Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- pm3 --> hf mf hard 0 a fc00018778f7 28 b
- --target block no: 28, target key type:B, known target key: 0x000000000000 (not set), file action: none, Slow: No, Tests: 0
- Allocating memory for partial statelists...
- Generating partial statelists...
- Generating bitflip statelist...
- Acquiring nonces...
- Checking for Filter Flip Properties...
- Acquired 1344 nonces ( 1336 / 5000 with distinct bytes 0 and 1). Number of bytes with probability for correctly guessed Sum(a8)
- > 95.0%: 0
- Acquired 1568 nonces ( 1558 / 5000 with distinct bytes 0 and 1). Number of bytes with probability for correctly guessed Sum(a8)
- > 95.0%: 0
- Acquired 2016 nonces ( 1994 / 5000 with distinct bytes 0 and 1). Number of bytes with probability for correctly guessed Sum(a8)
- > 95.0%: 0
- Acquired 2576 nonces ( 2531 / 5000 with distinct bytes 0 and 1). Number of bytes with probability for correctly guessed Sum(a8)
- > 95.0%: 1
- Acquired 3024 nonces ( 2957 / 5000 with distinct bytes 0 and 1). Number of bytes with probability for correctly guessed Sum(a8)
- > 95.0%: 3
- Acquired 3584 nonces ( 3493 / 5000 with distinct bytes 0 and 1). Number of bytes with probability for correctly guessed Sum(a8)
- > 95.0%: 8
- Acquired 4032 nonces ( 3909 / 5000 with distinct bytes 0 and 1). Number of bytes with probability for correctly guessed Sum(a8)
- > 95.0%: 10
- Acquired 4592 nonces ( 4433 / 5000 with distinct bytes 0 and 1). Number of bytes with probability for correctly guessed Sum(a8)
- > 95.0%: 22
- Acquired 5040 nonces ( 4843 / 5000 with distinct bytes 0 and 1). Number of bytes with probability for correctly guessed Sum(a8)
- > 95.0%: 27
- Generating crypto1 state candidates...
- Number of possible keys with Sum(a0) = 136: 16937635385344 (2^43.9)
- Number of remaining possible keys: 11541881188 (2^33.4)
- Time for generating key candidates list: 2 seconds
- Brute force phase starting.
- Using 128-bit bitslices
- Bitslicing best_first_byte^uid[3] (rollback byte): FE ...
- Bitslicing nonces...
- Starting 4 cracking threads to search 4 buckets containing a total of 11541881188 states...
- ....Fail! Tested 2951946596 states, in 82 seconds
- Waiting for a response from the proxmark...
- Don't forget to cancel its operation first by pressing on the button
- Error: No response from Proxmark.
- pm3 --> hf mf hard 0 a fc00018778f7 28 b
- --target block no: 28, target key type:B, known target key: 0x000000000000 (not set), file action: none, Slow: No, Tests: 0
- Allocating memory for partial statelists...
- Generating partial statelists...
- Generating bitflip statelist...
- Acquiring nonces...
- Checking for Filter Flip Properties...
- Acquired 1344 nonces ( 1321 / 5000 with distinct bytes 0 and 1). Number of bytes with probability for correctly guessed Sum(a8)
- > 95.0%: 0
- Acquired 1568 nonces ( 1540 / 5000 with distinct bytes 0 and 1). Number of bytes with probability for correctly guessed Sum(a8)
- > 95.0%: 0
- Acquired 2016 nonces ( 1971 / 5000 with distinct bytes 0 and 1). Number of bytes with probability for correctly guessed Sum(a8)
- > 95.0%: 0
- Acquired 2576 nonces ( 2513 / 5000 with distinct bytes 0 and 1). Number of bytes with probability for correctly guessed Sum(a8)
- > 95.0%: 1
- Acquired 3024 nonces ( 2943 / 5000 with distinct bytes 0 and 1). Number of bytes with probability for correctly guessed Sum(a8)
- > 95.0%: 2
- Acquired 3584 nonces ( 3465 / 5000 with distinct bytes 0 and 1). Number of bytes with probability for correctly guessed Sum(a8)
- > 95.0%: 5
- Acquired 4032 nonces ( 3886 / 5000 with distinct bytes 0 and 1). Number of bytes with probability for correctly guessed Sum(a8)
- > 95.0%: 9
- Acquired 4592 nonces ( 4408 / 5000 with distinct bytes 0 and 1). Number of bytes with probability for correctly guessed Sum(a8)
- > 95.0%: 18
- Acquired 5040 nonces ( 4832 / 5000 with distinct bytes 0 and 1). Number of bytes with probability for correctly guessed Sum(a8)
- > 95.0%: 24
- Generating crypto1 state candidates...
- Number of possible keys with Sum(a0) = 136: 16937635385344 (2^43.9)
- Number of remaining possible keys: 17034738164 (2^34.0)
- Time for generating key candidates list: 2 seconds
- Brute force phase starting.
- Using 128-bit bitslices
- Bitslicing best_first_byte^uid[3] (rollback byte): BE ...
- Bitslicing nonces...
- Starting 4 cracking threads to search 4 buckets containing a total of 17034738164 states...
- Key Found after testing 1029629606 (2^29.9) out of 17034738164 (2^34.0) keys.
- Success! Found 1 keys after 23 seconds
- Found key: 5c598c9c58b5
- Waiting for a response from the proxmark...
- Don't forget to cancel its operation first by pressing on the button
- Error: No response from Proxmark.
- pm3 -->
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement