Commit graph

1322 commits

Author SHA1 Message Date
iceman1001
6648776f2a CHG: added the possibility to "remagic" the new found Mifare Ultralight tags, which answers to chinese backdoor commands for uid change.
The script now deals with to different kind of tags.  Mifare Classic 1k gen1  and  Mifare Ultralight gen1 (7bytes uid)

-Classic will get    UID: 01 02 03 04
-Ultralight will get UID: 53 80 71 02 00 D9 80
2016-05-15 19:27:04 +02:00
iceman1001
8fd9bfb0e3 ADD: added the possiblity to use AWID formatlength of 26 and 50.
'LF AWID SIM'
 'LF AWID CLONE'
 'LF AWID BRUTE'
2016-05-14 22:40:04 +02:00
iceman1001
6a4271d186 CHG: Changed cardnumber printing from %d (signed) to %u (unsigned) for AWID50, it now prints correct in all cases. Thanks to @ntk for reminding me about it. 2016-05-14 14:34:35 +02:00
iceman1001
204b708424 ADD: AWID 50bit demod, thanks to @FrancoisM and @ntk 2016-05-13 22:34:49 +02:00
iceman1001
812513bf90 ADD: Added a new main command group "analyse", first one is the find the missing XOR in a LCR, it was a python script under /tools/xorfind.py 2016-05-10 15:30:46 +02:00
iceman1001
8085377413 CHG: output when finding key it the same as from the client. 2016-05-10 07:51:05 +02:00
iceman1001
fed1227777 CHG: just made the autopwn script main loop a bit more verbal 2016-05-10 07:40:27 +02:00
iceman1001
df82844c05 FIX: more paths for readline and Mac Os X 2016-05-06 19:52:04 +02:00
iceman1001
b01e7d206d FIX: a define which was wrong 2016-05-06 19:30:43 +02:00
iceman1001
9d590832a1 FIX: This tries to fix the memalign issued on MAC OS X, which it doesn't have. However its standard Malloc is already 16byte memaligned.
ref: http://stackoverflow.com/questions/196329/osx-lacks-memalign
2016-05-06 19:09:29 +02:00
iceman1001
0fa87186cf CHG: hardnested needs malloc.h, which on Darvin (Mac OS X) needs a path to. 2016-05-06 19:01:33 +02:00
iceman1001
e75bc417f1 ADD: added a lua script which calculates mifare keys based on a uid diversification 2016-05-06 10:19:15 +02:00
iceman1001
04da5cd92b FIX: it seem the fcntl returns -1,.. which made the flasher fail. 2016-05-05 21:13:12 +02:00
iceman1001
532bcd7145 CHG: Nedap demod, now verifes with first parity. 2016-05-04 10:34:16 +02:00
iceman1001
b85385a058 CHG: removed a warning about unused variable. Lets see if perror works. 2016-05-03 09:16:05 +02:00
iceman1001
c71f4da9bc CHG: increased the preamble
CHG:  from inverted to non-inverted. 2 of the forum samples is non-inverted.

Block 0:  00150080
2016-05-02 21:21:43 +02:00
iceman1001
d34a0b0cc7 FIX: dual definitions of variable size 2016-05-02 15:15:06 +02:00
iceman1001
96faed2124 CHG: added the ASK/Biphase demod of signal for NEDAP demod.
ADD: 'LF SEARCH'  now also checks for NEDAP.
2016-05-02 14:06:08 +02:00
iceman1001
56bbb25a41 ADD: started with a NEDAP demod, read, clone and sim functionality.
The encrypted part is not solveabled today.
2016-05-02 13:42:06 +02:00
iceman1001
ea1ee62e55 CHG: better helptext 2016-04-29 22:24:08 +02:00
iceman1001
ffeb77fdc6 CHG: the 14b is getting better, since I added the fpga waiting signaling I found in "14a emgetcmd" etc. 2016-04-29 22:23:32 +02:00
iceman1001
7bcddfabde FIX: mental note to self, don't forget to adjust messages to new logic 2016-04-27 20:03:54 +02:00
iceman1001
a644fef0bb FIX: Mental note to self, bitnumber 4 is used, not the value 4 which would be bitnumber 3... when deciding if request is REQB or WUPB 2016-04-27 19:54:29 +02:00
iceman1001
45c0c48c49 CHG: Just changed the order of printing, so the messagde FoundKey is printed last. 2016-04-27 11:22:17 +02:00
iceman1001
dccddaef77 CHG: "hf 14b sim" - Added the possibility to call it with a PUPI/UID. Sample: "hf 14b sim u 11223344" 2016-04-27 11:21:29 +02:00
iceman1001
fd3be901ea removed commented code 2016-04-26 21:30:54 +02:00
iceman1001
c98ab35140 textual change. 2016-04-26 21:30:04 +02:00
iceman1001
a420e5c163 chg; no more crash when getting partial usb packages. 2016-04-25 23:15:12 +02:00
iceman1001
ed69e099a1 FIX: @Aczid suggested this to fix a Coverity scan warning. 2016-04-25 14:30:13 +02:00
iceman1001
18b90cce48 CHG: this fixes an annoying fault of not running CONNECT in raw command... 2016-04-24 21:44:19 +02:00
iceman1001
222bdb1cb3 Syntax suger 2016-04-24 21:43:38 +02:00
iceman1001
9965e0d1f8 CHG: this should remove a Coverity Scan warning. 2016-04-24 21:42:42 +02:00
iceman1001
c0afa86f75 FIX: this commit solves a sneaky bug in 'LF VIKING' commands. The getVikingBits dropped the highest byte in the uid while creating the datablocks for the clone.
ADD:  added some extra message in debugmode when looking at viking tags.
2016-04-24 21:41:45 +02:00
iceman1001
21d359f68f CHG: we don't want to assert inside the pm3 client.
CHG: better message when failed to find the key.
CHG: revert nonces check, 12 -> 100
2016-04-23 19:09:07 +02:00
iceman1001
1c38049bcb CHG: commented away some of the debug printf statements in hardnested. 2016-04-23 18:33:27 +02:00
iceman1001
cd777a0545 FIX: Some Coverity Scan warnings. fread, not initialised etc etc 2016-04-23 18:23:46 +02:00
iceman1001
b9fc3e8eb7 RM: removed some old reference inside some old proggies... 2016-04-23 13:03:27 +02:00
iceman1001
2813c42f98 CHG: moved some params. 2016-04-23 13:02:51 +02:00
iceman1001
be6e909c5b FIX: time printing, like difftime in MINGW enviroments needs to use 32b time. 2016-04-23 13:02:20 +02:00
iceman1001
9ea10847ea CHG: timeing in chk keys, 2016-04-23 12:26:29 +02:00
iceman1001
fa0e0b109f CHG: moved out some usage_methods for help texts.
CHG: added some time in the darkside, nested, hardnested, chk commands.
2016-04-23 12:18:34 +02:00
iceman1001
5dc8b8fe27 CHG: unified some text messaged. 2016-04-23 11:43:02 +02:00
iceman1001
d948e0d140 CHG: 'hf mf chk' now correctly tests to read key B, when we specify target keytype B or ?.
CHG: 'hf mf chk'  now correctly init all sector keys to 0xFFFFFFFFFFFF,  so it looks unified.
2016-04-23 11:32:37 +02:00
iceman1001
2e350b19f7 FIX: there were no "memfree" call, there were only "free" 2016-04-21 12:15:36 +02:00
iceman1001
3130ba4b21 ADD: added @azcid 's bitsliced BF solver for @piwi 's hardnested command. Awsume work! The original patch demanded some tweaking to work in mingw.
This is not tested for other systems so far.
2016-04-21 10:26:00 +02:00
iceman1001
f7c1a934d0 CHG: "hf 14a sim" now uses mfkey32 and mfkey32_moebius as methods to retrive the key in attack_mode. 2016-04-18 13:20:17 +02:00
iceman1001
6c84c90017 FIX: this fixes the "hf mf sniff l d f" command, which has been broken for a while. The cuid is correct used for decrypting.
FIX: The flushing of logentries.
ADD: "hf mf sniff" - added the sniffing of UID's with a uidlen of 10.

Whats left? The key is not always found even if we use the "mfkey64" approach.

ADD: added the parity_zero attack in "hf mf mifare".  Still not working since piwi's changes to the iso14443a.c,  maybe needs a param to tell it to collect nonces for this special attack.
CHG: extracted some help-texts into usage_* methods. Changed some text as well

FIX:  "hf mf sim" command now uses both  mfkey32 and mfkey32_moebius version to find the key in attack mode.
CHG:  "hf mf sim" also now defaults to emul_memory to read a 4 byte UID.
2016-04-18 13:18:02 +02:00
iceman1001
cd91e41cb5 FIX: this fixes the mftry32, mftry32moebius and trymf64 implementations. Which is used in the "hf mf sim x" and "hf 14a sim x" built in attacks.
ADD: added the nonce2key version which should be able to find the key when the collected PARITIES is ZERO.
2016-04-18 13:08:18 +02:00
iceman1001
c805748f34 ADD: added a method for le32toh. Converting bytes to uint32_t .
CHG: correct use of FILE_PATH_SIZE in the tracelogging functions.
2016-04-18 13:05:35 +02:00
iceman1001
ce211cef39 FIX: corrected the FLAG_NR_AR_ATTACK 2016-04-18 13:02:36 +02:00