2018-01-16 23:54:54 +08:00
|
|
|
//-----------------------------------------------------------------------------
|
|
|
|
// Merlok - 2012
|
|
|
|
//
|
|
|
|
// This code is licensed to you under the terms of the GNU GPL, version 2 or,
|
|
|
|
// at your option, any later version. See the LICENSE.txt file for the text of
|
|
|
|
// the license.
|
|
|
|
//-----------------------------------------------------------------------------
|
|
|
|
// Routines to support mifare classic sniffer.
|
|
|
|
//-----------------------------------------------------------------------------
|
|
|
|
|
|
|
|
#include "mifaresniff.h"
|
|
|
|
#include "apps.h"
|
|
|
|
#include "proxmark3.h"
|
|
|
|
#include "util.h"
|
|
|
|
#include "string.h"
|
|
|
|
#include "iso14443crc.h"
|
|
|
|
#include "iso14443a.h"
|
|
|
|
#include "crapto1/crapto1.h"
|
|
|
|
#include "mifareutil.h"
|
|
|
|
#include "common.h"
|
|
|
|
|
|
|
|
|
|
|
|
static int sniffState = SNF_INIT;
|
|
|
|
static uint8_t sniffUIDType;
|
|
|
|
static uint8_t sniffUID[8] = {0x00};
|
|
|
|
static uint8_t sniffATQA[2] = {0x00};
|
|
|
|
static uint8_t sniffSAK;
|
|
|
|
static uint8_t sniffBuf[16] = {0x00};
|
|
|
|
static uint32_t timerData = 0;
|
|
|
|
|
|
|
|
|
|
|
|
bool MfSniffInit(void){
|
|
|
|
memset(sniffUID, 0x00, 8);
|
|
|
|
memset(sniffATQA, 0x00, 2);
|
|
|
|
sniffSAK = 0;
|
|
|
|
sniffUIDType = SNF_UID_4;
|
|
|
|
|
|
|
|
return FALSE;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool MfSniffEnd(void){
|
|
|
|
LED_B_ON();
|
|
|
|
cmd_send(CMD_ACK,0,0,0,0,0);
|
|
|
|
LED_B_OFF();
|
|
|
|
|
|
|
|
return FALSE;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool RAMFUNC MfSniffLogic(const uint8_t *data, uint16_t len, uint8_t *parity, uint16_t bitCnt, bool reader) {
|
|
|
|
|
|
|
|
if (reader && (len == 1) && (bitCnt == 7)) { // reset on 7-Bit commands from reader
|
|
|
|
sniffState = SNF_INIT;
|
|
|
|
}
|
|
|
|
|
|
|
|
switch (sniffState) {
|
|
|
|
case SNF_INIT:{
|
|
|
|
if ((len == 1) && (reader) && (bitCnt == 7) ) { // REQA or WUPA from reader
|
|
|
|
sniffUIDType = SNF_UID_4;
|
|
|
|
memset(sniffUID, 0x00, 8);
|
|
|
|
memset(sniffATQA, 0x00, 2);
|
|
|
|
sniffSAK = 0;
|
2018-01-17 21:48:01 +08:00
|
|
|
sniffState = SNF_ATQA;
|
2018-01-17 22:01:56 +08:00
|
|
|
if (data[0] == 0x40)
|
|
|
|
sniffState = SNF_MAGIC_WUPC2;
|
2018-01-16 23:54:54 +08:00
|
|
|
}
|
|
|
|
break;
|
|
|
|
}
|
2018-01-17 22:01:56 +08:00
|
|
|
case SNF_MAGIC_WUPC2:
|
|
|
|
if ((len == 1) && (reader) && (data[0] == 0x43) ) {
|
|
|
|
sniffState = SNF_CARD_IDLE;
|
|
|
|
}
|
|
|
|
break;
|
2018-01-17 21:48:01 +08:00
|
|
|
case SNF_ATQA:{
|
2018-01-16 23:54:54 +08:00
|
|
|
if ((!reader) && (len == 2)) { // ATQA from tag
|
|
|
|
memcpy(sniffATQA, data, 2);
|
2018-01-17 21:48:01 +08:00
|
|
|
sniffState = SNF_UID1;
|
2018-01-16 23:54:54 +08:00
|
|
|
}
|
|
|
|
break;
|
|
|
|
}
|
2012-07-11 23:52:33 +08:00
|
|
|
case SNF_UID1:{
|
2014-02-20 04:35:04 +08:00
|
|
|
if ((reader) && (len == 9) && (data[0] == 0x93) && (data[1] == 0x70) && (CheckCrc14443(CRC_14443_A, data, 9))) { // Select 4 Byte UID from reader
|
2018-01-16 23:54:54 +08:00
|
|
|
memcpy(sniffUID + 3, &data[2], 4);
|
2012-07-11 23:52:33 +08:00
|
|
|
sniffState = SNF_SAK;
|
|
|
|
}
|
2018-01-16 23:54:54 +08:00
|
|
|
break;
|
2012-07-11 23:52:33 +08:00
|
|
|
}
|
2018-01-16 23:54:54 +08:00
|
|
|
case SNF_SAK:{
|
|
|
|
if ((!reader) && (len == 3) && (CheckCrc14443(CRC_14443_A, data, 3))) { // SAK from card?
|
|
|
|
sniffSAK = data[0];
|
|
|
|
if ((sniffUID[3] == 0x88) && (sniffUIDType == SNF_UID_4)) { // CL2 UID part to be expected
|
|
|
|
sniffUIDType = SNF_UID_7;
|
|
|
|
memcpy(sniffUID, sniffUID + 4, 3);
|
|
|
|
sniffState = SNF_UID2;
|
|
|
|
} else { // select completed
|
|
|
|
sniffState = SNF_CARD_IDLE;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
}
|
2012-07-11 23:52:33 +08:00
|
|
|
case SNF_UID2:{
|
2018-01-16 23:54:54 +08:00
|
|
|
if ((reader) && (len == 9) && (data[0] == 0x95) && (data[1] == 0x70) && (CheckCrc14443(CRC_14443_A, data, 9))) {
|
|
|
|
memcpy(sniffUID + 3, &data[2], 4);
|
2012-07-11 23:52:33 +08:00
|
|
|
sniffState = SNF_SAK;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
}
|
2018-01-16 23:54:54 +08:00
|
|
|
case SNF_CARD_IDLE:{ // trace the card select sequence
|
|
|
|
sniffBuf[0] = 0xFF;
|
|
|
|
sniffBuf[1] = 0xFF;
|
|
|
|
memcpy(sniffBuf + 2, sniffUID, 7);
|
|
|
|
memcpy(sniffBuf + 9, sniffATQA, 2);
|
|
|
|
sniffBuf[11] = sniffSAK;
|
|
|
|
sniffBuf[12] = 0xFF;
|
|
|
|
sniffBuf[13] = 0xFF;
|
|
|
|
LogTrace(sniffBuf, 14, 0, 0, NULL, TRUE);
|
|
|
|
sniffState = SNF_CARD_CMD;
|
|
|
|
} // intentionally no break;
|
|
|
|
case SNF_CARD_CMD:{
|
2018-02-09 22:50:55 +08:00
|
|
|
LogTrace(data, len, 0, 0, parity, reader);
|
2018-01-16 23:54:54 +08:00
|
|
|
timerData = GetTickCount();
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
default:
|
|
|
|
sniffState = SNF_INIT;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
return FALSE;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool RAMFUNC MfSniffSend(uint16_t maxTimeoutMs) {
|
|
|
|
if (BigBuf_get_traceLen() && (GetTickCount() > timerData + maxTimeoutMs)) {
|
|
|
|
return intMfSniffSend();
|
|
|
|
}
|
|
|
|
return FALSE;
|
|
|
|
}
|
|
|
|
|
|
|
|
// internal sending function. not a RAMFUNC.
|
|
|
|
bool intMfSniffSend() {
|
|
|
|
|
|
|
|
int pckSize = 0;
|
|
|
|
int pckLen = BigBuf_get_traceLen();
|
|
|
|
int pckNum = 0;
|
|
|
|
uint8_t *trace = BigBuf_get_addr();
|
|
|
|
|
|
|
|
FpgaDisableSscDma();
|
|
|
|
while (pckLen > 0) {
|
|
|
|
pckSize = MIN(USB_CMD_DATA_SIZE, pckLen);
|
|
|
|
LED_B_ON();
|
|
|
|
cmd_send(CMD_ACK, 1, BigBuf_get_traceLen(), pckSize, trace + BigBuf_get_traceLen() - pckLen, pckSize);
|
|
|
|
LED_B_OFF();
|
|
|
|
|
|
|
|
pckLen -= pckSize;
|
|
|
|
pckNum++;
|
|
|
|
}
|
|
|
|
|
|
|
|
LED_B_ON();
|
|
|
|
cmd_send(CMD_ACK,2,0,0,0,0);
|
|
|
|
LED_B_OFF();
|
|
|
|
|
|
|
|
clear_trace();
|
|
|
|
|
|
|
|
return TRUE;
|
|
|
|
}
|