-model
Encryption: AES/3DES
Security: High Security (Class K)

Can this cracker encrypt it for a copy?

And which read/write device is recommended for the above keychain?

Mifare Plus with no known key

Hello,

First of all I thank the creators of these wonderful tools that make it easy for us! But I happen to have a problem, and I hope to find the solution here!
I have a Mifare Classic 1k card, whose security makes me think of a Mifare Classic 1k Plus. Of course I try to clone it to have another copy.
As said before when I play mfcuk Diff Nt and Auth have all the time the same value over 2000. I do not know any sequence of the card, I still try several combolist through mfoc (keylist) but that did not give anything. I also tried to go through MilazyCracker (with crapto1 / craptev1), same result (mfoc: ERROR: No sector encrypted with the default key, exiting ...).
I asked myself a question a little crazy, unless you have other solutions to offer me ahah. Is it possible to ask mfoc to test all possible combinations (with as parameter: characters abcdef0123456789, length 12), on a single sector (eg 0: A) for a day to fall on the right combination. Knowing that generating a file with all combinations would represent a file of 3 Peta bytes, rather huge.
Once this combination is found, execute the basic mfoc "nested" attack to recover the remaining 15 and 16 sectors. I count if it is possible to run on a raspberry pi (low consumption, ...).
The attack will be extremely, extremely, extremely long, ... I know, ... but I have no choice. There is the problem of the power outage, and we must start all over again, problematic with an attack of such length.
I hope I have not rushed you with my questions but I am in my last ditches. If you wish to have additional information, and if you have other solutions, do not hesitate!
Thank you very much in advance !
PS: My apologies if you find spelling mistakes, I'm French :-)

SPECTERR.

Cant find 1 key

image

i've tried to let it run untill probe 10k but there is nothing to do, that key cant be found...

Is there anything else i can try?

Detected Hardened Mifare Classic - Spammed in Terminal

I have been attempting to crack a key of mine for quite some time.

When I ran this program on said key, the following began to spam the terminal:

Trying HardNested Attack... libnfc_crypto1_crack ffffffffffff 60 B 56 B mfc_32ce4c58_foundKeys.txt /usr/local/bin/miLazyCracker: line 87: libnfc_crypto1_crack: command not found MFOC not possible, detected hardened Mifare Classic

Over and over again.

I am wondering if I am doing something wrong, or if there is something I need to change.

Thank you

Download links for craptev1/crapto1 are down

The download links for the two archives that were added in PR #14 are down for me. I don't know if this is a temporary issue.
I could not find a convenient URL for the script online, but it seems like the sources can be found with some searching or by asking Bla.

/usr/local/bin/miLazyCracker: line 127: 96558 Segmentation fault "${mycmd[@]}"

Hello there.
How can I get rid of the following error?

─$ miLazyCracker   
Found Mifare Classic Mini tag
ISO/IEC 14443A (106 kbps) target:
    ATQA (SENS_RES): 00  04  
* UID size: single
* bit frame anticollision supported
       UID (NFCID1): fd  a1  2b  74  
      SAK (SEL_RES): 09  
* Not compliant with ISO/IEC 14443-4
* Not compliant with ISO/IEC 18092

Fingerprinting based on MIFARE type Identification Procedure:
* MIFARE Mini 0.3K
* SmartMX with MIFARE 1K emulation
Other possible matches based on ATQA & SAK values:

Try to authenticate to all sectors with default keys...
Symbols: '.' no key found, '/' A key found, '\' B key found, 'x' both keys found
[Key: ffffffffffff] -> [.....]
[Key: a0a1a2a3a4a5] -> [/....]
[Key: d3f7d3f7d3f7] -> [/....]
[Key: 000000000000] -> [/....]
[Key: b0b1b2b3b4b5] -> [/....]
[Key: 4d3a99c351dd] -> [/....]
[Key: 1a982c7e459a] -> [/....]
[Key: aabbccddeeff] -> [/....]
[Key: 714c5c886e97] -> [/....]
[Key: 587ee5f9350f] -> [/....]
[Key: a0478cc39091] -> [/....]
[Key: 533cb6c723f6] -> [/....]
[Key: 8fd0a4f256e9] -> [/....]

Sector 00 - Found   Key A: a0a1a2a3a4a5 Unknown Key B
Sector 01 - Unknown Key A               Unknown Key B
Sector 02 - Unknown Key A               Unknown Key B
Sector 03 - Unknown Key A               Unknown Key B
Sector 04 - Unknown Key A               Unknown Key B


Using sector 00 as an exploit sector
Card is not vulnerable to nested attack
MFOC not possible, detected hardened Mifare Classic
Trying HardNested Attack...
libnfc_crypto1_crack a0a1a2a3a4a5 0 A 16 B mfc_fda12b74_foundKeys.txt
Found tag with uid fda12b74, collecting nonces for key B of block 16 (sector 4) using known key A a0a1a2a3a4a5 for block 0 (sector 0)
Collected 4762 nonces... leftover complexity 8600042471424 (~2^42.97) - press enter to start brute-force phase
Collected 4768 nonces... leftover complexity 8600042471424 (~2^42.97) - initializing brute-force phase...
Starting 4 threads to test 190577073196 states using 128-way bitslicing
Cracking... 100.00%
No solution found :(
MFOC not possible, detected hardened Mifare Classic
Trying HardNested Attack...
libnfc_crypto1_crack a0a1a2a3a4a5 0 A 16 B mfc_fda12b74_foundKeys.txt
Found tag with uid fda12b74, collecting nonces for key B of block 16 (sector 4) using known key A a0a1a2a3a4a5 for block 0 (sector 0)
Collected 4910 nonces... leftover complexity 294072679876 (~2^38.10) - initializing brute-force phase...
Starting 4 threads to test 294072679876 states using 128-way bitslicing
Cracking...  99.96%
No solution found :(
MFOC not possible, detected hardened Mifare Classic
Trying HardNested Attack...
libnfc_crypto1_crack a0a1a2a3a4a5 0 A 16 B mfc_fda12b74_foundKeys.txt
Found tag with uid fda12b74, collecting nonces for key B of block 16 (sector 4) using known key A a0a1a2a3a4a5 for block 0 (sector 0)
Collected 5132 nonces... leftover complexity 190577073196 (~2^37.47) - initializing brute-force phase...
Starting 4 threads to test 190577073196 states using 128-way bitslicing
Cracking...  99.97%
No solution found :(
MFOC not possible, detected hardened Mifare Classic
Trying HardNested Attack...
libnfc_crypto1_crack a0a1a2a3a4a5 0 A 16 B mfc_fda12b74_foundKeys.txt
Found tag with uid fda12b74, collecting nonces for key B of block 16 (sector 4) using known key A a0a1a2a3a4a5 for block 0 (sector 0)
Collected 4091 nonces... leftover complexity 8600042471424 (~2^42.97) - press enter to start brute-force phase
Collected 4097 nonces... leftover complexity 8600042471424 (~2^42.97) - initializing brute-force phase...
Starting 4 threads to test 8600042471424 states using 128-way bitslicing
**Cracking...   0.00%/usr/local/bin/miLazyCracker: line 127: 96558 Segmentation fault      "${mycmd[@]}"**
MFOC not possible, detected hardened Mifare Classic
Trying HardNested Attack...
libnfc_crypto1_crack a0a1a2a3a4a5 0 A 16 B mfc_fda12b74_foundKeys.txt
Found tag with uid fda12b74, collecting nonces for key B of block 16 (sector 4) using known key A a0a1a2a3a4a5 for block 0 (sector 0)
Collected 4956 nonces... leftover complexity 190577073196 (~2^37.47) - initializing brute-force phase...
Starting 4 threads to test 190577073196 states using 128-way bitslicing
Cracking...  99.98%
No solution found :(

Regards

crypto1 errors?

So I've been trying to get this tool to work for a couple of days but I keep running into the same issues. While installing I get patch conflicts (which I have never encountered before). It also throws some errors which I think are related to setting up the crypto libs. This is my install log:

 root@kali-pi:~/Desktop/milazycracker# ./miLazyCrackerFreshInstall.sh
+ sudo apt-get install git libnfc-bin autoconf libnfc-dev
Reading package lists... Done
Building dependency tree      
Reading state information... Done
autoconf is already the newest version (2.69-11).
git is already the newest version (1:2.19.0-1).
libnfc-bin is already the newest version (1.7.1-4+b1).
libnfc-dev is already the newest version (1.7.1-4+b1).
0 upgraded, 0 newly installed, 0 to remove and 1 not upgraded.
+ '[' -d mfoc ']'
+ cd mfoc
+ git reset --hard
HEAD is now at ba072f1 update debian dir with up-to-date packaging
+ git clean -dfx
Removing INSTALL
Removing Makefile
Removing Makefile.in
Removing aclocal.m4
Removing autom4te.cache/
Removing compile
Removing config.h
Removing config.h.in
Removing config.log
Removing config.status
Removing configure
Removing depcomp
Removing install-sh
Removing missing
Removing src/.deps/
Removing src/Makefile
Removing src/Makefile.in
Removing src/crapto1.o
Removing src/crypto1.o
Removing src/mfoc.c.orig
Removing src/mfoc.c.rej
Removing src/mfoc.h.rej
Removing stamp-h1
+ patch -p1
patching file src/mfoc.c
Hunk #1 succeeded at 72 with fuzz 2 (offset 14 lines).
Hunk #2 FAILED at 159.
Hunk #3 succeeded at 257 (offset 15 lines).
Hunk #4 FAILED at 471.
Hunk #5 FAILED at 554.
Hunk #6 FAILED at 770.
Hunk #7 FAILED at 1029.
5 out of 7 hunks FAILED -- saving rejects to file src/mfoc.c.rej
+ patch -p1
patching file src/mfoc.c
Reversed (or previously applied) patch detected!  Assume -R? [n]
Apply anyway? [n]
Skipping patch.
1 out of 1 hunk ignored -- saving rejects to file src/mfoc.c.rej
+ patch -p1
patching file src/mfoc.c
Reversed (or previously applied) patch detected!  Assume -R? [n]
Apply anyway? [n]
Skipping patch.
2 out of 2 hunks ignored -- saving rejects to file src/mfoc.c.rej
+ patch -p1
patching file src/mfoc.c
Reversed (or previously applied) patch detected!  Assume -R? [n]
Apply anyway? [n]
Skipping patch.
6 out of 6 hunks ignored -- saving rejects to file src/mfoc.c.rej
patching file src/mfoc.h
Reversed (or previously applied) patch detected!  Assume -R? [n]
Apply anyway? [n]
Skipping patch.
3 out of 3 hunks ignored -- saving rejects to file src/mfoc.h.rej
+ autoreconf -vfi
autoreconf: Entering directory `.'
autoreconf: configure.ac: not using Gettext
autoreconf: running: aclocal --force
autoreconf: configure.ac: tracing
autoreconf: configure.ac: not using Libtool
autoreconf: running: /usr/bin/autoconf --force
autoreconf: running: /usr/bin/autoheader --force
autoreconf: running: automake --add-missing --copy --force-missing
configure.ac:11: installing './compile'
configure.ac:9: installing './install-sh'
configure.ac:9: installing './missing'
Makefile.am: installing './INSTALL'
src/Makefile.am: installing './depcomp'
autoreconf: Leaving directory `.'
+ ./configure
checking for a BSD-compatible install... /usr/bin/install -c
checking whether build environment is sane... yes
checking for a thread-safe mkdir -p... /bin/mkdir -p
checking for gawk... no
checking for mawk... mawk
checking whether make sets $(MAKE)... yes
checking whether make supports nested variables... yes
checking for gcc... gcc
checking whether the C compiler works... yes
checking for C compiler default output file name... a.out
checking for suffix of executables...
checking whether we are cross compiling... no
checking for suffix of object files... o
checking whether we are using the GNU C compiler... yes
checking whether gcc accepts -g... yes
checking for gcc option to accept ISO C89... none needed
checking whether gcc understands -c and -o together... yes
checking whether make supports the include directive... yes (GNU style)
checking dependency style of gcc... gcc3
checking whether make supports nested variables... (cached) yes
checking for pkg-config... /usr/bin/pkg-config
checking pkg-config is at least version 0.9.0... yes
checking for libnfc... yes
checking for inline... inline
checking how to run the C preprocessor... gcc -E
checking for grep that handles long lines and -e... /bin/grep
checking for egrep... /bin/grep -E
checking for ANSI C header files... yes
checking for sys/types.h... yes
checking for sys/stat.h... yes
checking for stdlib.h... yes
checking for string.h... yes
checking for memory.h... yes
checking for strings.h... yes
checking for inttypes.h... yes
checking for stdint.h... yes
checking for unistd.h... yes
checking for stdbool.h that conforms to C99... yes
checking for _Bool... yes
checking for size_t... yes
checking for uint8_t... yes
checking for uint16_t... yes
checking for uint32_t... yes
checking for uint64_t... yes
checking for stdlib.h... (cached) yes
checking for GNU libc compatible malloc... yes
checking for stdlib.h... (cached) yes
checking for GNU libc compatible realloc... yes
checking for memset... yes
checking that generated files are newer than configure... done
configure: creating ./config.status
config.status: creating Makefile
config.status: creating src/Makefile
config.status: creating config.h
config.status: executing depfiles commands
+ make
make  all-recursive
make[1]: Entering directory '/root/Desktop/milazycracker/mfoc'
Making all in src
make[2]: Entering directory '/root/Desktop/milazycracker/mfoc/src'
  CC       crapto1.o
  CC       crypto1.o
  CC       mfoc.o
mfoc.c:75:10: error: redefinition of 'knownKey'
 uint64_t knownKey = 0;
          ^~~~~~~~
mfoc.c:68:10: note: previous definition of 'knownKey' was here
 uint64_t knownKey = 0;
          ^~~~~~~~
mfoc.c:76:6: error: redefinition of 'knownKeyLetter'
 char knownKeyLetter = 'A';
      ^~~~~~~~~~~~~~
mfoc.c:69:6: note: previous definition of 'knownKeyLetter' was here
 char knownKeyLetter = 'A';
      ^~~~~~~~~~~~~~
mfoc.c:77:10: error: redefinition of 'knownSector'
 uint32_t knownSector = 0;
          ^~~~~~~~~~~
mfoc.c:70:10: note: previous definition of 'knownSector' was here
 uint32_t knownSector = 0;
          ^~~~~~~~~~~
mfoc.c:78:10: error: redefinition of 'unknownSector'
 uint32_t unknownSector = 0;
          ^~~~~~~~~~~~~
mfoc.c:71:10: note: previous definition of 'unknownSector' was here
 uint32_t unknownSector = 0;
          ^~~~~~~~~~~~~
mfoc.c:79:6: error: redefinition of 'unknownKeyLetter'
 char unknownKeyLetter = 'A';
      ^~~~~~~~~~~~~~~~
mfoc.c:72:6: note: previous definition of 'unknownKeyLetter' was here
 char unknownKeyLetter = 'A';
      ^~~~~~~~~~~~~~~~
mfoc.c:80:10: error: redefinition of 'unexpected_random'
 uint32_t unexpected_random = 0;
          ^~~~~~~~~~~~~~~~~
mfoc.c:73:10: note: previous definition of 'unexpected_random' was here
 uint32_t unexpected_random = 0;
          ^~~~~~~~~~~~~~~~~
mfoc.c: In function 'main':
mfoc.c:260:7: error: duplicate case value
       case 'D':
       ^~~~
mfoc.c:252:7: note: previously used here
       case 'D':
       ^~~~
make[2]: *** [Makefile:397: mfoc.o] Error 1
make[2]: Leaving directory '/root/Desktop/milazycracker/mfoc/src'
make[1]: *** [Makefile:358: all-recursive] Error 1
make[1]: Leaving directory '/root/Desktop/milazycracker/mfoc'
make: *** [Makefile:299: all] Error 2
+ sudo make install
Making install in src
make[1]: Entering directory '/root/Desktop/milazycracker/mfoc/src'
  CC       mfoc.o
mfoc.c:75:10: error: redefinition of 'knownKey'
 uint64_t knownKey = 0;
          ^~~~~~~~
mfoc.c:68:10: note: previous definition of 'knownKey' was here
 uint64_t knownKey = 0;
          ^~~~~~~~
mfoc.c:76:6: error: redefinition of 'knownKeyLetter'
 char knownKeyLetter = 'A';
      ^~~~~~~~~~~~~~
mfoc.c:69:6: note: previous definition of 'knownKeyLetter' was here
 char knownKeyLetter = 'A';
      ^~~~~~~~~~~~~~
mfoc.c:77:10: error: redefinition of 'knownSector'
 uint32_t knownSector = 0;
          ^~~~~~~~~~~
mfoc.c:70:10: note: previous definition of 'knownSector' was here
 uint32_t knownSector = 0;
          ^~~~~~~~~~~
mfoc.c:78:10: error: redefinition of 'unknownSector'
 uint32_t unknownSector = 0;
          ^~~~~~~~~~~~~
mfoc.c:71:10: note: previous definition of 'unknownSector' was here
 uint32_t unknownSector = 0;
          ^~~~~~~~~~~~~
mfoc.c:79:6: error: redefinition of 'unknownKeyLetter'
 char unknownKeyLetter = 'A';
      ^~~~~~~~~~~~~~~~
mfoc.c:72:6: note: previous definition of 'unknownKeyLetter' was here
 char unknownKeyLetter = 'A';
      ^~~~~~~~~~~~~~~~
mfoc.c:80:10: error: redefinition of 'unexpected_random'
 uint32_t unexpected_random = 0;
          ^~~~~~~~~~~~~~~~~
mfoc.c:73:10: note: previous definition of 'unexpected_random' was here
 uint32_t unexpected_random = 0;
          ^~~~~~~~~~~~~~~~~
mfoc.c: In function 'main':
mfoc.c:260:7: error: duplicate case value
       case 'D':
       ^~~~
mfoc.c:252:7: note: previously used here
       case 'D':
       ^~~~
make[1]: *** [Makefile:397: mfoc.o] Error 1
make[1]: Leaving directory '/root/Desktop/milazycracker/mfoc/src'
make: *** [Makefile:358: install-recursive] Error 1
+ '[' -d crypto1_bs ']'
+ cd crypto1_bs
+ git reset --hard
HEAD is now at 89de1ba Merge pull request #28 from dkgitdev/patch-1
+ git clean -dfx
Removing libnfc_crypto1_crack.c.orig
+ patch -p1
patching file libnfc_crypto1_crack.c
Hunk #1 succeeded at 730 with fuzz 2 (offset 17 lines).
+ make get_craptev1
wget http://crapto1.netgarage.org/craptev1-v1.1.tar.xz
--2018-11-17 21:57:44--  http://crapto1.netgarage.org/craptev1-v1.1.tar.xz
Resolving crapto1.netgarage.org (crapto1.netgarage.org)... 176.9.4.150
Connecting to crapto1.netgarage.org (crapto1.netgarage.org)|176.9.4.150|:80... connected.
HTTP request sent, awaiting response... 404 Not Found
2018-11-17 21:57:44 ERROR 404: Not Found.
 
make: *** [Makefile:34: get_craptev1] Error 8
+ make get_crapto1
wget http://crapto1.netgarage.org/crapto1-v3.3.tar.xz
--2018-11-17 21:57:44--  http://crapto1.netgarage.org/crapto1-v3.3.tar.xz
Resolving crapto1.netgarage.org (crapto1.netgarage.org)... 176.9.4.150
Connecting to crapto1.netgarage.org (crapto1.netgarage.org)|176.9.4.150|:80... connected.
HTTP request sent, awaiting response... 404 Not Found
2018-11-17 21:57:44 ERROR 404: Not Found.
 
make: *** [Makefile:38: get_crapto1] Error 8
+ make
gcc -std=gnu99 -O3 -march=native solve_bs.c crypto1_bs.c crypto1_bs_crack.c  crapto1-v3.3/crapto1.c crapto1-v3.3/crypto1.c -I crapto1-v3.3/  craptev1-v1.1/craptev1.c -I craptev1-v1.1/ -o solve_bs -lpthread -lm
gcc: error: crapto1-v3.3/crapto1.c: No such file or directory
gcc: error: crapto1-v3.3/crypto1.c: No such file or directory
gcc: error: craptev1-v1.1/craptev1.c: No such file or directory
make: *** [Makefile:19: solve_bs] Error 1
+ sudo cp -a libnfc_crypto1_crack /usr/local/bin
cp: cannot stat 'libnfc_crypto1_crack': No such file or directory
+ sudo cp -a miLazyCracker.sh /usr/local/bin/miLazyCracker
+ echo Done.
Done.
root@kali-pi:~/Desktop/milazycracker# 

Afterwards when I try to run the script (in an empty folder) it goes through the mfoc part but after that it gets stuck in an endless loop and keeps printing this error message:

libnfc_crypto1_crack 000000000000 84 B 156 B mfc_b707e364_foundKeys.txt
/usr/local/bin/miLazyCracker: line 87: libnfc_crypto1_crack: command not found
MFOC not possible, detected hardened Mifare Classic
Trying HardNested Attack...
libnfc_crypto1_crack 000000000000 84 B 156 B mfc_b707e364_foundKeys.txt
/usr/local/bin/miLazyCracker: line 87: libnfc_crypto1_crack: command not found
MFOC not possible, detected hardened Mifare Classic
Trying HardNested Attack...

I'm running Kali Linux on a RPI3.

If I can provide any additional logs to help I'd be glad to.

Segmentation Fault at line 127

After the collecting nonces part, I always get a "line 127: segmentation fault" error, log attached.

Collected 2989 nonces... leftover complexity 44169378568 (~2^35.36) - initializing brute-force phase... Starting 4 threads to test 44169378568 states using 64-way bitslicing Cracking... 0.00%/usr/local/bin/miLazyCracker: line 127: 3050 Segmentation fault "${mycmd[@]}"

Anyone has any idea of what might cause this issue?

How to create an additional copy after creating one

I don't seem to be able to figure out how to create an additional copy of a keyfob once the process completed once. After The dump file is created, what needs to be done next to create an additional copy?

miLazyCrackerFreshInstall not working properly on WSL Ubuntu 20.04

Hello,
im running on Ubuntu 20.04 on WSL and it seems mfoc compilation is not carried out properly

./miLazyCrackerFreshInstall.sh
--2022-01-10 13:57:04--  https://web.archive.org/web/20190221140220if_/https://www2.vaneay.fr/mifare/craptev1-v1.1.tar.xz
Resolving web.archive.org (web.archive.org)... 207.241.237.3
Connecting to web.archive.org (web.archive.org)|207.241.237.3|:443... connected.
HTTP request sent, awaiting response... 200 OK
Length: 66576 (65K) [application/x-tar]
Saving to: ‘craptev1-v1.1.tar.xz’

craptev1-v1.1.tar.xz          100%[=================================================>]  65.02K   139KB/s    in 0.5s

2022-01-10 13:57:06 (139 KB/s) - ‘craptev1-v1.1.tar.xz’ saved [66576/66576]

--2022-01-10 13:57:06--  https://web.archive.org/web/20190221140255if_/https://www2.vaneay.fr/mifare/crapto1-v3.3.tar.xz
Resolving web.archive.org (web.archive.org)... 207.241.237.3
Connecting to web.archive.org (web.archive.org)|207.241.237.3|:443... connected.
HTTP request sent, awaiting response... 200 OK
Length: 6476 (6.3K) [application/x-tar]
Saving to: ‘crapto1-v3.3.tar.xz’

crapto1-v3.3.tar.xz           100%[=================================================>]   6.32K  --.-KB/s    in 0s

2022-01-10 13:57:07 (618 MB/s) - ‘crapto1-v3.3.tar.xz’ saved [6476/6476]

+ '[' -f /etc/debian_version ']'
+ pkgs=
+ for pkg in git libnfc-bin autoconf libnfc-dev
+ dpkg -l git
+ for pkg in git libnfc-bin autoconf libnfc-dev
+ dpkg -l libnfc-bin
+ for pkg in git libnfc-bin autoconf libnfc-dev
+ dpkg -l autoconf
+ for pkg in git libnfc-bin autoconf libnfc-dev
+ dpkg -l libnfc-dev
+ '[' '' '!=' '' ']'
+ '[' -d mfoc ']'
+ git clone https://github.com/nfc-tools/mfoc.git
Cloning into 'mfoc'...
remote: Enumerating objects: 526, done.
remote: Total 526 (delta 0), reused 0 (delta 0), pack-reused 526
Receiving objects: 100% (526/526), 233.36 KiB | 2.78 MiB/s, done.
Resolving deltas: 100% (330/330), done.
+ cd mfoc
+ git reset --hard
HEAD is now at ba072f1 update debian dir with up-to-date packaging
+ git clean -dfx
+ autoreconf -vfi
autoreconf: Entering directory `.'
autoreconf: configure.ac: not using Gettext
autoreconf: running: aclocal --force
autoreconf: configure.ac: tracing
autoreconf: configure.ac: not using Libtool
autoreconf: running: /usr/bin/autoconf --force
configure.ac:17: error: possibly undefined macro: AC_MSG_ERROR
      If this token and others are legitimate, please use m4_pattern_allow.
      See the Autoconf documentation.
autoreconf: /usr/bin/autoconf failed with exit status: 1
+ ./configure
configure: error: cannot find install-sh, install.sh, or shtool in "." "./.." "./../.."
+ make
make: *** No targets specified and no makefile found.  Stop.
+ sudo make install
make: *** No rule to make target 'install'.  Stop.
+ '[' -d crypto1_bs ']'
+ git clone https://github.com/aczid/crypto1_bs
Cloning into 'crypto1_bs'...
remote: Enumerating objects: 377, done.
remote: Counting objects: 100% (4/4), done.
remote: Compressing objects: 100% (4/4), done.
remote: Total 377 (delta 0), reused 0 (delta 0), pack-reused 373
Receiving objects: 100% (377/377), 135.74 KiB | 2.42 MiB/s, done.
Resolving deltas: 100% (240/240), done.
+ cd crypto1_bs
+ git reset --hard
HEAD is now at d4a6fd0 Merge pull request #45 from vd-rd/master
+ git clean -dfx
+ patch -p1
patching file Makefile
Hunk #1 FAILED at 7.
1 out of 1 hunk FAILED -- saving rejects to file Makefile.rej
patching file libnfc_crypto1_crack.c
+ tar Jxvf ../craptev1-v1.1.tar.xz
craptev1-v1.1/
craptev1-v1.1/readme
craptev1-v1.1/Makefile
craptev1-v1.1/craptev1.h
craptev1-v1.1/craptev1.c
craptev1-v1.1/solve.c
craptev1-v1.1/0xcafec0de.txt
+ mkdir crapto1-v3.3
+ tar Jxvf ../crapto1-v3.3.tar.xz -C crapto1-v3.3
crapto1.c
crapto1.h
crypto1.c
readme
+ make
gcc -std=gnu99 -O3 -march=native solve_bs.c crypto1_bs.c crypto1_bs_crack.c  crapto1-v3.3/crapto1.c crapto1-v3.3/crypto1.c -I crapto1-v3.3/  craptev1-v1.1/craptev1.c -I craptev1-v1.1/ -o solve_bs -lpthread -lm -Wl,--allow-multiple-definition
gcc -std=gnu99 -O3 -march=native solve_piwi_bs.c crypto1_bs.c crypto1_bs_crack.c  crapto1-v3.3/crapto1.c crapto1-v3.3/crypto1.c -I crapto1-v3.3/  craptev1-v1.1/craptev1.c -I craptev1-v1.1/ -o solve_piwi_bs -lpthread -lm -Wl,--allow-multiple-definition
gcc -std=gnu99 -O3 -march=native solve_piwi.c crypto1_bs.c crypto1_bs_crack.c  crapto1-v3.3/crapto1.c crapto1-v3.3/crypto1.c -I crapto1-v3.3/  craptev1-v1.1/craptev1.c -I craptev1-v1.1/ -o solve_piwi -lpthread -Wl,--allow-multiple-definition
gcc -std=gnu99 -O3 -march=native libnfc_crypto1_crack.c crypto1_bs.c crypto1_bs_crack.c  crapto1-v3.3/crapto1.c crapto1-v3.3/crypto1.c -I crapto1-v3.3/  craptev1-v1.1/craptev1.c -I craptev1-v1.1/ -o libnfc_crypto1_crack -lpthread -lnfc -lm -Wl,--allow-multiple-definition
+ sudo cp -a libnfc_crypto1_crack /usr/local/bin
+ sudo cp -a miLazyCracker.sh /usr/local/bin/miLazyCracker
+ echo Done.
Done.

Mfoc error

Hello and sorry for my post here but I can't find an answer for my question. I'm super new to linux and nfc. My nfc reader is ACR122U-A9 and he doesn't let me break this mifare 1k card... Can someone help me please? Thank you!

Fingerprinting based on MIFARE type Identification Procedure:

  • MIFARE Classic 1K
  • MIFARE Plus (4 Byte UID or 4 Byte RID) 2K, Security level 1
  • SmartMX with MIFARE 1K emulation
    Other possible matches based on ATQA & SAK values:

Try to authenticate to all sectors with default keys...
Symbols: '.' no key found, '/' A key found, '' B key found, 'x' both keys found
[Key: ffffffffffff] -> [................]
[Key: a0a1a2a3a4a5] -> [................]
[Key: d3f7d3f7d3f7] -> [................]
[Key: 000000000000] -> [................]
[Key: b0b1b2b3b4b5] -> [................]
[Key: 4d3a99c351dd] -> [................]
[Key: 1a982c7e459a] -> [................]
[Key: aabbccddeeff] -> [................]
[Key: 714c5c886e97] -> [................]
[Key: 587ee5f9350f] -> [................]
[Key: a0478cc39091] -> [................]
[Key: 533cb6c723f6] -> [................]
[Key: 8fd0a4f256e9] -> [................]

Sector 00 - Unknown Key A Unknown Key B
Sector 01 - Unknown Key A Unknown Key B
Sector 02 - Unknown Key A Unknown Key B
Sector 03 - Unknown Key A Unknown Key B
Sector 04 - Unknown Key A Unknown Key B
Sector 05 - Unknown Key A Unknown Key B
Sector 06 - Unknown Key A Unknown Key B
Sector 07 - Unknown Key A Unknown Key B
Sector 08 - Unknown Key A Unknown Key B
Sector 09 - Unknown Key A Unknown Key B
Sector 10 - Unknown Key A Unknown Key B
Sector 11 - Unknown Key A Unknown Key B
Sector 12 - Unknown Key A Unknown Key B
Sector 13 - Unknown Key A Unknown Key B
Sector 14 - Unknown Key A Unknown Key B
Sector 15 - Unknown Key A Unknown Key B
mfoc: ERROR:

No sector encrypted with the default key has been found, exiting..

Fixed Nonce implementation?

Hi,
I would like to know if there is a way to make miLazy working even with a Mifare card with a fixed nonce, also known as prng fixed. I've been trying so hard to make it work but, even changing some parameters (es. increasing probe size) it doesn't work. I'm actually using a pn532 via Kali.
The card I am trying to retrieve the keys from is seen as a Mifare Classic 1k but I suspect it being a Mifare Plus (which is compatible with the Classic 1k one).
Hope you can help.

No way to add key on mfoc

Hi.

I've got quite a lot of experience using mfoc, mfcuk, etc., but I've run into some pretty basic issues using miLazyCracker. Basically, I find no way to add a key I already know to the list of default keys that miLazyCracker uses. In the plain Mfoc it would be so easy to add (mfoc -k xxxxxxxxxxxx , being xxxxxxxxxxxx the key I want to add), but on miLazyCracker how am I supposed to add previously known key?

Thanks in advance for your help.

Reader-answer transfer error spam

Hi all,
I have tried to perform a harnested attack on a Mifare Plus 2k Card. As soon as the attack begins I am spammed by the following message: Reader-answer transfer error, exiting..

I am using a SCL3771 USB NFC reader on Kali Linux. Any suggestions?

Thanks!

Well there is no issues

Worked like a charm
Make sure black list _usb in modprob
Kali distro upgrade
Well I m using acr 122u.
Took about 15 min retrive both sectors love it.
best option is cloning yo uh have no worry

Use MFOC fork from vk496?

Hello, I am new to GitHub.

Why not use the MFOC fork from vk496 that implements the hardnested attack and is faster in performing it? I have not encountered a scenario when I could find no solution either. Could the hardnested attack implementation make it into miLazyCracker?

https://github.com/vk496/mfoc

Actually, miLazyCracker and this fork of MFOC seem redundant to me at this point, with miLazyCracker being slower, but there must be an explanation. What are the advantadges of the implementation as seen in miLazyCracker? I guess less resources needed?

On an ARM architecture (Raspberry Pi 3 with Raspbian 32 bits or Kali 64 bits), miLazyCracker is the only tool that will work for me to perform the hardnested attack, as the MFOC fork won't compile, and the Proxmark3 hardnested attack needs more memory than the Raspberry Pi 3 can allocate, so miLazyCracker is still pretty useful.

I just thought it might be improved with a different implementation of the attack?

Thank you,
Regards!

crypto1_bs parallel instances

Hello everyone. I'm by no means a programmer, but I think I've discovered a way to improve miLazyCracker's speed.

  • unkernet has a crypto1_bs fork that uses nonce appending and storing.
  • Cracking using crypto1_bs method is slow, so meanwhile the intensive CPU cracking is happening, parallel instances of crypto1_bs can happen only to collect nonces.
  • Rate of cracking speed and nonce collection could be calculated to dynamically set the nonce collection thereshold in order to reduce complexity as much as possible but also to be able to capture as much sector data as possible for when CPU power is available.

I've been doing this manually (Running crypto1_bs instances in parallel) with great results.

Too crazy?

nfc_initiator_mifare_cmd: Mifare Authentication Failed

hello all mfoc find me the three missing keys but do not create the dump

sudo mfoc -f key.txt -O test1.mfd
[sudo] Mot de passe de _______ :
The custom key 0x6c449f91af6b has been added to the default keys
The custom key 0x07364b58ce42 has been added to the default keys
The custom key 0x0419f24294b5 has been added to the default keys
The custom key 0xb0b1b2b3b4b5 has been added to the default keys
The custom key 0xa0a1a2a3a4a5 has been added to the default keys
Found Mifare Classic 1k tag
ISO/IEC 14443A (106 kbps) target:
ATQA (SENS_RES): 04 00

UID size: single
bit frame anticollision not supported
UID (NFCID1): 5e 84 75 b9
SAK (SEL_RES): 08
Not compliant with ISO/IEC 14443-4
Not compliant with ISO/IEC 18092

Fingerprinting based on MIFARE type Identification Procedure:
Other possible matches based on ATQA & SAK values:

Unknown card, sorry

Try to authenticate to all sectors with default keys...
Symbols: '.' no key found, '/' A key found, '' B key found, 'x' both keys found
[Key: 6c449f91af6b] -> [...............]
[Key: 07364b58ce42] -> [..............]
[Key: 0419f24294b5] -> [.............]
[Key: b0b1b2b3b4b5] -> [\\\\]
[Key: a0a1a2a3a4a5] -> [xxxxxxxxxxxxxxxx]
[Key: ffffffffffff] -> [xxxxxxxxxxxxxxxx]
[Key: a0a1a2a3a4a5] -> [xxxxxxxxxxxxxxxx]
[Key: d3f7d3f7d3f7] -> [xxxxxxxxxxxxxxxx]
[Key: 000000000000] -> [xxxxxxxxxxxxxxxx]
[Key: b0b1b2b3b4b5] -> [xxxxxxxxxxxxxxxx]
[Key: 4d3a99c351dd] -> [xxxxxxxxxxxxxxxx]
[Key: 1a982c7e459a] -> [xxxxxxxxxxxxxxxx]
[Key: aabbccddeeff] -> [xxxxxxxxxxxxxxxx]
[Key: 714c5c886e97] -> [xxxxxxxxxxxxxxxx]
[Key: 587ee5f9350f] -> [xxxxxxxxxxxxxxxx]
[Key: a0478cc39091] -> [xxxxxxxxxxxxxxxx]
[Key: 533cb6c723f6] -> [xxxxxxxxxxxxxxxx]
[Key: 8fd0a4f256e9] -> [xxxxxxxxxxxxxxxx]

Sector 00 - Found Key A: a0a1a2a3a4a5 Found Key B: b0b1b2b3b4b5
Sector 01 - Found Key A: a0a1a2a3a4a5 Found Key B: 07364b58ce42
Sector 02 - Found Key A: a0a1a2a3a4a5 Found Key B: 0419f24294b5
Sector 03 - Found Key A: a0a1a2a3a4a5 Found Key B: 6c449f91af6b
Sector 04 - Found Key A: a0a1a2a3a4a5 Found Key B: b0b1b2b3b4b5
Sector 05 - Found Key A: a0a1a2a3a4a5 Found Key B: b0b1b2b3b4b5
Sector 06 - Found Key A: a0a1a2a3a4a5 Found Key B: b0b1b2b3b4b5
Sector 07 - Found Key A: a0a1a2a3a4a5 Found Key B: b0b1b2b3b4b5
Sector 08 - Found Key A: a0a1a2a3a4a5 Found Key B: b0b1b2b3b4b5
Sector 09 - Found Key A: a0a1a2a3a4a5 Found Key B: b0b1b2b3b4b5
Sector 10 - Found Key A: a0a1a2a3a4a5 Found Key B: b0b1b2b3b4b5
Sector 11 - Found Key A: a0a1a2a3a4a5 Found Key B: b0b1b2b3b4b5
Sector 12 - Found Key A: a0a1a2a3a4a5 Found Key B: b0b1b2b3b4b5
Sector 13 - Found Key A: a0a1a2a3a4a5 Found Key B: b0b1b2b3b4b5
Sector 14 - Found Key A: a0a1a2a3a4a5 Found Key B: b0b1b2b3b4b5
Sector 15 - Found Key A: a0a1a2a3a4a5 Found Key B: b0b1b2b3b4b5

We have all sectors encrypted with the default keys..

Auth with all sectors succeeded, dumping keys to a file!
Block 63, type A, key a0a1a2a3a4a5 :00 00 00 00 00 00 78 77 88 69 00 00 00 00 00 00
Block 62, type A, key a0a1a2a3a4a5 :00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Block 61, type A, key a0a1a2a3a4a5 :00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Block 60, type A, key a0a1a2a3a4a5 :00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Block 59, type A, key a0a1a2a3a4a5 :00 00 00 00 00 00 78 77 88 69 00 00 00 00 00 00
Block 58, type A, key a0a1a2a3a4a5 :00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Block 57, type A, key a0a1a2a3a4a5 :00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Block 56, type A, key a0a1a2a3a4a5 :00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Block 55, type A, key a0a1a2a3a4a5 :00 00 00 00 00 00 78 77 88 69 00 00 00 00 00 00
Block 54, type A, key a0a1a2a3a4a5 :00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Block 53, type A, key a0a1a2a3a4a5 :00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Block 52, type A, key a0a1a2a3a4a5 :00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Block 51, type A, key a0a1a2a3a4a5 :00 00 00 00 00 00 78 77 88 69 00 00 00 00 00 00
Block 50, type A, key a0a1a2a3a4a5 :00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Block 49, type A, key a0a1a2a3a4a5 :00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Block 48, type A, key a0a1a2a3a4a5 :00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Block 47, type A, key a0a1a2a3a4a5 :00 00 00 00 00 00 78 77 88 69 00 00 00 00 00 00
Block 46, type A, key a0a1a2a3a4a5 :00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Block 45, type A, key a0a1a2a3a4a5 :00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Block 44, type A, key a0a1a2a3a4a5 :00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Block 43, type A, key a0a1a2a3a4a5 :00 00 00 00 00 00 78 77 88 69 00 00 00 00 00 00
Block 42, type A, key a0a1a2a3a4a5 :00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Block 41, type A, key a0a1a2a3a4a5 :00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Block 40, type A, key a0a1a2a3a4a5 :00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Block 39, type A, key a0a1a2a3a4a5 :00 00 00 00 00 00 78 77 88 69 00 00 00 00 00 00
Block 38, type A, key a0a1a2a3a4a5 :00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Block 37, type A, key a0a1a2a3a4a5 :00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Block 36, type A, key a0a1a2a3a4a5 :00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Block 35, type A, key a0a1a2a3a4a5 :00 00 00 00 00 00 78 77 88 69 00 00 00 00 00 00
Block 34, type A, key a0a1a2a3a4a5 :00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Block 33, type A, key a0a1a2a3a4a5 :00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Block 32, type A, key a0a1a2a3a4a5 :00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Block 31, type A, key a0a1a2a3a4a5 :00 00 00 00 00 00 78 77 88 69 00 00 00 00 00 00
Block 30, type A, key a0a1a2a3a4a5 :00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Block 29, type A, key a0a1a2a3a4a5 :00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Block 28, type A, key a0a1a2a3a4a5 :00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Block 27, type A, key a0a1a2a3a4a5 :00 00 00 00 00 00 78 77 88 69 00 00 00 00 00 00
Block 26, type A, key a0a1a2a3a4a5 :00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Block 25, type A, key a0a1a2a3a4a5 :00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Block 24, type A, key a0a1a2a3a4a5 :00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Block 23, type A, key a0a1a2a3a4a5 :00 00 00 00 00 00 78 77 88 69 00 00 00 00 00 00
Block 22, type A, key a0a1a2a3a4a5 :00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Block 21, type A, key a0a1a2a3a4a5 :00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Block 20, type A, key a0a1a2a3a4a5 :00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Block 19, type A, key a0a1a2a3a4a5 :00 00 00 00 00 00 78 77 88 69 00 00 00 00 00 00
Block 18, type A, key a0a1a2a3a4a5 :00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Block 17, type A, key a0a1a2a3a4a5 :00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Block 16, type A, key a0a1a2a3a4a5 :00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Block 15, type A, key a0a1a2a3a4a5 :00 00 00 00 00 00 4b 44 bb ea 00 00 00 00 00 00
Block 14, type A, key a0a1a2a3a4a5 :00 00 44 39 15 4a e4 00 00 00 00 00 4d 49 43 00
nfc_initiator_mifare_cmd: Mifare Authentication Failed

the file is created but it is empty would anyone have an idea to solve this problem?

Linker Errors in gcc10

Run Installer on Ubuntu 20.10, libnfc_crypto1_crack failed to link.

--2020-11-23 18:53:42--  http://web.archive.org/web/20190221140220if_/http://www2.vaneay.fr/mifare/craptev1-v1.1.tar.xz
Resolving web.archive.org (web.archive.org)... 207.241.226.190
Connecting to web.archive.org (web.archive.org)|207.241.226.190|:80... connected.
HTTP request sent, awaiting response... 200 OK
Length: unspecified [application/x-tar]
Saving to: ‘craptev1-v1.1.tar.xz’

     0K .......... .......... .......... .......... .......... 12.9K
    50K .......... .....                                       46.4K=4.2s

2020-11-23 18:53:47 (15.4 KB/s) - ‘craptev1-v1.1.tar.xz’ saved [66576]

--2020-11-23 18:53:47--  http://web.archive.org/web/20190221140255if_/http://www2.vaneay.fr/mifare/crapto1-v3.3.tar.xz
Resolving web.archive.org (web.archive.org)... 207.241.226.190
Connecting to web.archive.org (web.archive.org)|207.241.226.190|:80... connected.
HTTP request sent, awaiting response... 200 OK
Length: unspecified [application/x-tar]
Saving to: ‘crapto1-v3.3.tar.xz’

     0K ......                                                 42.5K=0.1s

2020-11-23 18:53:48 (42.5 KB/s) - ‘crapto1-v3.3.tar.xz’ saved [6476]

+ '[' -f /etc/debian_version ']'
+ pkgs=
+ for pkg in git libnfc-bin autoconf libnfc-dev
+ dpkg -l git
+ for pkg in git libnfc-bin autoconf libnfc-dev
+ dpkg -l libnfc-bin
+ for pkg in git libnfc-bin autoconf libnfc-dev
+ dpkg -l autoconf
+ for pkg in git libnfc-bin autoconf libnfc-dev
+ dpkg -l libnfc-dev
+ '[' '' '!=' '' ']'
+ '[' -d mfoc ']'
+ git clone https://github.com/nfc-tools/mfoc.git
Cloning into 'mfoc'...
+ cd mfoc
+ git reset --hard
HEAD is now at ba072f1 update debian dir with up-to-date packaging
+ git clean -dfx
+ autoreconf -vfi
autoreconf: Entering directory `.'
autoreconf: configure.ac: not using Gettext
autoreconf: running: aclocal --force 
autoreconf: configure.ac: tracing
autoreconf: configure.ac: not using Libtool
autoreconf: running: /usr/bin/autoconf --force
autoreconf: running: /usr/bin/autoheader --force
autoreconf: running: automake --add-missing --copy --force-missing
configure.ac:11: installing './compile'
configure.ac:9: installing './install-sh'
configure.ac:9: installing './missing'
Makefile.am: installing './INSTALL'
src/Makefile.am: installing './depcomp'
autoreconf: Leaving directory `.'
+ ./configure
checking for a BSD-compatible install... /usr/bin/install -c
checking whether build environment is sane... yes
checking for a thread-safe mkdir -p... /usr/bin/mkdir -p
checking for gawk... no
checking for mawk... mawk
checking whether make sets $(MAKE)... yes
checking whether make supports nested variables... yes
checking for gcc... gcc
checking whether the C compiler works... yes
checking for C compiler default output file name... a.out
checking for suffix of executables... 
checking whether we are cross compiling... no
checking for suffix of object files... o
checking whether we are using the GNU C compiler... yes
checking whether gcc accepts -g... yes
checking for gcc option to accept ISO C89... none needed
checking whether gcc understands -c and -o together... yes
checking whether make supports the include directive... yes (GNU style)
checking dependency style of gcc... gcc3
checking whether make supports nested variables... (cached) yes
checking for pkg-config... /usr/bin/pkg-config
checking pkg-config is at least version 0.9.0... yes
checking for libnfc >= 1.7.0... yes
checking for inline... inline
checking how to run the C preprocessor... gcc -E
checking for grep that handles long lines and -e... /usr/bin/grep
checking for egrep... /usr/bin/grep -E
checking for ANSI C header files... yes
checking for sys/types.h... yes
checking for sys/stat.h... yes
checking for stdlib.h... yes
checking for string.h... yes
checking for memory.h... yes
checking for strings.h... yes
checking for inttypes.h... yes
checking for stdint.h... yes
checking for unistd.h... yes
checking for stdbool.h that conforms to C99... yes
checking for _Bool... yes
checking for size_t... yes
checking for uint8_t... yes
checking for uint16_t... yes
checking for uint32_t... yes
checking for uint64_t... yes
checking for stdlib.h... (cached) yes
checking for GNU libc compatible malloc... yes
checking for stdlib.h... (cached) yes
checking for GNU libc compatible realloc... yes
checking for memset... yes
checking that generated files are newer than configure... done
configure: creating ./config.status
config.status: creating Makefile
config.status: creating src/Makefile
config.status: creating config.h
config.status: executing depfiles commands
+ make
make  all-recursive
make[1]: Entering directory '/home/alvin/test/miLazyCracker/mfoc'
Making all in src
make[2]: Entering directory '/home/alvin/test/miLazyCracker/mfoc/src'
  CC       crapto1.o
  CC       crypto1.o
  CC       mfoc.o
mfoc.c: In function ‘main’:
mfoc.c:549:43: warning: format ‘%llx’ expects argument of type ‘long long unsigned int’, but argument 3 has type ‘uint64_t’ {aka ‘long unsigned int’} [-Wformat=]
  549 |                     fprintf(pfKey, "%012llx;%d;%c;%d;%c", knownKey, knownSector, knownKeyLetter, unknownSector, unknownKeyLetter);
      |                                     ~~~~~~^               ~~~~~~~~
      |                                           |               |
      |                                           |               uint64_t {aka long unsigned int}
      |                                           long long unsigned int
      |                                     %012lx
  CC       mifare.o
  CC       nfc-utils.o
  CCLD     mfoc
make[2]: Leaving directory '/home/alvin/test/miLazyCracker/mfoc/src'
make[2]: Entering directory '/home/alvin/test/miLazyCracker/mfoc'
make[2]: Leaving directory '/home/alvin/test/miLazyCracker/mfoc'
make[1]: Leaving directory '/home/alvin/test/miLazyCracker/mfoc'
+ sudo make install
Making install in src
make[1]: Entering directory '/home/alvin/test/miLazyCracker/mfoc/src'
make[2]: Entering directory '/home/alvin/test/miLazyCracker/mfoc/src'
 /usr/bin/mkdir -p '/usr/local/bin'
  /usr/bin/install -c mfoc '/usr/local/bin'
 /usr/bin/mkdir -p '/usr/local/share/man/man1'
 /usr/bin/install -c -m 644 mfoc.1 '/usr/local/share/man/man1'
make[2]: Leaving directory '/home/alvin/test/miLazyCracker/mfoc/src'
make[1]: Leaving directory '/home/alvin/test/miLazyCracker/mfoc/src'
make[1]: Entering directory '/home/alvin/test/miLazyCracker/mfoc'
make[2]: Entering directory '/home/alvin/test/miLazyCracker/mfoc'
make[2]: Nothing to be done for 'install-exec-am'.
make[2]: Nothing to be done for 'install-data-am'.
make[2]: Leaving directory '/home/alvin/test/miLazyCracker/mfoc'
make[1]: Leaving directory '/home/alvin/test/miLazyCracker/mfoc'
+ '[' -d crypto1_bs ']'
+ git clone https://github.com/aczid/crypto1_bs
Cloning into 'crypto1_bs'...
+ cd crypto1_bs
+ git reset --hard
HEAD is now at 873a384 Merge branch 'master' of github.com:aczid/crypto1_bs
+ git clean -dfx
+ patch -p1
patching file libnfc_crypto1_crack.c
+ tar Jxvf ../craptev1-v1.1.tar.xz
craptev1-v1.1/
craptev1-v1.1/readme
craptev1-v1.1/Makefile
craptev1-v1.1/craptev1.h
craptev1-v1.1/craptev1.c
craptev1-v1.1/solve.c
craptev1-v1.1/0xcafec0de.txt
+ mkdir crapto1-v3.3
+ tar Jxvf ../crapto1-v3.3.tar.xz -C crapto1-v3.3
crapto1.c
crapto1.h
crypto1.c
readme
+ make
gcc -std=gnu99 -O3 -march=native solve_bs.c crypto1_bs.c crypto1_bs_crack.c  crapto1-v3.3/crapto1.c crapto1-v3.3/crypto1.c -I crapto1-v3.3/  craptev1-v1.1/craptev1.c -I craptev1-v1.1/ -o solve_bs -lpthread -lm
/usr/bin/ld: /tmp/ccI5eWJA.o:(.bss+0x20): multiple definition of `bs_ones'; /tmp/ccXj0BWD.o:(.bss+0x4b160): first defined here
/usr/bin/ld: /tmp/ccI5eWJA.o:(.bss+0x0): multiple definition of `bs_zeroes'; /tmp/ccXj0BWD.o:(.bss+0x4b140): first defined here
/usr/bin/ld: /tmp/ccV6aqUC.o:(.bss+0x0): multiple definition of `bitsliced_rollback_byte'; /tmp/ccXj0BWD.o:(.bss+0x20): first defined here
/usr/bin/ld: /tmp/ccV6aqUC.o:(.bss+0x100): multiple definition of `bitsliced_encrypted_parity_bits'; /tmp/ccXj0BWD.o:(.bss+0x120): first defined here
/usr/bin/ld: /tmp/ccV6aqUC.o:(.bss+0x4b110): multiple definition of `keys_found'; /tmp/ccXj0BWD.o:(.bss+0x4b130): first defined here
/usr/bin/ld: /tmp/ccV6aqUC.o:(.bss+0x4b140): multiple definition of `bs_ones'; /tmp/ccXj0BWD.o:(.bss+0x4b160): first defined here
/usr/bin/ld: /tmp/ccV6aqUC.o:(.bss+0x4b108): multiple definition of `total_states_tested'; /tmp/ccXj0BWD.o:(.bss+0x4b128): first defined here
/usr/bin/ld: /tmp/ccV6aqUC.o:(.bss+0x25900): multiple definition of `bitsliced_encrypted_nonces'; /tmp/ccXj0BWD.o:(.bss+0x25920): first defined here
/usr/bin/ld: /tmp/ccV6aqUC.o:(.bss+0x4b120): multiple definition of `bs_zeroes'; /tmp/ccXj0BWD.o:(.bss+0x4b140): first defined here
/usr/bin/ld: /tmp/ccV6aqUC.o:(.bss+0x4b100): multiple definition of `total_states'; /tmp/ccXj0BWD.o:(.bss+0x4b120): first defined here
collect2: error: ld returned 1 exit status
make: *** [Makefile:19: solve_bs] Error 1
+ sudo cp -a libnfc_crypto1_crack /usr/local/bin
cp: cannot stat 'libnfc_crypto1_crack': No such file or directory
+ sudo cp -a miLazyCracker.sh /usr/local/bin/miLazyCracker
+ echo Done.
Done.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.