Commit graph

2041 commits

Author SHA1 Message Date
iceman1001
a43f156370 chg: 'hf mf nack' - minor 2017-12-05 18:04:21 +01:00
iceman1001
6e5038f224 chg: 'hf mf nack' - only test all 256 parities for one nonce when synced.
0 nack = has not bug.
1 nack == has bug
x nacks == most likely a clone card which answers nack to all requests.
2017-12-05 17:57:44 +01:00
iceman1001
53d8668e00 ADD: 'hf emv' - more additions by (@merlokk) 2017-12-05 15:44:35 +01:00
iceman1001
08193fd2e5 chg: getting crazy out of sync when running against magic cards. 2017-12-05 12:30:40 +01:00
iceman1001
bea28ae654 chg: wrong var name 2017-12-05 11:54:38 +01:00
iceman1001
984a26370d chg: 'hf mf nack' better output 2017-12-05 11:53:42 +01:00
Iceman
66e0e18a35
Update Makefile
Remove all subversionings like  
7.1.1-3   becomes  7.1.1
2017-12-05 07:29:53 +01:00
iceman1001
7b01acd6cc fix: ref to <ctype.h> for isxdigit() 2017-12-04 21:18:08 +01:00
iceman1001
614255fd75 revert...
something is wrong with includes and defines...
2017-12-04 20:35:51 +01:00
iceman1001
7044cf8fdf chg: double defines.. 2017-12-04 20:30:03 +01:00
iceman1001
e02e145fae draft for a Mifare classic NACK bug detection.
the idea is to have a statistically solid conclusion if tag does or does not have the NACK bug.

-in short, ref  https://github.com/iceman1001/proxmark3/issues/141
NACK bug;  when a tag responds with a NACK to a 8 byte nonce exchange during authentication when the bytes are wrong but the parity bits are correct.

This is a strong oracle which is used in the darkside attack.
2017-12-04 19:36:26 +01:00
iceman1001
07bf77e155 fix: 'hf mfu restore' - printed too many bytes. 8 -> 4 2017-12-03 15:58:37 +01:00
iceman1001
c4b73c8737 chg: better debugging functions. 2017-12-03 15:24:24 +01:00
iceman1001
73a5e3b23d chg: 'hf mfu eload' - instead of showing a error, it now tells a warning that we only loaded N blocks of data to emulator memory.
It always loads the existing blocks into emulator memory.

The previous message made users belive a error had occured when it actually did load.
2017-12-03 15:23:24 +01:00
iceman1001
b89b3399dc FIX: if receiving array isnt large enough, previously this will smash the stack.. 2017-12-02 20:45:53 +01:00
iceman1001
bb916aa999 fix: removed a warning 2017-12-02 19:07:10 +01:00
iceman1001
3b4b7812bf fix: removed a warning, 2017-12-02 19:01:43 +01:00
iceman1001
d54bb4ddf4 chg: skip if not debug 2017-12-02 18:59:47 +01:00
iceman1001
eb0c0c364c CHG: EMV changes. https://github.com/Proxmark/proxmark3/pull/493 [@merlokk) 2017-12-02 18:58:33 +01:00
iceman1001
6e144e0121 chg: removed line 2017-11-29 07:19:51 +01:00
iceman1001
2a120ec2e0 fix: no copy the crc 2017-11-29 07:18:43 +01:00
iceman1001
53452ab857 fix: 'hf mfu info' - rfu should n't print pack.
fix: 'hf mfu info' - wrong pointer to cli authenticationkey
2017-11-28 21:23:58 +01:00
iceman1001
bed2ff2dba fix: wrong place.. key got overwritten.. 2017-11-28 20:36:29 +01:00
iceman1001
bc9b2af87e ADD: NTAG213F,NTAG216F specific information in configuration blocks.
ADD: insert pwd/pack if specified from cli.
2017-11-28 20:03:46 +01:00
iceman1001
5f58dcfa52 fix: 'hf mfu dump' - wrong. 2017-11-28 09:25:36 +01:00
iceman1001
1299a0b31d CHG: increased timeout for printing the warning messages. It interupts all loops that already takes this in consideration. 2017-11-28 08:30:25 +01:00
iceman1001
6fa8740abd fix: 'hf mfu info' - select before testing a new pwdgen.
fix: 'hf mfu info' - break after found pwd
2017-11-27 20:04:54 +01:00
iceman1001
b99d759231 fix: compare not assign 2017-11-27 09:23:21 +01:00
iceman1001
f46546c5a9 ADD: 'hf mfu info' - tag identification should now identify NTAG213_F , NTAG216_F (thanks for info @jackfagner) 2017-11-27 09:21:55 +01:00
iceman1001
428e54bb6b CHG: 'hf mfu' gettype identification, now deals with NTAG213, GetVersion = subtype 04, 2017-11-26 19:16:12 +01:00
iceman1001
1ebf4afd73 CHG: 'hf mfu info' - now also tests for pwdgen algo D. 2017-11-26 16:52:20 +01:00
iceman1001
b5010ddfe8 fix: signed / unsigned errors. 2017-11-26 07:29:05 +01:00
iceman1001
9b573e06a4 ADD: hooking up 'pwdgen algo D' for lua-scripting 2017-11-26 07:08:27 +01:00
iceman1001
0815f19389 ADD: new pwdgen algo, (thanks @jackfagner) who did a great job figuring it out. Read his blog.
ref.   https://github.com/jackfagner/NfcKey/blob/master/NfcKeyC.c
2017-11-25 08:48:36 +01:00
iceman1001
9959d5c1e7 chg: emv commands should now compile. no testing done. 2017-11-25 08:18:30 +01:00
iceman1001
647411d10d chg: pointing to new emv cmds. (@merlokk) 2017-11-25 08:06:43 +01:00
iceman1001
4721e7e8a0 add: new found pwd. {@gentilkiwi) 2017-11-25 08:05:15 +01:00
iceman1001
e8e3256f7e add: compilation order 2017-11-25 08:03:53 +01:00
iceman1001
fa98197961 chg: added some updated string functions (@merlokk) 2017-11-25 08:02:51 +01:00
iceman1001
81ccfa734e add: 'script run brutesim' - new script to show simple bruteforce by incrementing cardnumber against different readers. Both LF & HF. @kenzycarey
(adjusted to fit into same script structure like the rest in iceman fork)
2017-11-25 07:58:56 +01:00
iceman1001
5f695999d2 add: emv - new files from pm3 offical 2017-11-25 03:29:26 +01:00
iceman1001
13ffd7bf97 add: emv changes from pm3 offical. 2017-11-25 03:28:02 +01:00
iceman1001
2f3dbbcaa3 rename: ul_switch_off_field -> DropField (inside cmdhf14a.c)
chg:  Fix memory bounds error (@wsmoses)
 c3511781a1
2017-11-11 23:23:01 +01:00
iceman1001
02af3b9e1d CHG: (@pwpiwi) d940ebfbad 2017-11-10 23:24:05 +01:00
iceman1001
25b173ea20 chg: 'hf 14a reader' - @pwpiwi 7c8115b273 2017-11-10 22:55:33 +01:00
iceman1001
0d149dd949 FIX: buffer overflow. array too short 2017-11-10 21:20:54 +01:00
iceman1001
9b4e52b89e CHG: dropfield 2017-11-10 20:49:56 +01:00
iceman1001
8b83db2c1b ADD: 'hf 14a apdu' @merlokk 2017-11-10 20:47:31 +01:00
iceman1001
a3e923c529 add: emv 2017-11-10 20:09:22 +01:00
iceman1001
23506bd1d7 add: first part emv @merlokk 2017-11-10 20:08:28 +01:00