Commit graph

1317 commits

Author SHA1 Message Date
iceman1001
8085377413 CHG: output when finding key it the same as from the client. 2016-05-10 07:51:05 +02:00
iceman1001
fed1227777 CHG: just made the autopwn script main loop a bit more verbal 2016-05-10 07:40:27 +02:00
iceman1001
df82844c05 FIX: more paths for readline and Mac Os X 2016-05-06 19:52:04 +02:00
iceman1001
b01e7d206d FIX: a define which was wrong 2016-05-06 19:30:43 +02:00
iceman1001
9d590832a1 FIX: This tries to fix the memalign issued on MAC OS X, which it doesn't have. However its standard Malloc is already 16byte memaligned.
ref: http://stackoverflow.com/questions/196329/osx-lacks-memalign
2016-05-06 19:09:29 +02:00
iceman1001
0fa87186cf CHG: hardnested needs malloc.h, which on Darvin (Mac OS X) needs a path to. 2016-05-06 19:01:33 +02:00
iceman1001
e75bc417f1 ADD: added a lua script which calculates mifare keys based on a uid diversification 2016-05-06 10:19:15 +02:00
iceman1001
04da5cd92b FIX: it seem the fcntl returns -1,.. which made the flasher fail. 2016-05-05 21:13:12 +02:00
iceman1001
532bcd7145 CHG: Nedap demod, now verifes with first parity. 2016-05-04 10:34:16 +02:00
iceman1001
b85385a058 CHG: removed a warning about unused variable. Lets see if perror works. 2016-05-03 09:16:05 +02:00
iceman1001
c71f4da9bc CHG: increased the preamble
CHG:  from inverted to non-inverted. 2 of the forum samples is non-inverted.

Block 0:  00150080
2016-05-02 21:21:43 +02:00
iceman1001
d34a0b0cc7 FIX: dual definitions of variable size 2016-05-02 15:15:06 +02:00
iceman1001
96faed2124 CHG: added the ASK/Biphase demod of signal for NEDAP demod.
ADD: 'LF SEARCH'  now also checks for NEDAP.
2016-05-02 14:06:08 +02:00
iceman1001
56bbb25a41 ADD: started with a NEDAP demod, read, clone and sim functionality.
The encrypted part is not solveabled today.
2016-05-02 13:42:06 +02:00
iceman1001
ea1ee62e55 CHG: better helptext 2016-04-29 22:24:08 +02:00
iceman1001
ffeb77fdc6 CHG: the 14b is getting better, since I added the fpga waiting signaling I found in "14a emgetcmd" etc. 2016-04-29 22:23:32 +02:00
iceman1001
7bcddfabde FIX: mental note to self, don't forget to adjust messages to new logic 2016-04-27 20:03:54 +02:00
iceman1001
a644fef0bb FIX: Mental note to self, bitnumber 4 is used, not the value 4 which would be bitnumber 3... when deciding if request is REQB or WUPB 2016-04-27 19:54:29 +02:00
iceman1001
45c0c48c49 CHG: Just changed the order of printing, so the messagde FoundKey is printed last. 2016-04-27 11:22:17 +02:00
iceman1001
dccddaef77 CHG: "hf 14b sim" - Added the possibility to call it with a PUPI/UID. Sample: "hf 14b sim u 11223344" 2016-04-27 11:21:29 +02:00
iceman1001
fd3be901ea removed commented code 2016-04-26 21:30:54 +02:00
iceman1001
c98ab35140 textual change. 2016-04-26 21:30:04 +02:00
iceman1001
a420e5c163 chg; no more crash when getting partial usb packages. 2016-04-25 23:15:12 +02:00
iceman1001
ed69e099a1 FIX: @Aczid suggested this to fix a Coverity scan warning. 2016-04-25 14:30:13 +02:00
iceman1001
18b90cce48 CHG: this fixes an annoying fault of not running CONNECT in raw command... 2016-04-24 21:44:19 +02:00
iceman1001
222bdb1cb3 Syntax suger 2016-04-24 21:43:38 +02:00
iceman1001
9965e0d1f8 CHG: this should remove a Coverity Scan warning. 2016-04-24 21:42:42 +02:00
iceman1001
c0afa86f75 FIX: this commit solves a sneaky bug in 'LF VIKING' commands. The getVikingBits dropped the highest byte in the uid while creating the datablocks for the clone.
ADD:  added some extra message in debugmode when looking at viking tags.
2016-04-24 21:41:45 +02:00
iceman1001
21d359f68f CHG: we don't want to assert inside the pm3 client.
CHG: better message when failed to find the key.
CHG: revert nonces check, 12 -> 100
2016-04-23 19:09:07 +02:00
iceman1001
1c38049bcb CHG: commented away some of the debug printf statements in hardnested. 2016-04-23 18:33:27 +02:00
iceman1001
cd777a0545 FIX: Some Coverity Scan warnings. fread, not initialised etc etc 2016-04-23 18:23:46 +02:00
iceman1001
b9fc3e8eb7 RM: removed some old reference inside some old proggies... 2016-04-23 13:03:27 +02:00
iceman1001
2813c42f98 CHG: moved some params. 2016-04-23 13:02:51 +02:00
iceman1001
be6e909c5b FIX: time printing, like difftime in MINGW enviroments needs to use 32b time. 2016-04-23 13:02:20 +02:00
iceman1001
9ea10847ea CHG: timeing in chk keys, 2016-04-23 12:26:29 +02:00
iceman1001
fa0e0b109f CHG: moved out some usage_methods for help texts.
CHG: added some time in the darkside, nested, hardnested, chk commands.
2016-04-23 12:18:34 +02:00
iceman1001
5dc8b8fe27 CHG: unified some text messaged. 2016-04-23 11:43:02 +02:00
iceman1001
d948e0d140 CHG: 'hf mf chk' now correctly tests to read key B, when we specify target keytype B or ?.
CHG: 'hf mf chk'  now correctly init all sector keys to 0xFFFFFFFFFFFF,  so it looks unified.
2016-04-23 11:32:37 +02:00
iceman1001
2e350b19f7 FIX: there were no "memfree" call, there were only "free" 2016-04-21 12:15:36 +02:00
iceman1001
3130ba4b21 ADD: added @azcid 's bitsliced BF solver for @piwi 's hardnested command. Awsume work! The original patch demanded some tweaking to work in mingw.
This is not tested for other systems so far.
2016-04-21 10:26:00 +02:00
iceman1001
f7c1a934d0 CHG: "hf 14a sim" now uses mfkey32 and mfkey32_moebius as methods to retrive the key in attack_mode. 2016-04-18 13:20:17 +02:00
iceman1001
6c84c90017 FIX: this fixes the "hf mf sniff l d f" command, which has been broken for a while. The cuid is correct used for decrypting.
FIX: The flushing of logentries.
ADD: "hf mf sniff" - added the sniffing of UID's with a uidlen of 10.

Whats left? The key is not always found even if we use the "mfkey64" approach.

ADD: added the parity_zero attack in "hf mf mifare".  Still not working since piwi's changes to the iso14443a.c,  maybe needs a param to tell it to collect nonces for this special attack.
CHG: extracted some help-texts into usage_* methods. Changed some text as well

FIX:  "hf mf sim" command now uses both  mfkey32 and mfkey32_moebius version to find the key in attack mode.
CHG:  "hf mf sim" also now defaults to emul_memory to read a 4 byte UID.
2016-04-18 13:18:02 +02:00
iceman1001
cd91e41cb5 FIX: this fixes the mftry32, mftry32moebius and trymf64 implementations. Which is used in the "hf mf sim x" and "hf 14a sim x" built in attacks.
ADD: added the nonce2key version which should be able to find the key when the collected PARITIES is ZERO.
2016-04-18 13:08:18 +02:00
iceman1001
c805748f34 ADD: added a method for le32toh. Converting bytes to uint32_t .
CHG: correct use of FILE_PATH_SIZE in the tracelogging functions.
2016-04-18 13:05:35 +02:00
iceman1001
ce211cef39 FIX: corrected the FLAG_NR_AR_ATTACK 2016-04-18 13:02:36 +02:00
iceman1001
40f6f2ff50 ADD: started to add a BUTTERWORTH filter, not working yet. 2016-04-14 11:37:17 +02:00
iceman1001
0e32bf46e7 CHG: added the ascii output for the pwd. 2016-04-14 11:32:43 +02:00
iceman1001
0194ce8fc8 ADD: simulating can now handle triplesized UID (10b)
CHG: moved some mifare #DEFINES into protocols.h  (ACK,NACK..)
2016-04-14 11:09:17 +02:00
iceman1001
7ee74a8ebd CHG: Swapped to using the DEFINES. 2016-04-14 11:05:27 +02:00
iceman1001
01c78dabc3 CHG: syntax suger 2016-04-11 15:26:55 +02:00