Commit graph

3069 commits

Author SHA1 Message Date
iceman1001
7aa24806f4 FIX: the check for formatlen was wrong.
Still missing the other formats,  only 26bit in this one.
2016-08-26 22:31:45 +02:00
iceman1001
ffa306de61 CHG: starting to add the legic changes.. *work in progress* 2016-08-26 17:19:27 +02:00
iceman1001
89603cbddc FIX: minor adjustments to 'lf awid bruteforce'
FIX: making the 'lf hid bruteforce' to work the same way as the awid one..
2016-08-26 17:18:48 +02:00
iceman1001
cc70889743 FIX: fixes the broken build,...
FIX:  increased the timeout,  to make 'hf mf chk' work better.
2016-08-26 17:17:40 +02:00
iceman1001
f121b478a1 FIX: 'lf awid bruteforce' cleaning up all debug messages 2016-08-26 16:35:30 +02:00
iceman1001
a2101157f7 FIX: Better udp_csr handeling. Usb messages gets to the device better, which makes "lf awid bruteforce" work :) 2016-08-26 16:22:56 +02:00
iceman1001
ed8c2aeb63 CHG: forgot a semicolon... 2016-08-24 15:05:10 +02:00
iceman1001
bcacb3168b CHG: removed some extra time to sync,
CHG: first_try ,  it must recalibrate all the times when it comes from the client.
2016-08-24 15:01:36 +02:00
iceman1001
ba1324a5fe some text changes. 2016-08-24 14:58:50 +02:00
iceman1001
760157f50b CHG: added a verification to see if the found candidate key was able to validate against tag. If not ok, start darkside attack again. 2016-08-24 14:10:30 +02:00
iceman1001
63a1d80130 FIX: the underlaying bug on deviceside code. The SSPCLOCK wasn't reset to zero sometimes. More specific, TC2 wasn't reset cause all sorts of timing issues for the device side randomly. Like 'hf mf mifare', like iclass, like 'hf mf sim' etc etc. 2016-08-24 12:37:31 +02:00
iceman1001
a1ab594e24 CHG: change the number of calls to prng_successor was done. Fewer should mean faster :) 2016-08-24 12:35:24 +02:00
iceman1001
f38cfd6693 CHG: fixed the collapsing comments when opening this file in notepad++ Need spaces between // text or /* ... 2016-08-24 12:34:34 +02:00
iceman1001
4c44d88500 REM: removed an test function 2016-08-24 12:32:43 +02:00
iceman1001
02d5a58388 CHG: Changed the number of times the call to prng_successor is called. 2016-08-24 12:32:05 +02:00
iceman1001
39d43ccc21 CHG: syntax suger. 2016-08-24 12:31:09 +02:00
iceman1001
2c9e30908c CHG: updated Reveng version from 1.4.0 -> 1.4.4 .
---snippet from their update log:

1.4.4 27 July 2016

    Added 5 new algorithms, CRC-8/AUTOSAR, CRC-8/OPENSAFETY, CRC-16/OPENSAFETY-A, CRC-16/OPENSAFETY-B and CRC-32/AUTOSAR from the CRC Catalogue.
    Added a build option to verify the order of the preset and alias tables at compile time.

1.4.3 14 July 2016

    Added algorithm CRC-16/CMS from the CRC Catalogue.

1.4.2 8 July 2016

    Added algorithm CRC-16/PROFIBUS from the CRC Catalogue.

1.4.1a 29 June 2016

    Fixed a regression that caused the Windows release to crash on older systems.

1.4.1 27 June 2016

    -P sets the Width value just like -k.
    pcmp() quickly returns when the comparands are identical.
    Added resources for the Windows executable.
2016-08-21 20:51:29 +02:00
iceman1001
bc908d8f9d ADD: Mifare Desfire defines 2016-08-14 17:38:54 +02:00
iceman1001
af17926620 chg; syntax suger 2016-08-14 17:38:11 +02:00
iceman1001
f2abf6732b help text adjustments 2016-08-14 17:11:42 +02:00
iceman1001
ab74872d40 ADD: added a sanity check in T55x7 commands info/trace/detect against useing the commands when device is in offline but user didn't use '1' in arguments. 2016-08-14 17:04:40 +02:00
iceman1001
7e08450dcc add: annotage Mifare Desfire. from 3102c1bae3 (diff-93cfa90a992ea759349344d0de98029e)
Thanks @johannesStoye
2016-08-14 16:29:39 +02:00
iceman1001
2b6ffe75a8 chg: remove a char.. 2016-08-10 16:29:23 +02:00
iceman1001
4ab54914e3 CHG: more struct errors.. my bad, 2016-08-10 16:28:23 +02:00
iceman1001
31cf804877 CHG: removed some debug statements, added another. Change the crapto1.c, lets see if the special attack works better now against chinese clones. 2016-08-10 16:25:56 +02:00
iceman1001
823ad2e186 CHG: minor code cleaning in 'hf 14a reader' 2016-08-10 16:24:49 +02:00
iceman1001
56f1aaa234 CHG: on a slow usb connection it seems the pingcmd which stops the bruteforce on deviceside doesnt get there. Lets send three pings to make sure the device gets it. 2016-08-10 16:23:59 +02:00
iceman1001
6067df30c5 FIX: at least now the special zero parity attack, repeats and doesn't crash. However it doesn't find the key either :( 2016-08-10 10:55:29 +02:00
iceman1001
86db8973b0 CHG; still looking at 14b, this time started to look at the tracelog times not working. 2016-08-09 23:13:18 +02:00
iceman1001
59e933fc3f started fixing the paritiy == 0 special attack against chinese clones with bad prng, which hasnt been working for ages. 2016-08-09 23:11:07 +02:00
iceman1001
05442fa6f7 fix: wrong spelling 2016-08-09 12:15:26 +02:00
iceman1001
f5291a6ce1 FIX: Travis CI complains about missing stdbool.h includes 2016-08-09 12:11:11 +02:00
iceman1001
10c4231ec7 ADD: 'lf awid brute' is now possible to give a starting cardnumber. if given, the bruteforce loops from it as a mid point. Testing one step up, then one step down until it reaches 65535 and 0.
CHG: 'lf awid brute' inputs are now changed, take notice to new format.
2016-08-09 11:56:06 +02:00
iceman1001
3d4207f3b6 syntax suger
chg:  added clearCommandBuffer(); before calls to sendcommand.
2016-08-09 09:12:16 +02:00
iceman1001
8a5b3c2a45 CHG: textual fixes in help text
CHG: better exit message for 'lf awid bruteforce'
2016-08-09 09:10:26 +02:00
iceman1001
9bfd93ec15 FIX: delay was parsed incorrect into a uint8_t...
CHG: help text fixed
2016-08-08 22:17:15 +02:00
iceman1001
934dfd728d ADD: Added a delay in ms to 'lf awid brute' Thanks to @crayon for the idea. 2016-08-08 22:09:51 +02:00
iceman1001
471f89b8bd FIX: the cmdline parsing was a bit too hard. Thanks to @crayon for pointing out there were a bug here. 2016-08-08 21:27:53 +02:00
iceman1001
7c030a9185 layouts. 2016-08-08 19:02:46 +02:00
iceman1001
9fe46b6967 even more.. 2016-08-08 19:00:53 +02:00
iceman1001
d233b62911 more layout 2016-08-08 19:00:09 +02:00
iceman1001
76fc721913 correcting the layout... 2016-08-08 18:58:05 +02:00
iceman1001
f3c2458aa6 textual changes. 2016-08-08 18:51:34 +02:00
iceman1001
185d675b4a CHG: added the libncurses5-dev instruction for COMPILING.txt
CHG: updated the readme with latest changes from changelog
2016-08-08 18:07:36 +02:00
iceman1001
a238bed07a textual changes 2016-08-08 17:56:04 +02:00
iceman1001
d9ed4e1914 ADD: J-Run's 2nd phase tool mf_key_brute ref: https://github.com/J-Run/mf_key_brute Estimated time to search keyspace is ~18min.
J_Run's 2nd phase of multiple sector nested authentication key recovery
You have a known 4 last bytes of a key recovered with mf_nonce_brute tool.
First 2 bytes of key will be bruteforced

Usage:  hf mf keybrute [h] <block number> <A|B> <key>
options:
      h               this help
      <block number>  target block number
      <A|B>           target key type
      <key>           candidate key from mf_nonce_brute tool
samples:
           hf mf keybrute 1 A 000011223344
2016-08-08 17:49:30 +02:00
iceman1001
e55eda39cd Merge branch 'master' of https://github.com/iceman1001/proxmark3 2016-08-08 07:46:12 +02:00
Iceman
07b9e98970 Merge pull request #21 from alexgrin/iceman_master
FIX: erroneous semicolon
2016-08-08 07:43:26 +02:00
Alexis Green
170e7c9c51 FIX: erroneous semicolon 2016-08-07 20:07:25 -07:00
iceman1001
c2df2883f8 fix: forgot something small.. sloppy. 2016-08-07 22:15:35 +02:00