mirror of
https://github.com/RfidResearchGroup/proxmark3.git
synced 2025-03-20 20:18:17 +08:00
ADD: a CmdEM410xWatchnSpoof in cmdlfem4x.c , looks for a tag, then replays it.
minor code clean up.
This commit is contained in:
parent
1d660bb993
commit
3de045905f
4 changed files with 3 additions and 9 deletions
|
@ -587,7 +587,7 @@ void MifareNested(uint32_t arg0, uint32_t arg1, uint32_t calibrate, uint8_t *dat
|
|||
};
|
||||
|
||||
nttmp = prng_successor(nt1, 100); //NXP Mifare is typical around 840,but for some unlicensed/compatible mifare card this can be 160
|
||||
for (i = 141; i < 1200; i++) {
|
||||
for (i = 101; i < 1200; i++) {
|
||||
nttmp = prng_successor(nttmp, 1);
|
||||
if (nttmp == nt2) break;
|
||||
}
|
||||
|
|
|
@ -19,7 +19,7 @@
|
|||
#include "crapto1.h"
|
||||
#include "mifareutil.h"
|
||||
|
||||
int MF_DBGLEVEL = MF_DBG_ERROR;
|
||||
int MF_DBGLEVEL = MF_DBG_ALL;
|
||||
|
||||
// memory management
|
||||
uint8_t* get_bigbufptr_recvrespbuf(void) {
|
||||
|
|
|
@ -278,14 +278,7 @@ int CmdHF14AMfDump(const char *Cmd)
|
|||
|
||||
UsbCommand resp;
|
||||
|
||||
int size = GetCardSize();
|
||||
char cmdp = param_getchar(Cmd, 0);
|
||||
|
||||
if ( size > -1)
|
||||
cmdp = (char)(48+size);
|
||||
|
||||
PrintAndLog("Got %d",cmdp);
|
||||
|
||||
switch (cmdp) {
|
||||
case '0' : numSectors = 5; break;
|
||||
case '1' :
|
||||
|
|
|
@ -16,6 +16,7 @@ int CmdEMdemodASK(const char *Cmd);
|
|||
int CmdEM410xRead(const char *Cmd);
|
||||
int CmdEM410xSim(const char *Cmd);
|
||||
int CmdEM410xWatch(const char *Cmd);
|
||||
int CmdEM410xWatchnSpoof(const char *Cmd);
|
||||
int CmdEM410xWrite(const char *Cmd);
|
||||
int CmdEM4x50Read(const char *Cmd);
|
||||
int CmdReadWord(const char *Cmd);
|
||||
|
|
Loading…
Add table
Reference in a new issue