iceman1001
|
52d69ed4ee
|
CHG: refactor CRC16 algos. This is a big change, most likely some parts broke, hard to test it all.
|
2018-02-01 15:19:47 +01:00 |
|
iceman1001
|
205e4b2300
|
chg: adjusted the input parameters for crc16 implementations.
|
2018-01-28 12:19:04 +01:00 |
|
iceman1001
|
dd024b5300
|
chg: 'hf mf fchk' - depth first search
|
2017-12-11 21:43:29 +01:00 |
|
iceman1001
|
1f637d726f
|
fix to darkside overdue. I needed to remove my old impl..
|
2017-12-06 17:15:24 +01:00 |
|
iceman1001
|
905c55de2b
|
ADD: analyse nuid - generates NUID 4byte from a UID 7byte. Mifare Classic Ev1 has this option as a activation sequences. This NUID is also used for authenticate (cuid), not the block0 data.
ref: http://www.gorferay.com/mifare-and-handling-of-uids/
|
2017-03-10 09:48:36 +01:00 |
|
iceman1001
|
ea1c1ca6f8
|
CHG: 'analyse hid' added @holiman 's permute functions to the output to verify
|
2017-01-03 19:32:24 +01:00 |
|
iceman1001
|
09bb01c73d
|
ADD: "analyse hid" - new function that implements the 'heart of darkness' hid/iclass permute function. Its converted from the php-solution found in the paper to C. Ref: https://github.com/akw0088/HID-Card-Copy/blob/master/key-permutation/permute.php
|
2016-11-17 18:20:44 +01:00 |
|
iceman1001
|
b403c30091
|
FIX: the time_t calls under mingw needs a #define _USE_32BIT_TIME_T 1 to be correct. It seems to work in "hf mf mifare" but not in "hf mf hardnested"
|
2016-10-29 21:42:46 +02:00 |
|
iceman1001
|
16658b1ff1
|
CHG: moved some TEA crypto stuff from 14b into analyse.
|
2016-08-07 21:08:17 +02:00 |
|
iceman1001
|
df007486f5
|
ADD: @donwan581 select keytype for the darkside attack.
|
2016-08-04 21:51:26 +02:00 |
|
iceman1001
|
53b3c3e816
|
ADD: Added some new analyse functions like CHKSUM ADD/SUBTRACKT with one's complement
|
2016-07-28 21:47:52 +02:00 |
|
iceman1001
|
5558d935bd
|
ADD: added the skeleton for analysing dates in a given byte array.
|
2016-06-13 21:55:52 +02:00 |
|
iceman1001
|
812513bf90
|
ADD: Added a new main command group "analyse", first one is the find the missing XOR in a LCR, it was a python script under /tools/xorfind.py
|
2016-05-10 15:30:46 +02:00 |
|