mirror of
https://github.com/RfidResearchGroup/proxmark3.git
synced 2024-11-11 18:33:18 +08:00
475 lines
17 KiB
C
475 lines
17 KiB
C
//-----------------------------------------------------------------------------
|
|
// Copyright (C) 2010 iZsh <izsh at fail0verflow.com>
|
|
// 2016,2017, marshmellow, iceman
|
|
// This code is licensed to you under the terms of the GNU GPL, version 2 or,
|
|
// at your option, any later version. See the LICENSE.txt file for the text of
|
|
// the license.
|
|
//-----------------------------------------------------------------------------
|
|
// Low frequency HID commands (known)
|
|
//
|
|
// Useful resources:
|
|
// RF interface, programming a T55x7 clone, 26-bit HID H10301 encoding:
|
|
// http://www.proxmark.org/files/Documents/125%20kHz%20-%20HID/HID_format_example.pdf
|
|
//
|
|
// "Understanding Card Data Formats"
|
|
// https://www.hidglobal.com/sites/default/files/hid-understanding_card_data_formats-wp-en.pdf
|
|
//
|
|
// "What Format Do You Need?"
|
|
// https://www.hidglobal.com/sites/default/files/resource_files/hid-prox-br-en.pdf
|
|
//-----------------------------------------------------------------------------
|
|
|
|
#include "cmdlfhid.h"
|
|
|
|
#include <stdio.h>
|
|
#include <string.h>
|
|
|
|
#include <ctype.h>
|
|
#include <inttypes.h>
|
|
|
|
#include "cmdparser.h" // command_t
|
|
#include "comms.h"
|
|
#include "commonutil.h" // ARRAYLEN
|
|
#include "ui.h"
|
|
#include "graph.h"
|
|
#include "cmddata.h" //for g_debugMode, demodbuff cmds
|
|
#include "cmdlf.h" // lf_read
|
|
#include "util_posix.h"
|
|
#include "lfdemod.h"
|
|
#include "wiegand_formats.h"
|
|
|
|
#ifndef BITS
|
|
# define BITS 96
|
|
#endif
|
|
|
|
static int CmdHelp(const char *Cmd);
|
|
|
|
static int usage_lf_hid_watch(void) {
|
|
PrintAndLogEx(NORMAL, "Enables HID compatible reader mode printing details.");
|
|
PrintAndLogEx(NORMAL, "By default, values are printed and logged until the button is pressed or another USB command is issued.");
|
|
PrintAndLogEx(NORMAL, "");
|
|
PrintAndLogEx(NORMAL, "Usage: lf hid watch");
|
|
PrintAndLogEx(NORMAL, "");
|
|
PrintAndLogEx(NORMAL, "Examples:");
|
|
PrintAndLogEx(NORMAL, " lf hid watch");
|
|
return PM3_SUCCESS;
|
|
}
|
|
static int usage_lf_hid_sim(void) {
|
|
PrintAndLogEx(NORMAL, "Enables simulation of HID card with card number.");
|
|
PrintAndLogEx(NORMAL, "Simulation runs until the button is pressed or another USB command is issued.");
|
|
PrintAndLogEx(NORMAL, "");
|
|
PrintAndLogEx(NORMAL, "Usage: lf hid sim [h] [ID]");
|
|
PrintAndLogEx(NORMAL, "Options:");
|
|
PrintAndLogEx(NORMAL, " h - This help");
|
|
PrintAndLogEx(NORMAL, " ID - HID id");
|
|
PrintAndLogEx(NORMAL, "Examples:");
|
|
PrintAndLogEx(NORMAL, " lf hid sim 2006ec0c86");
|
|
return PM3_SUCCESS;
|
|
}
|
|
static int usage_lf_hid_clone(void) {
|
|
PrintAndLogEx(NORMAL, "Clone HID to T55x7. Tag must be on antenna. ");
|
|
PrintAndLogEx(NORMAL, "");
|
|
PrintAndLogEx(NORMAL, "Usage: lf hid clone [h] [l] ID");
|
|
PrintAndLogEx(NORMAL, "Options:");
|
|
PrintAndLogEx(NORMAL, " h - This help");
|
|
PrintAndLogEx(NORMAL, " l - 84bit ID");
|
|
PrintAndLogEx(NORMAL, " ID - HID id");
|
|
PrintAndLogEx(NORMAL, "Examples:");
|
|
PrintAndLogEx(NORMAL, " lf hid clone 2006ec0c86");
|
|
PrintAndLogEx(NORMAL, " lf hid clone l 2006ec0c86");
|
|
return PM3_SUCCESS;
|
|
}
|
|
static int usage_lf_hid_brute(void) {
|
|
PrintAndLogEx(NORMAL, "Enables bruteforce of HID readers with specified facility code.");
|
|
PrintAndLogEx(NORMAL, "This is a attack against reader. if cardnumber is given, it starts with it and goes up / down one step");
|
|
PrintAndLogEx(NORMAL, "if cardnumber is not given, it starts with 1 and goes up to 65535");
|
|
PrintAndLogEx(NORMAL, "");
|
|
PrintAndLogEx(NORMAL, "Usage: lf hid brute [h] [v] w <format> [<field> (decimal)>] {...}");
|
|
PrintAndLogEx(NORMAL, "Options:");
|
|
PrintAndLogEx(NORMAL, " h : This help");
|
|
PrintAndLogEx(NORMAL, " w <format> : see `wiegand list` for available formats");
|
|
PrintAndLogEx(NORMAL, " f <facility-code> : facility code");
|
|
PrintAndLogEx(NORMAL, " c <cardnumber> : card number to start with");
|
|
PrintAndLogEx(NORMAL, " i <issuelevel> : issue level");
|
|
PrintAndLogEx(NORMAL, " o <oem> : OEM code");
|
|
PrintAndLogEx(NORMAL, " d <delay> : delay betweens attempts in ms. Default 1000ms");
|
|
PrintAndLogEx(NORMAL, " v : verbose logging, show all tries");
|
|
PrintAndLogEx(NORMAL, "");
|
|
PrintAndLogEx(NORMAL, "Examples:");
|
|
PrintAndLogEx(NORMAL, " lf hid brute w H10301 f 224");
|
|
PrintAndLogEx(NORMAL, " lf hid brute w H10301 f 21 d 2000");
|
|
PrintAndLogEx(NORMAL, " lf hid brute v w H10301 f 21 c 200 d 2000");
|
|
return PM3_SUCCESS;
|
|
}
|
|
|
|
// sending three times. Didn't seem to break the previous sim?
|
|
static int sendPing(void) {
|
|
SendCommandNG(CMD_PING, NULL, 0);
|
|
SendCommandNG(CMD_PING, NULL, 0);
|
|
SendCommandNG(CMD_PING, NULL, 0);
|
|
clearCommandBuffer();
|
|
PacketResponseNG resp;
|
|
if (!WaitForResponseTimeout(CMD_PING, &resp, 1000))
|
|
return PM3_ETIMEOUT;
|
|
return PM3_SUCCESS;
|
|
}
|
|
static int sendTry(uint8_t format_idx, wiegand_card_t *card, uint32_t delay, bool verbose) {
|
|
|
|
wiegand_message_t packed;
|
|
memset(&packed, 0, sizeof(wiegand_message_t));
|
|
|
|
if (HIDPack(format_idx, card, &packed) == false) {
|
|
PrintAndLogEx(WARNING, "The card data could not be encoded in the selected format.");
|
|
return PM3_ESOFT;
|
|
}
|
|
|
|
if (verbose)
|
|
PrintAndLogEx(INFO, "Trying FC: %u; CN: %"PRIu64"; Issue level: %u; OEM: %u", card->FacilityCode, card->CardNumber, card->IssueLevel, card->OEM);
|
|
|
|
lf_hidsim_t payload;
|
|
payload.hi2 = packed.Top;
|
|
payload.hi = packed.Mid;
|
|
payload.lo = packed.Bot;
|
|
|
|
clearCommandBuffer();
|
|
|
|
SendCommandNG(CMD_LF_HID_SIMULATE, (uint8_t *)&payload, sizeof(payload));
|
|
/*
|
|
PacketResponseNG resp;
|
|
WaitForResponse(CMD_LF_HID_SIMULATE, &resp);
|
|
if (resp.status == PM3_EOPABORTED)
|
|
return resp.status;
|
|
*/
|
|
msleep(delay);
|
|
return sendPing();
|
|
}
|
|
|
|
//by marshmellow (based on existing demod + holiman's refactor)
|
|
//HID Prox demod - FSK RF/50 with preamble of 00011101 (then manchester encoded)
|
|
//print full HID Prox ID and some bit format details if found
|
|
static int CmdHIDDemod(const char *Cmd) {
|
|
(void)Cmd; // Cmd is not used so far
|
|
|
|
// HID simulation etc uses 0/1 as signal data. This must be converted in order to demod it back again
|
|
if (isGraphBitstream()) {
|
|
convertGraphFromBitstream();
|
|
}
|
|
|
|
//raw fsk demod no manchester decoding no start bit finding just get binary from wave
|
|
uint32_t hi2 = 0, hi = 0, lo = 0;
|
|
|
|
uint8_t bits[GraphTraceLen];
|
|
size_t size = getFromGraphBuf(bits);
|
|
if (size == 0) {
|
|
PrintAndLogEx(DEBUG, "DEBUG: Error - HID not enough samples");
|
|
return PM3_ESOFT;
|
|
}
|
|
//get binary from fsk wave
|
|
int waveIdx = 0;
|
|
int idx = HIDdemodFSK(bits, &size, &hi2, &hi, &lo, &waveIdx);
|
|
if (idx < 0) {
|
|
|
|
if (idx == -1)
|
|
PrintAndLogEx(DEBUG, "DEBUG: Error - HID not enough samples");
|
|
else if (idx == -2)
|
|
PrintAndLogEx(DEBUG, "DEBUG: Error - HID just noise detected");
|
|
else if (idx == -3)
|
|
PrintAndLogEx(DEBUG, "DEBUG: Error - HID problem during FSK demod");
|
|
else if (idx == -4)
|
|
PrintAndLogEx(DEBUG, "DEBUG: Error - HID preamble not found");
|
|
else if (idx == -5)
|
|
PrintAndLogEx(DEBUG, "DEBUG: Error - HID error in Manchester data, size %zu", size);
|
|
else
|
|
PrintAndLogEx(DEBUG, "DEBUG: Error - HID error demoding fsk %d", idx);
|
|
|
|
return PM3_ESOFT;
|
|
}
|
|
|
|
setDemodBuff(bits, size, idx);
|
|
setClockGrid(50, waveIdx + (idx * 50));
|
|
|
|
if (hi2 == 0 && hi == 0 && lo == 0) {
|
|
PrintAndLogEx(DEBUG, "DEBUG: Error - HID no values found");
|
|
return PM3_ESOFT;
|
|
}
|
|
|
|
if (hi2 != 0) { //extra large HID tags
|
|
PrintAndLogEx(SUCCESS, "HID Prox TAG ID: %x%08x%08x (%u)", hi2, hi, lo, (lo >> 1) & 0xFFFF);
|
|
} else { //standard HID tags <38 bits
|
|
uint8_t fmtLen = 0;
|
|
uint32_t cc = 0;
|
|
uint32_t fc = 0;
|
|
uint32_t cardnum = 0;
|
|
uint8_t oem = 0;
|
|
if (((hi >> 5) & 1) == 1) {//if bit 38 is set then < 37 bit format is used
|
|
uint32_t lo2 = 0;
|
|
lo2 = (((hi & 31) << 12) | (lo >> 20)); //get bits 21-37 to check for format len bit
|
|
uint8_t idx3 = 1;
|
|
while (lo2 > 1) { //find last bit set to 1 (format len bit)
|
|
lo2 >>= 1;
|
|
idx3++;
|
|
}
|
|
fmtLen = idx3 + 19;
|
|
fc = 0;
|
|
cardnum = 0;
|
|
if (fmtLen == 26) {
|
|
cardnum = (lo >> 1) & 0xFFFF;
|
|
fc = (lo >> 17) & 0xFF;
|
|
}
|
|
if (fmtLen == 32 && (lo & 0x40000000)) { //if 32 bit and Kastle bit set
|
|
cardnum = (lo >> 1) & 0xFFFF;
|
|
fc = (lo >> 17) & 0xFF;
|
|
cc = (lo >> 25) & 0x1F;
|
|
}
|
|
if (fmtLen == 34) {
|
|
cardnum = (lo >> 1) & 0xFFFF;
|
|
fc = ((hi & 1) << 15) | (lo >> 17);
|
|
}
|
|
if (fmtLen == 35) {
|
|
cardnum = (lo >> 1) & 0xFFFFF;
|
|
fc = ((hi & 1) << 11) | (lo >> 21);
|
|
}
|
|
if (fmtLen == 36) {
|
|
oem = (lo >> 1) & 0x3;
|
|
cardnum = (lo >> 3) & 0xFFFF;
|
|
fc = (hi & 0x7) << 13 | ((lo >> 19) & 0xFFFF);
|
|
}
|
|
} else { //if bit 38 is not set then 37 bit format is used
|
|
fmtLen = 37;
|
|
cardnum = (lo >> 1) & 0x7FFFF;
|
|
fc = ((hi & 0xF) << 12) | (lo >> 20);
|
|
}
|
|
if (fmtLen == 32 && (lo & 0x40000000)) { //if 32 bit and Kastle bit set
|
|
PrintAndLogEx(SUCCESS, "HID Prox TAG (Kastle format) ID: %x%08x (%u) - Format Len: 32bit - CC: %u - FC: %u - Card: %u", hi, lo, (lo >> 1) & 0xFFFF, cc, fc, cardnum);
|
|
} else {
|
|
PrintAndLogEx(SUCCESS, "HID Prox TAG ID: %x%08x (%u) - Format Len: %ubit - OEM: %03u - FC: %u - Card: %u",
|
|
hi, lo, cardnum, fmtLen, oem, fc, cardnum);
|
|
}
|
|
}
|
|
|
|
PrintAndLogEx(DEBUG, "DEBUG: HID idx: %d, Len: %zu, Printing Demod Buffer:", idx, size);
|
|
if (g_debugMode)
|
|
printDemodBuff();
|
|
|
|
return PM3_SUCCESS;
|
|
}
|
|
|
|
// this read is the "normal" read, which download lf signal and tries to demod here.
|
|
static int CmdHIDRead(const char *Cmd) {
|
|
lf_read(true, 12000);
|
|
return CmdHIDDemod(Cmd);
|
|
}
|
|
|
|
// this read loops on device side.
|
|
// uses the demod in lfops.c
|
|
static int CmdHIDWatch(const char *Cmd) {
|
|
uint8_t ctmp = tolower(param_getchar(Cmd, 0));
|
|
if (ctmp == 'h') return usage_lf_hid_watch();
|
|
clearCommandBuffer();
|
|
SendCommandNG(CMD_LF_HID_DEMOD, NULL, 0);
|
|
return PM3_SUCCESS;
|
|
}
|
|
|
|
static int CmdHIDSim(const char *Cmd) {
|
|
lf_hidsim_t payload;
|
|
payload.longFMT = 0;
|
|
uint32_t hi2 = 0, hi = 0, lo = 0;
|
|
uint32_t n = 0, i = 0;
|
|
|
|
uint8_t ctmp = tolower(param_getchar(Cmd, 0));
|
|
if (strlen(Cmd) == 0 || ctmp == 'h') return usage_lf_hid_sim();
|
|
|
|
if (strchr(Cmd, 'l') != 0) {
|
|
i++;
|
|
while (sscanf(&Cmd[i++], "%1x", &n) == 1) {
|
|
hi2 = (hi2 << 4) | (hi >> 28);
|
|
hi = (hi << 4) | (lo >> 28);
|
|
lo = (lo << 4) | (n & 0xf);
|
|
}
|
|
|
|
PrintAndLogEx(INFO, "Simulating HID tag with long ID %x%08x%08x", hi2, hi, lo);
|
|
payload.longFMT = 1;
|
|
} else {
|
|
while (sscanf(&Cmd[i++], "%1x", &n) == 1) {
|
|
hi = (hi << 4) | (lo >> 28);
|
|
lo = (lo << 4) | (n & 0xf);
|
|
}
|
|
PrintAndLogEx(SUCCESS, "Simulating HID tag with ID %x%08x", hi, lo);
|
|
hi2 = 0;
|
|
}
|
|
|
|
PrintAndLogEx(SUCCESS, "Press pm3-button to abort simulation");
|
|
|
|
payload.hi2 = hi2;
|
|
payload.hi = hi;
|
|
payload.lo = lo;
|
|
|
|
clearCommandBuffer();
|
|
SendCommandNG(CMD_LF_HID_SIMULATE, (uint8_t *)&payload, sizeof(payload));
|
|
PacketResponseNG resp;
|
|
WaitForResponse(CMD_LF_HID_SIMULATE, &resp);
|
|
PrintAndLogEx(INFO, "Done");
|
|
if (resp.status != PM3_EOPABORTED)
|
|
return resp.status;
|
|
return PM3_SUCCESS;
|
|
}
|
|
|
|
static int CmdHIDClone(const char *Cmd) {
|
|
|
|
uint32_t hi2 = 0, hi = 0, lo = 0;
|
|
uint32_t n = 0, i = 0;
|
|
|
|
uint8_t ctmp = tolower(param_getchar(Cmd, 0));
|
|
if (strlen(Cmd) == 0 || ctmp == 'h') return usage_lf_hid_clone();
|
|
uint8_t longid[1] = {0};
|
|
if (strchr(Cmd, 'l') != 0) {
|
|
i++;
|
|
while (sscanf(&Cmd[i++], "%1x", &n) == 1) {
|
|
hi2 = (hi2 << 4) | (hi >> 28);
|
|
hi = (hi << 4) | (lo >> 28);
|
|
lo = (lo << 4) | (n & 0xf);
|
|
}
|
|
|
|
PrintAndLogEx(INFO, "Preparing to clone HID tag with long ID %x%08x%08x", hi2, hi, lo);
|
|
|
|
longid[0] = 1;
|
|
} else {
|
|
while (sscanf(&Cmd[i++], "%1x", &n) == 1) {
|
|
hi = (hi << 4) | (lo >> 28);
|
|
lo = (lo << 4) | (n & 0xf);
|
|
}
|
|
PrintAndLogEx(INFO, "Preparing to clone HID tag with ID %x%08x", hi, lo);
|
|
hi2 = 0;
|
|
}
|
|
|
|
clearCommandBuffer();
|
|
SendCommandOLD(CMD_LF_HID_CLONE, hi2, hi, lo, longid, sizeof(longid));
|
|
return PM3_SUCCESS;
|
|
}
|
|
|
|
/*
|
|
PrintAndLogEx(NORMAL, "HID | OEM | FC | CN | Wiegand | HID Formatted");
|
|
PrintAndLogEx(NORMAL, "----+-----+------+---------+-----------+--------------------");
|
|
PrintAndLogEx(NORMAL, " %u | %03u | %03u | %" PRIu64 " | %" PRIX64 " | %" PRIX64,
|
|
fmtlen[i],
|
|
oem,
|
|
fc,
|
|
cardnum,
|
|
wiegand,
|
|
blocks
|
|
);
|
|
}
|
|
PrintAndLogEx(NORMAL, "----+-----+-----+-------+-----------+--------------------");
|
|
*/
|
|
|
|
static int CmdHIDBrute(const char *Cmd) {
|
|
|
|
bool errors = false, verbose = false;
|
|
uint32_t delay = 1000;
|
|
uint8_t cmdp = 0;
|
|
int format_idx = -1;
|
|
char format[16] = {0};
|
|
wiegand_card_t data;
|
|
memset(&data, 0, sizeof(wiegand_card_t));
|
|
|
|
while (param_getchar(Cmd, cmdp) != 0x00 && !errors) {
|
|
switch (tolower(param_getchar(Cmd, cmdp))) {
|
|
case 'h':
|
|
return usage_lf_hid_brute();
|
|
case 'w':
|
|
param_getstr(Cmd, cmdp + 1, format, sizeof(format));
|
|
format_idx = HIDFindCardFormat(format);
|
|
if (format_idx == -1) {
|
|
PrintAndLogEx(WARNING, "Unknown format: %s", format);
|
|
errors = true;
|
|
}
|
|
cmdp += 2;
|
|
break;
|
|
case 'c':
|
|
data.CardNumber = param_get32ex(Cmd, cmdp + 1, 0, 10);
|
|
cmdp += 2;
|
|
break;
|
|
case 'd':
|
|
// delay between attemps, defaults to 1000ms.
|
|
delay = param_get32ex(Cmd, cmdp + 1, 1000, 10);
|
|
cmdp += 2;
|
|
break;
|
|
case 'f':
|
|
data.FacilityCode = param_get32ex(Cmd, cmdp + 1, 0, 10);
|
|
cmdp += 2;
|
|
break;
|
|
case 'i':
|
|
data.IssueLevel = param_get32ex(Cmd, cmdp + 1, 0, 10);
|
|
cmdp += 2;
|
|
break;
|
|
case 'o':
|
|
data.OEM = param_get32ex(Cmd, cmdp + 1, 0, 10);
|
|
cmdp += 2;
|
|
break;
|
|
case 'v':
|
|
verbose = true;
|
|
cmdp++;
|
|
break;
|
|
default:
|
|
PrintAndLogEx(WARNING, "Unknown parameter '%c'", param_getchar(Cmd, cmdp));
|
|
errors = true;
|
|
break;
|
|
}
|
|
}
|
|
if (errors) return usage_lf_hid_brute();
|
|
|
|
PrintAndLogEx(INFO, "Brute-forcing HID reader");
|
|
PrintAndLogEx(INFO, "Press pm3-button to abort simulation or run another command");
|
|
|
|
// main loop
|
|
for (;;) {
|
|
|
|
if (!session.pm3_present) {
|
|
PrintAndLogEx(WARNING, "Device offline\n");
|
|
return PM3_ENODATA;
|
|
}
|
|
|
|
if (kbd_enter_pressed()) {
|
|
PrintAndLogEx(INFO, "aborted via keyboard!");
|
|
return sendPing();
|
|
}
|
|
|
|
// Do one up
|
|
if (data.CardNumber < 0xFFFF) {
|
|
data.CardNumber++;
|
|
if (sendTry(format_idx, &data, delay, verbose) != PM3_SUCCESS) return PM3_ESOFT;
|
|
}
|
|
|
|
// Do one down (if cardnumber is given)
|
|
if (data.CardNumber > 1) {
|
|
data.CardNumber--;
|
|
if (sendTry(format_idx, &data, delay, verbose) != PM3_SUCCESS) return PM3_ESOFT;
|
|
}
|
|
}
|
|
return PM3_SUCCESS;
|
|
}
|
|
|
|
static command_t CommandTable[] = {
|
|
{"help", CmdHelp, AlwaysAvailable, "this help"},
|
|
{"demod", CmdHIDDemod, AlwaysAvailable, "demodulate HID Prox tag from the GraphBuffer"},
|
|
{"read", CmdHIDRead, IfPm3Lf, "attempt to read and extract tag data"},
|
|
{"clone", CmdHIDClone, IfPm3Lf, "clone HID tag to T55x7"},
|
|
{"sim", CmdHIDSim, IfPm3Lf, "simulate HID tag"},
|
|
{"brute", CmdHIDBrute, IfPm3Lf, "bruteforce card number against reader"},
|
|
{"watch", CmdHIDWatch, IfPm3Lf, "continuously watch for cards. Reader mode"},
|
|
{NULL, NULL, NULL, NULL}
|
|
};
|
|
|
|
static int CmdHelp(const char *Cmd) {
|
|
(void)Cmd; // Cmd is not used so far
|
|
CmdsHelp(CommandTable);
|
|
return PM3_SUCCESS;
|
|
}
|
|
|
|
int CmdLFHID(const char *Cmd) {
|
|
clearCommandBuffer();
|
|
return CmdsParse(CommandTable, Cmd);
|
|
}
|
|
|
|
int demodHID(void) {
|
|
return CmdHIDDemod("");
|
|
}
|