Bruteforcing command codes #1
Replies: 3 comments
-
RC-S100Output from uninitialized RC-S100 (SD1): Extracted payload is RC-S120Extracted payloads from uninitialized RC-S120 (SD2):
Bytes 0 through 10 appear to be the same format as RC-S100 and the ICOCA card. Last 20 bytes appear seemingly random each invocation. |
Beta Was this translation helpful? Give feedback.
This comment has been hidden.
This comment has been hidden.
-
RC-S100 payload dissected
|
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
I wrote the following script to use Proxmark3's SWIG library to interface with my ICOCA card and bruteforce command codes, with the format of the node code list found within a
Request Servicecommand:The only command this script found was
0x3a, which can just be called using an IDm:It is still unknown what this output data is:
The last field does not match the PMm of the ICOCA:
0136428247459AFFBeta Was this translation helpful? Give feedback.
All reactions