mirror of
https://github.com/RfidResearchGroup/proxmark3.git
synced 2025-01-13 11:40:02 +08:00
Merge pull request #47 from bogiton/master
BogRun bug fix + helper lua script
This commit is contained in:
commit
16929bad69
2 changed files with 101 additions and 4 deletions
|
@ -15,7 +15,8 @@ The retrieved sniffing session can be acquired by connecting the device
|
||||||
to a client that supports the reconnect capability and issue 'hf 14a list'.
|
to a client that supports the reconnect capability and issue 'hf 14a list'.
|
||||||
|
|
||||||
In order to view the grabbed authentication attempts in the flash mem,
|
In order to view the grabbed authentication attempts in the flash mem,
|
||||||
you can simply 'mem read l 256' from the client to view the stored quadlets.
|
you can simply run 'script run read_pwd_mem' or just 'mem read l 256'
|
||||||
|
from the client to view the stored quadlets.
|
||||||
*/
|
*/
|
||||||
|
|
||||||
#include "hf_bog.h"
|
#include "hf_bog.h"
|
||||||
|
@ -31,7 +32,7 @@ uint8_t FindOffsetInFlash() {
|
||||||
uint8_t eom[4] = { 0xFF, 0xFF, 0xFF, 0xFF };
|
uint8_t eom[4] = { 0xFF, 0xFF, 0xFF, 0xFF };
|
||||||
uint8_t memcnt = 0;
|
uint8_t memcnt = 0;
|
||||||
|
|
||||||
while (memcnt < 4096)
|
while (memcnt < 0xFF)
|
||||||
{
|
{
|
||||||
Flash_ReadData(memcnt, mem, 4);
|
Flash_ReadData(memcnt, mem, 4);
|
||||||
if (memcmp(mem, eom, 4) == 0) {
|
if (memcmp(mem, eom, 4) == 0) {
|
||||||
|
@ -238,10 +239,20 @@ void RAMFUNC SniffAndStore(uint8_t param) {
|
||||||
uint8_t memoffset = FindOffsetInFlash();
|
uint8_t memoffset = FindOffsetInFlash();
|
||||||
if (MF_DBGLEVEL > 1) Dbprintf("[!] Memory offset = %u", memoffset);
|
if (MF_DBGLEVEL > 1) Dbprintf("[!] Memory offset = %u", memoffset);
|
||||||
|
|
||||||
|
if ((memoffset + 4 * auth_attempts) > 0xFF)
|
||||||
|
{
|
||||||
|
// We opt to keep the new data only
|
||||||
|
memoffset = 0;
|
||||||
|
if (MF_DBGLEVEL > 1) Dbprintf("[!] Size of total data > 256 bytes. Discarding the old data.");
|
||||||
|
}
|
||||||
|
|
||||||
// Get previous data from flash mem
|
// Get previous data from flash mem
|
||||||
uint8_t *previousdata = BigBuf_malloc(memoffset);
|
uint8_t *previousdata = BigBuf_malloc(memoffset);
|
||||||
uint16_t readlen = Flash_ReadData(0, previousdata, memoffset);
|
if (memoffset > 0)
|
||||||
if (MF_DBGLEVEL > 1) Dbprintf("[!] Read %u bytes from flash mem", readlen);
|
{
|
||||||
|
uint16_t readlen = Flash_ReadData(0, previousdata, memoffset);
|
||||||
|
if (MF_DBGLEVEL > 1) Dbprintf("[!] Read %u bytes from flash mem", readlen);
|
||||||
|
}
|
||||||
|
|
||||||
// create new bigbuf to hold all data
|
// create new bigbuf to hold all data
|
||||||
size_t total_size = memoffset + 4 * auth_attempts;
|
size_t total_size = memoffset + 4 * auth_attempts;
|
||||||
|
|
86
client/scripts/read_pwd_mem.lua
Normal file
86
client/scripts/read_pwd_mem.lua
Normal file
|
@ -0,0 +1,86 @@
|
||||||
|
local getopt = require('getopt')
|
||||||
|
local bin = require('bin')
|
||||||
|
|
||||||
|
author = "Bogito"
|
||||||
|
version = 'v1.0.0'
|
||||||
|
desc =[[
|
||||||
|
This script will read the flash memory of RDV4 and print the stored passwords.
|
||||||
|
It was meant to be used as a help tool after using the BogRun standalone mode.
|
||||||
|
]]
|
||||||
|
usage = [[
|
||||||
|
Usage:
|
||||||
|
script run read_pwd_mem -h -o <offset> -l <length>
|
||||||
|
|
||||||
|
Arguments:
|
||||||
|
-h : this help
|
||||||
|
-o <OFFSET> : Memory offset. Default is 0.
|
||||||
|
-l <LENGTH> : Length in bytes. Default is 256.
|
||||||
|
]]
|
||||||
|
example =[[
|
||||||
|
Examples:
|
||||||
|
-- This will scan the first 256 bytes of flash memory for stored passwords
|
||||||
|
script run read_pwd_mem
|
||||||
|
|
||||||
|
-- This will scan 256 bytes of flash memory at offset 64 for stored passwords
|
||||||
|
script run read_pwd_mem -o 64
|
||||||
|
|
||||||
|
-- This will scan 32 bytes of flash memory at offset 64 for stored passwords
|
||||||
|
script run read_pwd_mem -o 64 -l 32
|
||||||
|
]]
|
||||||
|
|
||||||
|
-- Usage help
|
||||||
|
local function help()
|
||||||
|
print(desc)
|
||||||
|
print(usage)
|
||||||
|
print(example)
|
||||||
|
end
|
||||||
|
|
||||||
|
local function main(args)
|
||||||
|
|
||||||
|
local data, err, quadlet, pwdcnt
|
||||||
|
local offset = 0
|
||||||
|
local length = 256
|
||||||
|
|
||||||
|
-- Read the parameters
|
||||||
|
for o, a in getopt.getopt(args, 'ho:l:') do
|
||||||
|
if o == "h" then return help() end
|
||||||
|
if o == "o" then offset = tonumber(a) end
|
||||||
|
if o == "l" then length = tonumber(a) end
|
||||||
|
end
|
||||||
|
|
||||||
|
if length < 0 or length > 256 then
|
||||||
|
return print('Error: Length is not valid. Must be less than 256')
|
||||||
|
end
|
||||||
|
|
||||||
|
if ((offset < 0) or (offset % 4 ~= 0)) then
|
||||||
|
return print('Error: Offset is not valid. Mod-4 values are only allowed.')
|
||||||
|
end
|
||||||
|
|
||||||
|
print('Offset: ' .. offset)
|
||||||
|
print('Length: ' .. length)
|
||||||
|
print()
|
||||||
|
|
||||||
|
data, err = core.GetFromFlashMem(offset, length)
|
||||||
|
|
||||||
|
if err then
|
||||||
|
print(err)
|
||||||
|
return
|
||||||
|
end
|
||||||
|
|
||||||
|
local count, s = bin.unpack('H'..length, data)
|
||||||
|
|
||||||
|
pwdcnt = 0
|
||||||
|
for i = 1,(length/4),1
|
||||||
|
do
|
||||||
|
quadlet = string.sub(s, (i-1)*8+1, i*8)
|
||||||
|
if quadlet == "FFFFFFFF" then break end
|
||||||
|
print(string.format("[%02d]",i) .. ' ' .. quadlet)
|
||||||
|
pwdcnt = pwdcnt + 1
|
||||||
|
|
||||||
|
end
|
||||||
|
print()
|
||||||
|
print('Found passwords: ' .. pwdcnt)
|
||||||
|
|
||||||
|
end
|
||||||
|
|
||||||
|
main(args)
|
Loading…
Reference in a new issue