]> git.zerfleddert.de Git - proxmark3-svn/blob - client/scripts/mifare.lua
Started an experiment with lua mifare hack
[proxmark3-svn] / client / scripts / mifare.lua
1 local desc = "How would the classic mifare hack look in lua? Let's find out "
2 print(desc);
3
4 print("This script isn't even remotely finished!")
5 print("Checking preconditions");
6 print("core", core)
7 print("core.SendCommand", core.SendCommand)
8 print("core.WaitForResponseTimeout", core.WaitForResponseTimeout)
9 print("core.nonce2key", core.nonce2key)
10 -- To actually send something meaningful, we need to include the 'Binlib' or 'lpack' library.
11 local x = core.SendCommand("aaaabbbb2222111100000ggggaaaabbbb2222111100000ggggaaaabbbb2222111100000ggggaaaabbbb2222111100000ggggaaaabbbb2222111100000ggggaaaabbbb2222111100000ggggaaaabbbb2222111100000ggggaaaabbbb2222111100000ggggaaaabbbb2222111100000ggggaaaabbbb2222111100000ggggaaaabbbb2222111100000ggggaaaabbbb2222111100000ggggaaaabbbb2222111100000ggggaaaabbbb2222111100000ggggaaaabbbb2222111100000ggggaaaabbbb2222111100000ggggaaaabbbb2222111100000ggggaaaabbbb2222111100000ggggaaaabbbb2222111100000ggggaaaabbbb2222111100000gggg12345678901234567890123456789012345678901234")
12 local result = core.WaitForResponseTimeout(0x0611,1000)
13 --- Oh, and nonce2Key is not 'glued' yet.
14 print("err", result)
Impressum, Datenschutz