proxmark3/tools/hitag2crack
2020-06-22 22:34:05 +02:00
..
common cppchecker 2020-06-02 13:04:23 +02:00
crack2 cppchecker 2020-06-02 13:05:19 +02:00
crack3 fix memleak 2020-05-27 20:33:25 +02:00
crack4 unreadvariable 2020-05-27 20:29:53 +02:00
crack5 Little optimization for hitag2hell attack 2020-06-22 22:34:05 +02:00
crack5gpu Bring hitag2crack tools in main Makefiles 2020-05-23 13:33:32 +02:00
.gitignore added hitag2crack 2020-01-16 10:43:13 +01:00
hitag2_gen_nRaR.py make style 2020-06-08 03:15:10 +02:00
Makefile Bring hitag2crack tools in main Makefiles 2020-05-23 13:33:32 +02:00
README.md add new ht2 tools, thanks to anonymous donator 2020-04-04 14:03:21 +02:00

HiTag2 Cracking Suite

Authors:

Introduction

These tools are implementations of the four attacks detailed in the papers, Gone In 360 Seconds - Hijacking With HiTag 2 by Roel Verdult, Flavio Garcia and Josep Balasch, and Lock It And Still Lose It - on the (In)Security of Automotive Remote Keyless Entry Systems by Flavio Garcia, David Oswald, Timo Kasper and Pierre Pavlides. The first three attacks come from the first paper and the fourth attack comes from the second paper.

Attack 1

Attack 1 is a nonce replay and length extension attack. This is an attack on a single HiTag2 RFID tag, given a single encrypted nonce and challenge response value pair (nR, aR) for the tag's UID. The attack runs entirely on the Proxmark3 with it acting like a RWD that replays the same encrypted nonce and challenge response pair for every interaction; this fixes the key stream that the tag's PRNG outputs to the same stream for every interaction.

By brute forcing a subset of the encrypted command space, the Proxmark3 finds a single valid encrypted command - invalid commands return a known unencrypted error response so finding a valid one is simply a case of trying different values until a response other than the error response is received.

It then bit flips the valid encrypted command to find the other 15 valid encrypted commands. By knowing the contents of page 0 - it's the UID that is presented in clear at the start of each interaction - it tries each encrypted response in turn, assuming each to be the encrypted version of 'read page 0 non-inverted' and each response to be the encrypted version of page 0.

For each attempted command, it calculates the key stream that would have correctly generated the encrypted command and response: command ++ response XOR key stream = encrypted command ++ encrypted response therefore: key stream = command ++ response XOR encrypted command ++ encrypted response

It then tests the potentially recovered key stream by creating an encrypted command that consumes as much of it as possible, re-initialising with the same encrypted nonce and challenge response pair (to set the key stream to the same stream as that which produced the encrypted command response it is testing), and then sending this extended encrypted command. If the response is not the error response, then the key stream is valid and the response is the encryption of the page 0 contents (the UID).

When one of the valid encrypted commands satisfies this situation, the recovered key stream must be the output of the PRNG for the given encrypted nonce and challenge response pair.

The Proxmark3 then uses this key stream to encrypt commands and decrypt the responses, and therefore requests the contents of all 8 pages. Pages 1 and 2 contain the encryption key.

Attack 2

Attack 2 is a time/space trade off to recover the key for situations where the tag has been configured to prevent reading of pages 1 and 2. This attack uses a pre-computed table of 2^37 PRNG states and resultant PRNG output, sorted on the PRNG output. The Proxmark3 is used to recover 2048 bits of key stream using a modification of attack 1 and this is used to search the table for matching PRNG output. When the output is found, it is tested for validity (by testing previous or following PRNG output) and then the PRNG state is rolled back to the initialisation state, from which the unencrypted nonce and key can be recovered.

Attack 3

Attack 3 is a cryptanalytic attack that focuses on the RWD and a bias in the PRNG output. By capturing 136 encrypted nonce and challenge response pairs, candidates for the first 34 bits of the key can be identified, and for each the remaining 14 bits can be brute forced.

Attack 4

Attack 4 is a fast correlative attack on the key based on a number of captured encrypted nonce and challenge response pairs (up to 32, but 16 usually sufficient). It starts by guessing the first 16 bits of the key and scores all these guesses against how likely they are to be the correct key, given the encrypted nonces and the keystream they should produce. Each guess is then expanded by 1 bit and the process iterates, with only the best guesses taken forward to the next iteration.

Attack 5

Attack 5 is heavily based on the HiTag2 Hell CPU implementation from https://github.com/factoritbv/hitag2hell by FactorIT B.V., with the following changes:

  • Main takes a UID and 2 {nR},{aR} pairs as arguments and searches for states producing the first aR sample, reconstructs the corresponding key candidates and tests them against the second nR,aR pair;
  • Reuses the Hitag helping functions of the other attacks.

Attack 5gpu

Attack 5gpu is identical to attack 5, simply the code has been ported to OpenCL to run on GPUs and is therefore much faster than attack 5.

Usage details: Attack 1

Attack 1 requires a valid tag and a valid encrypted nonce and challenge response pair. The attacker needs to obtain a valid tag and then use this to obtain a valid encrypted nonce and challenge response pair. This can be achieved by using the Proxmark3 lf hitag sniff command, placing the coil on the RWD and presenting the valid tag. The encrypted nonce and challenge response pairs can then be read out. These values can then be used to attack the tag with lf hitag ht2crack <nR> <aR>.

TODO example

pm3 --> lf hitag sniff
pm3 --> lf hitag ht2crack <nR> <aR>

Usage details: Attack 2

Attack 2 requires the same resources as attack 1, plus a pre-computed table. The table can be generated on a disk with >1.5TB of storage, although it takes some time (allow a couple of days, privilege SSD). This can be achieved by using the Proxmark3 lf hitag sniff command, placing the coil on the RWD and presenting the valid tag. The encrypted nonce and challenge response pairs can then be read out. These values can then be used to attack the tag with lf hitag ht2keystream <nR> <aR>.

TODO example

./ht2crack2buildtable
pm3 --> lf hitag sniff
pm3 --> lf hitag ht2keystream <nR> <aR>

It creates a file Hitag2_<UID>_<nR>_<aR>_keystream.txt.

./ht2crack2search Hitag2_<UID>_<nR>_<aR>_keystream.txt <UID> <nR>

Usage details: Attack 3

Attack 3 requires only interaction with the RWD and does not require a valid tag, although it does require a HiTag2 tag that the RWD will initially respond to; e.g. you could potentially use any HiTag2 tag as long as the RWD starts the crypto handshake with it. It requires >=136 encrypted nonce and challenge response pairs for the same tag UID.

TODO will be ht2 sim or sniff with actual tag ?

pm3 --> lf hitag sniff l 

It creates a file Hitag2_<UID>_<nR>_<aR>_collection.txt. Stop once you got enough pairs.

./ht2crack3 <UID> Hitag2_<UID>_<nR>_<aR>_collection.txt

Usage details: Attack 4

Attack 4 requires the same information as attack 3, but only 16-32 encrypted nonce and challenge response pairs are required.

pm3 --> lf hitag sniff l 

It creates a file Hitag2_<UID>_<nR>_<aR>_collection.txt. Stop once you got enough pairs.

./ht2crack4 -u <UID> -n Hitag2_<UID>_<nR>_<aR>_collection.txt [-N <number of nonces to use>] [-t <table size>]

Start with -N 16 and -t 500000. If the attack fails to find the key, double the table size and try again, repeating if it still fails.

Usage details: Attack 5

Attack 5 requires two encrypted nonce and challenge response value pairs (nR, aR) for the tag's UID.

pm3 --> lf hitag sniff

Stop once you got two pairs.

$ ./ht2crack5 <UID> <nR1> <aR1> <nR2> <aR2>

Usage details: Attack 5gpu

Attack 5gpu requires two encrypted nonce and challenge response value pairs (nR, aR) for the tag's UID.

pm3 --> lf hitag sniff

Stop once you got two pairs.

$ ./ht2crack5gpu <UID> <nR1> <aR1> <nR2> <aR2>

Usage details: Next steps

Once the key has been recovered using one of these attacks, the Proxmark3 can be configured to operate as a RWD and will capture tags using that key.

TODO example

Tags can be copied with standard Proxmark3 commands.

TODO example