mirror of
https://github.com/RfidResearchGroup/proxmark3.git
synced 2025-01-20 15:13:15 +08:00
Started an experiment with lua mifare hack
This commit is contained in:
parent
96e7a3a50b
commit
3510cdff4b
1 changed files with 14 additions and 0 deletions
14
client/scripts/mifare.lua
Normal file
14
client/scripts/mifare.lua
Normal file
|
@ -0,0 +1,14 @@
|
|||
local desc = "How would the classic mifare hack look in lua? Let's find out "
|
||||
print(desc);
|
||||
|
||||
print("This script isn't even remotely finished!")
|
||||
print("Checking preconditions");
|
||||
print("core", core)
|
||||
print("core.SendCommand", core.SendCommand)
|
||||
print("core.WaitForResponseTimeout", core.WaitForResponseTimeout)
|
||||
print("core.nonce2key", core.nonce2key)
|
||||
-- To actually send something meaningful, we need to include the 'Binlib' or 'lpack' library.
|
||||
local x = core.SendCommand("aaaabbbb2222111100000ggggaaaabbbb2222111100000ggggaaaabbbb2222111100000ggggaaaabbbb2222111100000ggggaaaabbbb2222111100000ggggaaaabbbb2222111100000ggggaaaabbbb2222111100000ggggaaaabbbb2222111100000ggggaaaabbbb2222111100000ggggaaaabbbb2222111100000ggggaaaabbbb2222111100000ggggaaaabbbb2222111100000ggggaaaabbbb2222111100000ggggaaaabbbb2222111100000ggggaaaabbbb2222111100000ggggaaaabbbb2222111100000ggggaaaabbbb2222111100000ggggaaaabbbb2222111100000ggggaaaabbbb2222111100000ggggaaaabbbb2222111100000gggg12345678901234567890123456789012345678901234")
|
||||
local result = core.WaitForResponseTimeout(0x0611,1000)
|
||||
--- Oh, and nonce2Key is not 'glued' yet.
|
||||
print("err", result)
|
Loading…
Reference in a new issue