|
下面是返回数据
proxmark3> hf 14a reader
ATQA : 00 08
UID : a3 07 44 5d
SAK : 20 [1]
TYPE : NXP MIFARE DESFire 4k | DESFire EV1 2k/4k/8k | Plus 2k/4k SL3 | JCOP 31/41
ATS : 10 78 80 a0 02 20 90 00 00 00 00 00 a3 07 44 5d 98 0b
- TL : length is 16 bytes
- T0 : TA1 is present, TB1 is present, TC1 is present, FSCI is 8 (FSC = 256)
- TA1 : different divisors are NOT supported, DR: [], DS: []
- TB1 : SFGI = 0 (SFGT = (not needed) 0/fc), FWI = 10 (FWT = 4194304/fc)
- TC1 : NAD is NOT supported, CID is supported
- HB : 20 90 00 00 00 00 00 a3 07 44 5d
Answers to chinese magic backdoor commands: NO
用100CD读的卡号4458403
之前复制过可以用于刷门禁,后来被发现升级了、一升级复制过不能用,然后我就用PM3破解,破解几个小时了连数据都读不出来
|
本帖子中包含更多资源
您需要 登录 才可以下载或查看,没有帐号?立即注册
x
|