MF_Attack_hardnestedDialog Hardnested Attack Hardnested攻击 Known Key: 已知Key: Known Block: 已知块: Block: 块: A B Target Block: 目标块: Target Block: 目标块: MF_Sim_simDialog Dialog 对话框 Simulate 模拟 u UID 4 or 7 bytes. If not specified, the UID 4B from emulator memory will be used 4或7字节的UID,如果不指定,则使用模拟器内存中的4字节UID n Automatically exit simulation after <numreads> blocks have been read by reader. 0 = infinite 在读卡器读取<n>个块后自动退出模拟,n为0或不指定时永远不退出 i Interactive, means that console will not be returned until simulation finishes or is aborted 交互模式,勾选后PM3客户端将在模拟完成或者模拟中断后才可继续使用 x Crack, performs the 'reader attack', nr/ar attack against a legitimate reader, fishes out the key(s) 破解,对读卡器进行攻击,通过nr/ar攻击来钓出密码(无卡嗅探) e set keys found from 'reader attack' to emulator memory (implies x and i) 在获得密码后自动将密码写入模拟器内存(自动勾选x和i) f get UIDs to use for 'reader attack' from file 'f <filename.txt>' (implies x and i) 从<filename.txt>当中获取用于破解读卡器的UID(批量模拟)(自动勾选x和i) r Generate random nonces instead of sequential nonces. Standard reader attack won't work with this option, only moebius attack works 生成随机nonce而不是顺序的nonce,这种情况下PM3将不对读卡器进行标准攻击,只进行moebius攻击 Generate random nonces instead of sequential nonces. Standard reader attack won't work with this option, only moebius attack works. 生成随机nonce而不是顺序的nonce,这种情况下PM3将不对读卡器进行标准攻击,只进行moebius攻击 MF_UID_parameterDialog Dialog 对话框 Set Parameter 设置卡参数 UID: ATQA: SAK: The parameter will not change if you leave it empty. 如果留空,则对应参数将保持不变 MainWindow Proxmark3GUI Path: 路径: Refresh 刷新端口 Connect 连接 Disconnect 断开 Mifare Mifare(IC)卡 >> << F Card Type 卡类型 MINI 1K 2K 4K File 文件 Load 加载 Save 保存 Data Key Attack 破解 Card Info 读卡片信息 Check Default 验证默认密码 Nested Nested攻击 Hardnested Hardested攻击 Read/Write 读/写 Block: Key: Key Type: Key类型: A B Data: Normal(Require Password) 普通卡(需要密码) Read Block 读单个块 Write Block 写单个块 Read All 读所有块 Write All 写所有块 Dump Dump命令 Restore Restore命令 Chinese Magic Card(Without Password) UID卡(不需要密码) Lock UFUID Card 锁定UFUID卡 About UID Card 关于UID卡 Set Parameter 设置卡参数 Wipe 擦除 Simulate 模拟 Load from data above 从上方数据导入 Clear 清空 Sniff 嗅探 List Sniff Data 列出嗅探数据 RawCommand 原始命令 History: 命令历史: ClearHistory 清空历史 Send 发送 ClearOutput 清空输出 Info 信息 Plz choose a port first 请先选择端口 Connected 已连接 Not Connected 未连接 When Changeing card type, the data and keys in this app will be cleard. Continue? 更改卡容量后,窗口中的data和key会被清空\n要继续吗? Plz choose the data file: 请选择data文件: Binary Data Files(*.bin *.dump);;Text Data Files(*.txt *.eml);;All Files(*.*) 二进制Data文件(*.bin *.dump);;文本Data文件(*.txt *.eml);;所有文件(*.*) Failed to open 无法打开 Plz choose the key file: 请选择key文件: Binary Key Files(*.bin *.dump);;All Files(*.*) 二进制Key文件(*.bin *.dump);;所有文件(*.*) Save data to 保存数据至 When Changeing card type, the data and keys in this app will be cleard. 卡片容量改变后,上方的所有Data和Key会被清空。 Continue? 确定? Plz select the font of data widget and key widget 请选择Data窗口和Key窗口的字体 Data must consists of 32 Hex symbols(Whitespace is allowed) Data必须由32个十六进制字符组成(中间可含有空格) Key must consists of 12 Hex symbols(Whitespace is allowed) Key必须由12个十六进制字符组成(中间可含有空格) Plz select the data file: 请选择data文件: Plz select the key file: 请选择key文件: Binary Key Files(*.bin *.dump);;Binary Data Files(*.bin *.dump);;All Files(*.*) 二进制Key文件(*.bin *.dump)二进制Data文件(*.bin *.dump);;所有文件(*.*) Plz select the location to save data file: 请选择文件保存的位置: Binary Data Files(*.bin *.dump);;Text Data Files(*.txt *.eml) 二进制Data文件(*.bin *.dump);;文本Data文件(*.txt *.eml) Failed to save to 无法保存至 Plz select the location to save key file: 请选择key文件保存的位置: Binary Key Files(*.bin *.dump) 二进制Key文件(*.bin *.dump) Normally, the Block 0 of a typical Mifare card, which contains the UID, is locked during the manufacture. Users cannot write anything to Block 0 or set a new UID to a normal Mifare card. 普通Mifare卡的Block0无法写入,UID也不能更改 Chinese Magic Cards(aka UID Cards) are some special cards whose Block 0 are writeable. And you can change UID by writing to it. UID卡(在国外叫Chinese Magic Card)的Block0可写,UID可变 There are two versions of Chinese Magic Cards, the Gen1 and the Gen2. 国外把UID卡分为Chinese Magic Card Gen1和Gen2 Gen1: also called UID card in China. It responses to some backdoor commands so you can access any blocks without password. The Proxmark3 has a bunch of related commands(csetblk, cgetblk, ...) to deal with this type of card, and my GUI also support these commands. 指通常所说的UID卡,可以通过后门指令直接读写块而无需密码,在PM3和此GUI中有特殊命令处理这类卡片 Gen2: doesn't response to the backdoor commands, which means that a reader cannot detect whether it is a Chinese Magic Card or not by sending backdoor commands. 这个叫法在国内比较罕见,在国外指CUID/FUID/UFUID这类对后门指令不响应的卡(防火墙卡) There are some types of Chinese Magic Card Gen2. 以下是Gen2卡的详细介绍 CUID Card: CUID卡: the Block 0 is writeable, you can write to this block repeatedly by normal wrbl command. 可通过普通的写块命令来写Block0,可重复擦写 (hf mf wrbl 0 A FFFFFFFFFFFF <the data you want to write>) (hf mf wrbl 0 A FFFFFFFFFFFF <待写入数据>) FUID Card: FUID卡: you can only write to Block 0 once. After that, it seems like a typical Mifare card(Block 0 cannot be written to). Block0只能写入一次 (some readers might try changing the Block 0, which could detect the CUID Card. In that case, you should use FUID card.) (更高级的穿防火墙卡,可以过一些能识别出CUID卡的读卡器) UFUID Card: UFUID卡: It behaves like a CUID card(or UID card? I'm not sure) before you send some special command to lock it. Once it is locked, you cannot change its Block 0(just like a typical Mifare card). 锁卡前和普通UID/CUID卡一样可以反复读写Block0,用特殊命令锁卡后就和FUID卡一样了 Seemingly, these Chinese Magic Cards are more easily to be compromised by Nested Attack(it takes little time to get an unknown key). 所有UID卡都似乎更容易被Nested攻击破解 Plz select the trace file: 请选择trace文件: Trace Files(*.trc);;All Files(*.*) Trace文件(*.trc);;所有文件(*.*) Plz select the location to save trace file: 请选择trace文件保存的位置: Trace Files(*.trc) Trace文件(*.trc) Idle 空闲 Sec Blk KeyA KeyB HW Version: 固件版本: PM3: 连接状态: State: 运行状态: Running 运行中 Mifare info 信息: Success! 成功! Info 信息 Failed! 失败! Failed to read card. 读卡失败。