Commit graph

2209 commits

Author SHA1 Message Date
iceman1001 63a1d80130 FIX: the underlaying bug on deviceside code. The SSPCLOCK wasn't reset to zero sometimes. More specific, TC2 wasn't reset cause all sorts of timing issues for the device side randomly. Like 'hf mf mifare', like iclass, like 'hf mf sim' etc etc. 2016-08-24 12:37:31 +02:00
iceman1001 a1ab594e24 CHG: change the number of calls to prng_successor was done. Fewer should mean faster :) 2016-08-24 12:35:24 +02:00
iceman1001 f38cfd6693 CHG: fixed the collapsing comments when opening this file in notepad++ Need spaces between // text or /* ... 2016-08-24 12:34:34 +02:00
iceman1001 4c44d88500 REM: removed an test function 2016-08-24 12:32:43 +02:00
iceman1001 02d5a58388 CHG: Changed the number of times the call to prng_successor is called. 2016-08-24 12:32:05 +02:00
iceman1001 39d43ccc21 CHG: syntax suger. 2016-08-24 12:31:09 +02:00
iceman1001 2c9e30908c CHG: updated Reveng version from 1.4.0 -> 1.4.4 .
---snippet from their update log:

1.4.4 27 July 2016

    Added 5 new algorithms, CRC-8/AUTOSAR, CRC-8/OPENSAFETY, CRC-16/OPENSAFETY-A, CRC-16/OPENSAFETY-B and CRC-32/AUTOSAR from the CRC Catalogue.
    Added a build option to verify the order of the preset and alias tables at compile time.

1.4.3 14 July 2016

    Added algorithm CRC-16/CMS from the CRC Catalogue.

1.4.2 8 July 2016

    Added algorithm CRC-16/PROFIBUS from the CRC Catalogue.

1.4.1a 29 June 2016

    Fixed a regression that caused the Windows release to crash on older systems.

1.4.1 27 June 2016

    -P sets the Width value just like -k.
    pcmp() quickly returns when the comparands are identical.
    Added resources for the Windows executable.
2016-08-21 20:51:29 +02:00
iceman1001 bc908d8f9d ADD: Mifare Desfire defines 2016-08-14 17:38:54 +02:00
iceman1001 af17926620 chg; syntax suger 2016-08-14 17:38:11 +02:00
iceman1001 f2abf6732b help text adjustments 2016-08-14 17:11:42 +02:00
iceman1001 ab74872d40 ADD: added a sanity check in T55x7 commands info/trace/detect against useing the commands when device is in offline but user didn't use '1' in arguments. 2016-08-14 17:04:40 +02:00
iceman1001 7e08450dcc add: annotage Mifare Desfire. from 3102c1bae3 (diff-93cfa90a992ea759349344d0de98029e)
Thanks @johannesStoye
2016-08-14 16:29:39 +02:00
iceman1001 2b6ffe75a8 chg: remove a char.. 2016-08-10 16:29:23 +02:00
iceman1001 4ab54914e3 CHG: more struct errors.. my bad, 2016-08-10 16:28:23 +02:00
iceman1001 31cf804877 CHG: removed some debug statements, added another. Change the crapto1.c, lets see if the special attack works better now against chinese clones. 2016-08-10 16:25:56 +02:00
iceman1001 823ad2e186 CHG: minor code cleaning in 'hf 14a reader' 2016-08-10 16:24:49 +02:00
iceman1001 56f1aaa234 CHG: on a slow usb connection it seems the pingcmd which stops the bruteforce on deviceside doesnt get there. Lets send three pings to make sure the device gets it. 2016-08-10 16:23:59 +02:00
iceman1001 6067df30c5 FIX: at least now the special zero parity attack, repeats and doesn't crash. However it doesn't find the key either :( 2016-08-10 10:55:29 +02:00
iceman1001 86db8973b0 CHG; still looking at 14b, this time started to look at the tracelog times not working. 2016-08-09 23:13:18 +02:00
iceman1001 59e933fc3f started fixing the paritiy == 0 special attack against chinese clones with bad prng, which hasnt been working for ages. 2016-08-09 23:11:07 +02:00
iceman1001 05442fa6f7 fix: wrong spelling 2016-08-09 12:15:26 +02:00
iceman1001 f5291a6ce1 FIX: Travis CI complains about missing stdbool.h includes 2016-08-09 12:11:11 +02:00
iceman1001 10c4231ec7 ADD: 'lf awid brute' is now possible to give a starting cardnumber. if given, the bruteforce loops from it as a mid point. Testing one step up, then one step down until it reaches 65535 and 0.
CHG: 'lf awid brute' inputs are now changed, take notice to new format.
2016-08-09 11:56:06 +02:00
iceman1001 3d4207f3b6 syntax suger
chg:  added clearCommandBuffer(); before calls to sendcommand.
2016-08-09 09:12:16 +02:00
iceman1001 8a5b3c2a45 CHG: textual fixes in help text
CHG: better exit message for 'lf awid bruteforce'
2016-08-09 09:10:26 +02:00
iceman1001 9bfd93ec15 FIX: delay was parsed incorrect into a uint8_t...
CHG: help text fixed
2016-08-08 22:17:15 +02:00
iceman1001 934dfd728d ADD: Added a delay in ms to 'lf awid brute' Thanks to @crayon for the idea. 2016-08-08 22:09:51 +02:00
iceman1001 471f89b8bd FIX: the cmdline parsing was a bit too hard. Thanks to @crayon for pointing out there were a bug here. 2016-08-08 21:27:53 +02:00
iceman1001 7c030a9185 layouts. 2016-08-08 19:02:46 +02:00
iceman1001 9fe46b6967 even more.. 2016-08-08 19:00:53 +02:00
iceman1001 d233b62911 more layout 2016-08-08 19:00:09 +02:00
iceman1001 76fc721913 correcting the layout... 2016-08-08 18:58:05 +02:00
iceman1001 f3c2458aa6 textual changes. 2016-08-08 18:51:34 +02:00
iceman1001 185d675b4a CHG: added the libncurses5-dev instruction for COMPILING.txt
CHG: updated the readme with latest changes from changelog
2016-08-08 18:07:36 +02:00
iceman1001 a238bed07a textual changes 2016-08-08 17:56:04 +02:00
iceman1001 d9ed4e1914 ADD: J-Run's 2nd phase tool mf_key_brute ref: https://github.com/J-Run/mf_key_brute Estimated time to search keyspace is ~18min.
J_Run's 2nd phase of multiple sector nested authentication key recovery
You have a known 4 last bytes of a key recovered with mf_nonce_brute tool.
First 2 bytes of key will be bruteforced

Usage:  hf mf keybrute [h] <block number> <A|B> <key>
options:
      h               this help
      <block number>  target block number
      <A|B>           target key type
      <key>           candidate key from mf_nonce_brute tool
samples:
           hf mf keybrute 1 A 000011223344
2016-08-08 17:49:30 +02:00
iceman1001 e55eda39cd Merge branch 'master' of https://github.com/iceman1001/proxmark3 2016-08-08 07:46:12 +02:00
Iceman 07b9e98970 Merge pull request #21 from alexgrin/iceman_master
FIX: erroneous semicolon
2016-08-08 07:43:26 +02:00
Alexis Green 170e7c9c51 FIX: erroneous semicolon 2016-08-07 20:07:25 -07:00
iceman1001 c2df2883f8 fix: forgot something small.. sloppy. 2016-08-07 22:15:35 +02:00
iceman1001 29f8c2cc15 ADD: added the 'max frame size' parameter set, valid sizes: 16|24|32|40|48|64|96|128|256
it can be verified by setting debuglevel to 3 or more.
2016-08-07 22:05:10 +02:00
iceman1001 b62cbadb61 CHG: fixes to match the new arguments to the darkside attack (keytype A|B and blocknumber) in mifare_autopwn.lua script. 2016-08-07 21:19:11 +02:00
iceman1001 16658b1ff1 CHG: moved some TEA crypto stuff from 14b into analyse. 2016-08-07 21:08:17 +02:00
iceman1001 5def0b3c74 CHG: increased the script-filename column width from 16 to 21. 2016-08-07 21:05:09 +02:00
iceman1001 a152dea7b4 textual changes. 2016-08-07 18:50:25 +02:00
iceman1001 d8b7a5f294 CHG: applied some of the changes unto "hf 14b snoop" *untested* Hard to test without a proper reader/tag to snoop 2016-08-07 18:49:36 +02:00
iceman1001 b86225188e CHG: iso14443b.c got some more love. using the "hf 14b raw" command gives now a much stabil read from more distances than before. 2016-08-07 17:49:33 +02:00
Iceman 8497870fa6 Merge pull request #20 from alexgrin/iceman_master
FIX: Coverity badge link now works.
2016-08-06 22:42:39 +02:00
Alexis Green 7edde70701 FIX: Coverity badge link now works. 2016-08-04 15:52:54 -07:00
iceman1001 fa5118e730 CHG: some calyspo stuff 2016-08-04 21:57:40 +02:00