iceman1001
4e915d2eb4
chg: prng detection now takes in consideration if detection fails.
2018-02-20 21:20:17 +01:00
iceman1001
fb4b3502ef
fix: 'script run mifare_autopwn.lua' - wrong bool comparision
2018-02-07 23:54:11 +01:00
iceman1001
a13ecc4a4e
CHG: applied https://github.com/Proxmark/proxmark3/pull/553 (@arnie97) and in some more places
2018-01-25 09:51:49 +01:00
iceman1001
453831268a
chg: 'script run mifare_autopwn' - when used with -k parameter, exit after one run.
2017-12-12 20:07:02 +01:00
iceman1001
8fbea68295
fix: 'script run mifare_autopwn' - out of context,...
2017-12-10 09:25:26 +01:00
iceman1001
97137b80df
chg: 'script run mifare_autopwn' - forgot a lib
2017-12-10 09:07:35 +01:00
iceman1001
79494182cd
chg: 'script run mifare_autopwn' - added a option to use a key.
2017-12-10 09:05:30 +01:00
iceman1001
3c2fa8d4f3
chg: better text
2017-07-31 15:58:14 +02:00
iceman1001
6df9012de5
chg: 'script run mifare_autopwn' added the prng_test, to make sure it only attacks weak cards.
2017-07-31 15:53:26 +02:00
iceman1001
a8569849d6
part of monstermerge..
2017-07-27 20:58:59 +02:00
iceman1001
b149fdc67b
FIX: 'script run mifare_autopwn' some print statements
...
FIX: 'script run mfkeys' correct author, added copyright
2017-07-24 13:00:40 +02:00
iceman1001
100fe0a5ee
textual suger
2016-10-19 21:26:56 +02:00
iceman1001
b62cbadb61
CHG: fixes to match the new arguments to the darkside attack (keytype A|B and blocknumber) in mifare_autopwn.lua script.
2016-08-07 21:19:11 +02:00
iceman1001
8085377413
CHG: output when finding key it the same as from the client.
2016-05-10 07:51:05 +02:00
iceman1001
fed1227777
CHG: just made the autopwn script main loop a bit more verbal
2016-05-10 07:40:27 +02:00
iceman1001
3bc7b13d23
ADD: @marshmellow42's decrypt crypto-1 method,
...
ADD: @piwi's latest commit to PM3 Master, aiming at the WDR in "hf mf mifare".
2015-10-11 09:07:29 +02:00
iceman1001
0de8e3874d
A lot of changes...
...
.. ntag simulation stuff from @marshmellows branch "ntag/sim"
.. hf mf mifare fixes from @pwpivi.
.. hw status command
.. speedtest function from @pwpivi
.. Viking Functionalities, (not a proper DEMOD, but a start)
.. GetCountUS better precision from @pwpivi
.. bin2hex, hex2bin from @holiman
...
starting with getting the T55x7 CONFIGURATION_BLOCK for different clone situations. Ripped from Adam Lauries RFidler, nothing working or finished..
...
Started working with the T55x7 read command with password actually performs a write block... See Issue #136 https://github.com/Proxmark/proxmark3/issues/136 Not solved yet.
...
Started add SHA256.. not working yet..
2015-10-04 18:01:33 +02:00
iceman1001
7838f4beba
MERGED: @holimans changes
...
MERGED: @piwi changes
MERGED: @marshmellows changes.
I'm not even gonna try write up all that stuff..
ADD: changed some commands inside the "Hf 14a sim" on deviceside.
ADD: @mobeius "two nonce" version for mfkey32. It is also inside the "hf 14a sim" with the "x" parameter.
2015-07-22 23:00:52 +02:00
iceman1001
c15d2bdc9b
ADD: added identification for Mifare TNP3xxx tags.
...
ADD: MD5-lua functionality
ADD: AES 128 decrypt lua functionality
ADD: test luc script for reading TNP3xxx tags
CHG: testing some changes for "hf 14b sim" / "lf em4x 410xsim"
2014-11-03 13:49:19 +01:00
martin.holst@gmail.com
51defdd4a2
Fixed issue where the 'nested'-part of autopwn only used 16 sectors, not bothering with the rest
2013-10-09 19:37:55 +00:00
martin.holst@gmail.com
b969713989
Fixed error with mifare_autopwn where keys were reversed, see http://www.proxmark.org/forum/viewtopic.php?pid=8494#p8494
2013-10-09 19:08:17 +00:00
martin.holst@gmail.com
0dae56d81e
Committed mifare_autopwn.lua. For more infromation, see http://martin.swende.se/blog/Proxmark_Scripting_1.html and http://martin.swende.se/blog/Proxmark_Scripting_2.html
2013-10-08 18:50:54 +00:00