mirror of
https://github.com/RfidResearchGroup/proxmark3.git
synced 2024-11-10 17:49:32 +08:00
Returned plain commands for USCUID kinds
This commit is contained in:
parent
adc069789a
commit
dc92ebadcd
1 changed files with 49 additions and 11 deletions
|
@ -1045,7 +1045,13 @@ hf mf info
|
|||
|
||||
^[Top](#top)
|
||||
|
||||
* Commands described under the corresponding section of USCUID chip
|
||||
* Magic wakeup: `20(7)`, `23`
|
||||
* Backdoor read main block: `30xx+crc`
|
||||
* Backdoor write main block: `A0xx+crc`, `[16 bytes data]+crc`
|
||||
* Read hidden block: `38xx+crc`
|
||||
* Write hidden block: `A8xx+crc`, `[16 bytes data]+crc`
|
||||
* Read configuration: `E000+crc`
|
||||
* Write configuration: `E100+crc`
|
||||
* Example of changing block 0 after the personalization:
|
||||
|
||||
```
|
||||
|
@ -1131,12 +1137,16 @@ Before the sealing could be detected from the config block value.
|
|||
|
||||
^[Top](#top)
|
||||
|
||||
All commands are available before sealing.
|
||||
All commands are available before sealing. After the sealing acts as a Mifare Classic 1K tag.
|
||||
|
||||
* Proxmark3 magic Gen1 commands
|
||||
* Proxmark3 magic Gen4 GDM commands
|
||||
|
||||
Example of the sealing, performed by Chinese copiers in raw commands:
|
||||
* Magic wakeup: `40(7)`, `43`
|
||||
* Backdoor read main block: `30xx+crc`
|
||||
* Backdoor write main block: `A0xx+crc`, `[16 bytes data]+crc`
|
||||
* Read hidden block: `38xx+crc`
|
||||
* Write hidden block: `A8xx+crc`, `[16 bytes data]+crc`
|
||||
* Read configuration: `E000+crc`
|
||||
* Write configuration: `E100+crc`
|
||||
* Example of the sealing, performed by Chinese copiers in raw commands:
|
||||
|
||||
```
|
||||
hf 14a raw -a -k -b 7 40
|
||||
|
@ -1199,14 +1209,14 @@ Could be detected from the config block value.
|
|||
|
||||
```
|
||||
[usb] pm3 --> hf mf gdmcfg --gen1a
|
||||
[+] Config... 7A FF 00 00 00 00 00 00 BA FA 00 00 00 00 00 08
|
||||
[+] Config... 7A FF 00 00 00 00 00 00 00 00 00 00 00 00 00 08
|
||||
[+] 7A FF .......................................... Magic wakeup enabled with GDM config block access
|
||||
[+] 00 ....................................... Magic wakeup style Gen1a 40(7)/43
|
||||
[+] 00 00 00 .............................. Unknown
|
||||
[+] 00 ........................... Key B use allowed when readable by ACL
|
||||
[+] 00 ........................ Block 0 Direct Write Disabled (CUID)
|
||||
[+] BA ..................... Unknown
|
||||
[+] FA .................. MFC EV1 personalization: 4B UID from Block 0
|
||||
[+] 00 ..................... Unknown
|
||||
[+] 00 .................. MFC EV1 personalization: 4B UID from Block 0
|
||||
[+] 00 ............... Shadow mode disabled
|
||||
[+] 00 ............. Magic auth disabled
|
||||
[+] 00 ........... Static encrypted nonce disabled
|
||||
|
@ -1219,8 +1229,13 @@ Could be detected from the config block value.
|
|||
|
||||
^[Top](#top)
|
||||
|
||||
* Proxmark3 magic Gen1 commands
|
||||
* Proxmark3 magic Gen4 GDM commands
|
||||
* Magic wakeup: `40(7)`, `43`
|
||||
* Backdoor read main block: `30xx+crc`
|
||||
* Backdoor write main block: `A0xx+crc`, `[16 bytes data]+crc`
|
||||
* Read hidden block: `38xx+crc`
|
||||
* Write hidden block: `A8xx+crc`, `[16 bytes data]+crc`
|
||||
* Read configuration: `E000+crc`
|
||||
* Write configuration: `E100+crc`
|
||||
|
||||
### Proxmark3 commands
|
||||
|
||||
|
@ -1244,6 +1259,9 @@ Could be detected from the config block value.
|
|||
|
||||
The tag has a shadow mode, which means that every change to normal MFC memory would be restored back from the persistent memory after being off RFID field.
|
||||
|
||||
* Other names:
|
||||
* GDMIC
|
||||
|
||||
### Characteristics
|
||||
|
||||
^[Top](#top)
|
||||
|
@ -1287,6 +1305,16 @@ Could be manually validated with the configuration block value.
|
|||
[+] 08 ... SAK
|
||||
```
|
||||
|
||||
### Commands
|
||||
|
||||
^[Top](#top)
|
||||
|
||||
* Magic authentication: select, `8000+crc`, `[Crypto1 Auth: 000000000000]`
|
||||
* Backdoor read: `38xx+crc`
|
||||
* Backdoor write: `A8xx+crc`, `[16 bytes data]+crc`
|
||||
* Read configuration: `E000+crc`
|
||||
* Write configuration: `E100+crc`; `[16 bytes data]+crc`
|
||||
|
||||
### Proxmark3 commands
|
||||
|
||||
^[Top](#top)
|
||||
|
@ -1346,6 +1374,16 @@ Could be manually validated with the configuration block value.
|
|||
[+] 08 ... SAK
|
||||
```
|
||||
|
||||
### Commands
|
||||
|
||||
^[Top](#top)
|
||||
|
||||
* Magic authentication: select, `8000+crc`, `[Crypto1 Auth: 000000000000]`
|
||||
* Backdoor read: `38xx+crc`
|
||||
* Backdoor write: `A8xx+crc`, `[16 bytes data]+crc`
|
||||
* Read configuration: `E000+crc`
|
||||
* Write configuration: `E100+crc`; `[16 bytes data]+crc`
|
||||
|
||||
### Proxmark3 commands
|
||||
|
||||
^[Top](#top)
|
||||
|
|
Loading…
Reference in a new issue