Commit Graph

1428 Commits

Author SHA1 Message Date
iceman1001
89603cbddc FIX: minor adjustments to 'lf awid bruteforce'
FIX: making the 'lf hid bruteforce' to work the same way as the awid one..
2016-08-26 17:18:48 +02:00
iceman1001
f121b478a1 FIX: 'lf awid bruteforce' cleaning up all debug messages 2016-08-26 16:35:30 +02:00
iceman1001
ba1324a5fe some text changes. 2016-08-24 14:58:50 +02:00
iceman1001
760157f50b CHG: added a verification to see if the found candidate key was able to validate against tag. If not ok, start darkside attack again. 2016-08-24 14:10:30 +02:00
iceman1001
02d5a58388 CHG: Changed the number of times the call to prng_successor is called. 2016-08-24 12:32:05 +02:00
iceman1001
39d43ccc21 CHG: syntax suger. 2016-08-24 12:31:09 +02:00
iceman1001
2c9e30908c CHG: updated Reveng version from 1.4.0 -> 1.4.4 .
---snippet from their update log:

1.4.4 27 July 2016

    Added 5 new algorithms, CRC-8/AUTOSAR, CRC-8/OPENSAFETY, CRC-16/OPENSAFETY-A, CRC-16/OPENSAFETY-B and CRC-32/AUTOSAR from the CRC Catalogue.
    Added a build option to verify the order of the preset and alias tables at compile time.

1.4.3 14 July 2016

    Added algorithm CRC-16/CMS from the CRC Catalogue.

1.4.2 8 July 2016

    Added algorithm CRC-16/PROFIBUS from the CRC Catalogue.

1.4.1a 29 June 2016

    Fixed a regression that caused the Windows release to crash on older systems.

1.4.1 27 June 2016

    -P sets the Width value just like -k.
    pcmp() quickly returns when the comparands are identical.
    Added resources for the Windows executable.
2016-08-21 20:51:29 +02:00
iceman1001
bc908d8f9d ADD: Mifare Desfire defines 2016-08-14 17:38:54 +02:00
iceman1001
af17926620 chg; syntax suger 2016-08-14 17:38:11 +02:00
iceman1001
f2abf6732b help text adjustments 2016-08-14 17:11:42 +02:00
iceman1001
ab74872d40 ADD: added a sanity check in T55x7 commands info/trace/detect against useing the commands when device is in offline but user didn't use '1' in arguments. 2016-08-14 17:04:40 +02:00
iceman1001
7e08450dcc add: annotage Mifare Desfire. from 3102c1bae3 (diff-93cfa90a992ea759349344d0de98029e)
Thanks @johannesStoye
2016-08-14 16:29:39 +02:00
iceman1001
2b6ffe75a8 chg: remove a char.. 2016-08-10 16:29:23 +02:00
iceman1001
4ab54914e3 CHG: more struct errors.. my bad, 2016-08-10 16:28:23 +02:00
iceman1001
31cf804877 CHG: removed some debug statements, added another. Change the crapto1.c, lets see if the special attack works better now against chinese clones. 2016-08-10 16:25:56 +02:00
iceman1001
823ad2e186 CHG: minor code cleaning in 'hf 14a reader' 2016-08-10 16:24:49 +02:00
iceman1001
56f1aaa234 CHG: on a slow usb connection it seems the pingcmd which stops the bruteforce on deviceside doesnt get there. Lets send three pings to make sure the device gets it. 2016-08-10 16:23:59 +02:00
iceman1001
6067df30c5 FIX: at least now the special zero parity attack, repeats and doesn't crash. However it doesn't find the key either :( 2016-08-10 10:55:29 +02:00
iceman1001
86db8973b0 CHG; still looking at 14b, this time started to look at the tracelog times not working. 2016-08-09 23:13:18 +02:00
iceman1001
59e933fc3f started fixing the paritiy == 0 special attack against chinese clones with bad prng, which hasnt been working for ages. 2016-08-09 23:11:07 +02:00
iceman1001
05442fa6f7 fix: wrong spelling 2016-08-09 12:15:26 +02:00
iceman1001
f5291a6ce1 FIX: Travis CI complains about missing stdbool.h includes 2016-08-09 12:11:11 +02:00
iceman1001
10c4231ec7 ADD: 'lf awid brute' is now possible to give a starting cardnumber. if given, the bruteforce loops from it as a mid point. Testing one step up, then one step down until it reaches 65535 and 0.
CHG: 'lf awid brute' inputs are now changed, take notice to new format.
2016-08-09 11:56:06 +02:00
iceman1001
3d4207f3b6 syntax suger
chg:  added clearCommandBuffer(); before calls to sendcommand.
2016-08-09 09:12:16 +02:00
iceman1001
8a5b3c2a45 CHG: textual fixes in help text
CHG: better exit message for 'lf awid bruteforce'
2016-08-09 09:10:26 +02:00
iceman1001
9bfd93ec15 FIX: delay was parsed incorrect into a uint8_t...
CHG: help text fixed
2016-08-08 22:17:15 +02:00
iceman1001
934dfd728d ADD: Added a delay in ms to 'lf awid brute' Thanks to @crayon for the idea. 2016-08-08 22:09:51 +02:00
iceman1001
471f89b8bd FIX: the cmdline parsing was a bit too hard. Thanks to @crayon for pointing out there were a bug here. 2016-08-08 21:27:53 +02:00
iceman1001
d9ed4e1914 ADD: J-Run's 2nd phase tool mf_key_brute ref: https://github.com/J-Run/mf_key_brute Estimated time to search keyspace is ~18min.
J_Run's 2nd phase of multiple sector nested authentication key recovery
You have a known 4 last bytes of a key recovered with mf_nonce_brute tool.
First 2 bytes of key will be bruteforced

Usage:  hf mf keybrute [h] <block number> <A|B> <key>
options:
      h               this help
      <block number>  target block number
      <A|B>           target key type
      <key>           candidate key from mf_nonce_brute tool
samples:
           hf mf keybrute 1 A 000011223344
2016-08-08 17:49:30 +02:00
Alexis Green
170e7c9c51 FIX: erroneous semicolon 2016-08-07 20:07:25 -07:00
iceman1001
b62cbadb61 CHG: fixes to match the new arguments to the darkside attack (keytype A|B and blocknumber) in mifare_autopwn.lua script. 2016-08-07 21:19:11 +02:00
iceman1001
16658b1ff1 CHG: moved some TEA crypto stuff from 14b into analyse. 2016-08-07 21:08:17 +02:00
iceman1001
5def0b3c74 CHG: increased the script-filename column width from 16 to 21. 2016-08-07 21:05:09 +02:00
iceman1001
a152dea7b4 textual changes. 2016-08-07 18:50:25 +02:00
iceman1001
fa5118e730 CHG: some calyspo stuff 2016-08-04 21:57:40 +02:00
iceman1001
f0e183ece4 CHG: marshmellow42 's improved "hf mf sim x" 2016-08-04 21:57:18 +02:00
iceman1001
52eeaef568 CHG: moved a defince arraylen into util.h and changed to uppercase. 2016-08-04 21:54:11 +02:00
iceman1001
df007486f5 ADD: @donwan581 select keytype for the darkside attack. 2016-08-04 21:51:26 +02:00
iceman1001
26778ea772 FIX: coverity scan 133850, again. Why on earth did the 7 come from. I removed it. 2016-08-03 12:09:16 +02:00
iceman1001
c5d886170c fix: COVERITYSCAN 133871, fix one part, breaking another. shouldnt have changed to uint8_t since it can never be negative. 2016-08-03 11:57:40 +02:00
iceman1001
e8fecd72bc FIX; coverity scan 133850, & operation should keep only topbit of lower nibble.
CHG: tabs fixed
2016-08-03 10:01:37 +02:00
iceman1001
a28d34f407 Coverity Scan 133850, need to ask @jason about this one. 2016-08-03 09:32:07 +02:00
iceman1001
01629305d8 Merge branch 'master' of https://github.com/iceman1001/proxmark3 2016-08-03 09:30:01 +02:00
iceman1001
8a8de2cb6d FIX: 133853, If you have 3items in a array, don't start with index 4 or 3, mental note to self, stop coding when you are tired. 2016-08-03 09:28:54 +02:00
Alexis Green
987c59849e FIX: CoverityScan 123358 and 133864 - Unchecked return value 2016-08-02 22:44:36 -07:00
Alexis Green
3f5bcc3b92 FIX: CoverityScan 121362 - Pointer to local outside scope 2016-08-02 16:12:44 -07:00
iceman1001
80920fac96 FIX: forgot a semicolon 2016-08-03 00:42:23 +02:00
iceman1001
fd9212e183 FIX: CoverityScan 133857, cast to uint32_t will stop eventual problems. However its a uint_16 so it shouldnt be a problem to start with. 2016-08-03 00:15:26 +02:00
iceman1001
34c81fe01c FIX. COVERITYscan 133860, initialize to zero. This function is still not working but at least now it doesnt crash the client. 2016-08-03 00:13:33 +02:00
iceman1001
5fe0a11dfe FIX: CoverityScan, 1333853, out-of-bounds, well, if I have 3 items in a array, don't start reading 4... 2016-08-03 00:10:21 +02:00