]> git.zerfleddert.de Git - proxmark3-svn/blame - client/cmdlfawid.c
ADD: `analyse nuid` - generates NUID 4byte from a UID 7byte. Mifare Classic Ev1...
[proxmark3-svn] / client / cmdlfawid.c
CommitLineData
db25599d 1//-----------------------------------------------------------------------------
2// Authored by Craig Young <cyoung@tripwire.com> based on cmdlfhid.c structure
3//
4// cmdlfhid.c is Copyright (C) 2010 iZsh <izsh at fail0verflow.com>
5//
6// This code is licensed to you under the terms of the GNU GPL, version 2 or,
7// at your option, any later version. See the LICENSE.txt file for the text of
8// the license.
9//-----------------------------------------------------------------------------
f5291a6c 10// Low frequency AWID26/50 commands
db25599d 11//-----------------------------------------------------------------------------
db25599d 12#include "cmdlfawid.h" // AWID function declarations
508b37ba 13
db25599d 14static int CmdHelp(const char *Cmd);
15
db25599d 16int usage_lf_awid_fskdemod(void) {
8fd9bfb0 17 PrintAndLog("Enables AWID compatible reader mode printing details of scanned AWID26 or AWID50 tags.");
a126332a 18 PrintAndLog("By default, values are printed and logged until the button is pressed or another USB command is issued.");
8fd9bfb0 19 PrintAndLog("If the [1] option is provided, reader mode is exited after reading a single AWID card.");
a126332a 20 PrintAndLog("");
890ae3dd 21 PrintAndLog("Usage: lf awid fskdemod [h] [1]");
10c4231e 22 PrintAndLog("Options:");
890ae3dd 23 PrintAndLog(" h : This help");
8fd9bfb0 24 PrintAndLog(" 1 : (optional) stop after reading a single card");
a126332a 25 PrintAndLog("");
10c4231e 26 PrintAndLog("Samples:");
27 PrintAndLog(" lf awid fskdemod");
28 PrintAndLog(" lf awid fskdemod 1");
a126332a 29 return 0;
db25599d 30}
31
32int usage_lf_awid_sim(void) {
8fd9bfb0 33 PrintAndLog("Enables simulation of AWID card with specified facility-code and card number.");
a126332a 34 PrintAndLog("Simulation runs until the button is pressed or another USB command is issued.");
a126332a 35 PrintAndLog("");
890ae3dd 36 PrintAndLog("Usage: lf awid sim [h] <format> <facility-code> <card-number>");
10c4231e 37 PrintAndLog("Options:");
890ae3dd 38 PrintAndLog(" h : This help");
87c10b2a 39 PrintAndLog(" <format> : format length 26|34|37|50");
8fd9bfb0 40 PrintAndLog(" <facility-code> : 8|16bit value facility code");
890ae3dd 41 PrintAndLog(" <card number> : 16|32-bit value card number");
a126332a 42 PrintAndLog("");
10c4231e 43 PrintAndLog("Samples:");
8fd9bfb0 44 PrintAndLog(" lf awid sim 26 224 1337");
45 PrintAndLog(" lf awid sim 50 2001 13371337");
a126332a 46 return 0;
db25599d 47}
48
49int usage_lf_awid_clone(void) {
8fd9bfb0 50 PrintAndLog("Enables cloning of AWID card with specified facility-code and card number onto T55x7.");
a126332a 51 PrintAndLog("The T55x7 must be on the antenna when issuing this command. T55x7 blocks are calculated and printed in the process.");
a126332a 52 PrintAndLog("");
890ae3dd 53 PrintAndLog("Usage: lf awid clone [h] <format> <facility-code> <card-number> [Q5]");
10c4231e 54 PrintAndLog("Options:");
890ae3dd 55 PrintAndLog(" h : This help");
87c10b2a 56 PrintAndLog(" <format> : format length 26|34|37|50");
8fd9bfb0 57 PrintAndLog(" <facility-code> : 8|16bit value facility code");
890ae3dd 58 PrintAndLog(" <card number> : 16|32-bit value card number");
59 PrintAndLog(" Q5 : optional - clone to Q5 (T5555) instead of T55x7 chip");
a126332a 60 PrintAndLog("");
10c4231e 61 PrintAndLog("Samples:");
8fd9bfb0 62 PrintAndLog(" lf awid clone 26 224 1337");
63 PrintAndLog(" lf awid clone 50 2001 13371337");
a126332a 64 return 0;
db25599d 65}
66
508b37ba 67int usage_lf_awid_brute(void){
8fd9bfb0 68 PrintAndLog("Enables bruteforce of AWID reader with specified facility-code.");
10c4231e 69 PrintAndLog("This is a attack against reader. if cardnumber is given, it starts with it and goes up / down one step");
70 PrintAndLog("if cardnumber is not given, it starts with 1 and goes up to 65535");
508b37ba 71 PrintAndLog("");
10c4231e 72 PrintAndLog("Usage: lf awid brute [h] a <format> f <facility-code> c <cardnumber> d <delay>");
73 PrintAndLog("Options:");
74 PrintAndLog(" h : This help");
75 PrintAndLog(" a <format> : format length 26|50");
76 PrintAndLog(" f <facility-code> : 8|16bit value facility code");
77 PrintAndLog(" c <cardnumber> : (optional) cardnumber to start with, max 65535");
78 PrintAndLog(" d <delay> : delay betweens attempts in ms. Default 1000ms");
508b37ba 79 PrintAndLog("");
10c4231e 80 PrintAndLog("Samples:");
81 PrintAndLog(" lf awid brute a 26 f 224");
82 PrintAndLog(" lf awid brute a 50 f 2001 d 2000");
83 PrintAndLog(" lf awid brute a 50 f 2001 c 200 d 2000");
508b37ba 84 return 0;
85}
86
f121b478 87static int sendPing(void){
88 UsbCommand ping = {CMD_PING, {1, 2, 3}};
89 SendCommand(&ping);
90 SendCommand(&ping);
89603cbd 91 SendCommand(&ping);
f121b478 92 clearCommandBuffer();
93 UsbCommand resp;
89603cbd 94 if (WaitForResponseTimeout(CMD_ACK, &resp, 1000))
f121b478 95 return 0;
f121b478 96 return 1;
97}
98
05442fa6 99static bool sendTry(uint8_t fmtlen, uint32_t fc, uint32_t cn, uint32_t delay, uint8_t *bs, size_t bs_len){
10c4231e 100
101 PrintAndLog("Trying FC: %u; CN: %u", fc, cn);
102 if ( !getAWIDBits(fmtlen, fc, cn, bs)) {
103 PrintAndLog("Error with tag bitstream generation.");
104 return FALSE;
105 }
106
107 uint64_t arg1 = (10<<8) + 8; // fcHigh = 10, fcLow = 8
108 uint64_t arg2 = 50; // clk RF/50 invert=0
109 UsbCommand c = {CMD_FSK_SIM_TAG, {arg1, arg2, bs_len}};
110 memcpy(c.d.asBytes, bs, bs_len);
111 clearCommandBuffer();
112 SendCommand(&c);
113 msleep(delay);
f121b478 114 sendPing();
10c4231e 115 return TRUE;
116}
f121b478 117
52f2df61 118int CmdAWIDDemodFSK(const char *Cmd) {
a126332a 119
cb1ba30a 120 if (Cmd[0] == 'h' || Cmd[0] == 'H') return usage_lf_awid_fskdemod();
121 uint8_t findone = (Cmd[0] == '1') ? 1 : 0;
a126332a 122 UsbCommand c = {CMD_AWID_DEMOD_FSK, {findone, 0, 0}};
123 clearCommandBuffer();
124 SendCommand(&c);
125 return 0;
db25599d 126}
127
87c10b2a 128int CmdAWIDRead(const char *Cmd) {
129 CmdLFRead("s");
130 getSamples("12000", TRUE);
131 return CmdFSKdemodAWID(Cmd);
132}
133
a126332a 134//refactored by marshmellow
8fd9bfb0 135int getAWIDBits(uint8_t fmtlen, uint32_t fc, uint32_t cn, uint8_t *bits) {
136
137 // the return bits, preamble 0000 0001
138 bits[7] = 1;
139
a126332a 140 uint8_t pre[66];
141 memset(pre, 0, sizeof(pre));
52f2df61 142
8fd9bfb0 143 // add formatlength
144 num_to_bytebits(fmtlen, 8, pre);
145
146 // add facilitycode, cardnumber and wiegand parity bits
87c10b2a 147 switch (fmtlen) {
148 case 26:{
149 uint8_t wiegand[24];
150 num_to_bytebits(fc, 8, wiegand);
151 num_to_bytebits(cn, 16, wiegand+8);
152 wiegand_add_parity(pre+8, wiegand, sizeof(wiegand));
153 break;
154 }
155 case 34:{
156 uint8_t wiegand[32];
157 num_to_bytebits(fc, 8, wiegand);
158 num_to_bytebits(cn, 24, wiegand+8);
159 wiegand_add_parity(pre+8, wiegand, sizeof(wiegand));
160 break;
161 }
162 case 37:{
163 uint8_t wiegand[31];
164 num_to_bytebits(fc, 13, wiegand);
165 num_to_bytebits(cn, 18, wiegand+13);
166 wiegand_add_parity(pre+8, wiegand, sizeof(wiegand));
167 break;
168 }
169 case 50: {
170 uint8_t wiegand[48];
171 num_to_bytebits(fc, 16, wiegand);
172 num_to_bytebits(cn, 32, wiegand+16);
173 wiegand_add_parity(pre+8, wiegand, sizeof(wiegand));
174 break;
175 }
8fd9bfb0 176 }
177
178 // add AWID 4bit parity
179 size_t bitLen = addParity(pre, bits+8, 66, 4, 1);
fcb1cdba 180
a126332a 181 if (bitLen != 88) return 0;
52f2df61 182 return 1;
db25599d 183}
184
87c10b2a 185static void verify_values(uint8_t *fmtlen, uint32_t *fc, uint32_t *cn){
186 switch (*fmtlen) {
187 case 50:
188 if ((*fc & 0xFFFF) != *fc) {
189 *fc &= 0xFFFF;
190 PrintAndLog("Facility-Code Truncated to 16-bits (AWID50): %u", *fc);
191 }
192 break;
193 case 37:
194 if ((*fc & 0x1FFF) != *fc) {
195 *fc &= 0x1FFF;
196 PrintAndLog("Facility-Code Truncated to 13-bits (AWID37): %u", *fc);
197 }
198 if ((*cn & 0x3FFFF) != *cn) {
199 *cn &= 0x3FFFF;
200 PrintAndLog("Card Number Truncated to 18-bits (AWID37): %u", *cn);
201 }
202 break;
203 case 34:
204 if ((*fc & 0xFF) != *fc) {
205 *fc &= 0xFF;
206 PrintAndLog("Facility-Code Truncated to 8-bits (AWID34): %u", *fc);
207 }
208 if ((*cn & 0xFFFFFF) != *cn) {
209 *cn &= 0xFFFFFF;
210 PrintAndLog("Card Number Truncated to 24-bits (AWID34): %u", *cn);
211 }
212 break;
213 case 26:
214 default:
215 *fmtlen = 26;
216 if ((*fc & 0xFF) != *fc) {
217 *fc &= 0xFF;
218 PrintAndLog("Facility-Code Truncated to 8-bits (AWID26): %u", *fc);
219 }
220 if ((*cn & 0xFFFF) != *cn) {
221 *cn &= 0xFFFF;
222 PrintAndLog("Card Number Truncated to 16-bits (AWID26): %u", *cn);
223 }
224 break;
225 }
226}
227
a126332a 228int CmdAWIDSim(const char *Cmd) {
8fd9bfb0 229 uint32_t fc = 0, cn = 0;
230 uint8_t fmtlen = 0;
a126332a 231 uint8_t bits[96];
232 uint8_t *bs = bits;
233 size_t size = sizeof(bits);
fcb1cdba 234 memset(bs, 0x00, size);
52f2df61 235
fcb1cdba 236 uint64_t arg1 = ( 10 << 8 ) + 8; // fcHigh = 10, fcLow = 8
52f2df61 237 uint64_t arg2 = 50; // clk RF/50 invert=0
238
8fd9bfb0 239 char cmdp = param_getchar(Cmd, 0);
240 if (strlen(Cmd) == 0 || cmdp == 'h' || cmdp == 'H') return usage_lf_awid_sim();
52f2df61 241
8fd9bfb0 242 fmtlen = param_get8(Cmd, 0);
243 fc = param_get32ex(Cmd, 1, 0, 10);
244 cn = param_get32ex(Cmd, 2, 0, 10);
245 if ( !fc || !cn) return usage_lf_awid_sim();
52f2df61 246
87c10b2a 247 verify_values(&fmtlen, &fc, &cn);
8fd9bfb0 248
249 PrintAndLog("Emulating AWID %u -- FC: %u; CN: %u\n", fmtlen, fc, cn);
52f2df61 250 PrintAndLog("Press pm3-button to abort simulation or run another command");
251
8fd9bfb0 252 if (!getAWIDBits(fmtlen, fc, cn, bs)) {
52f2df61 253 PrintAndLog("Error with tag bitstream generation.");
254 return 1;
255 }
256 // AWID uses: fcHigh: 10, fcLow: 8, clk: 50, invert: 0
52f2df61 257 // arg1 --- fcHigh<<8 + fcLow
258 // arg2 --- Inversion and clk setting
259 // 96 --- Bitstream length: 96-bits == 12 bytes
a126332a 260 UsbCommand c = {CMD_FSK_SIM_TAG, {arg1, arg2, size}};
261 memcpy(c.d.asBytes, bs, size);
52f2df61 262 clearCommandBuffer();
263 SendCommand(&c);
264 return 0;
db25599d 265}
266
a126332a 267int CmdAWIDClone(const char *Cmd) {
268 uint32_t blocks[4] = {T55x7_MODULATION_FSK2a | T55x7_BITRATE_RF_50 | 3<<T55x7_MAXBLOCK_SHIFT, 0, 0, 0};
8fd9bfb0 269 uint32_t fc = 0, cn = 0;
270 uint8_t fmtlen = 0;
a126332a 271 uint8_t bits[96];
52f2df61 272 uint8_t *bs=bits;
a126332a 273 memset(bs,0,sizeof(bits));
52f2df61 274
8fd9bfb0 275 char cmdp = param_getchar(Cmd, 0);
276 if (strlen(Cmd) == 0 || cmdp == 'h' || cmdp == 'H') return usage_lf_awid_clone();
f3cfe428 277
8fd9bfb0 278 fmtlen = param_get8(Cmd, 0);
279 fc = param_get32ex(Cmd, 1, 0, 10);
280 cn = param_get32ex(Cmd, 2, 0, 10);
a126332a 281
8fd9bfb0 282 if ( !fc || !cn) return usage_lf_awid_clone();
283
ff9c043d 284 if (param_getchar(Cmd, 3) == 'Q' || param_getchar(Cmd, 3) == 'q')
890ae3dd 285 //t5555 (Q5) BITRATE = (RF-2)/2 (iceman)
ff9c043d 286 blocks[0] = T5555_MODULATION_FSK2 | T5555_INVERT_OUTPUT | ((50-2)>>1) << T5555_BITRATE_SHIFT | 3<<T5555_MAXBLOCK_SHIFT;
8fd9bfb0 287
87c10b2a 288 verify_values(&fmtlen, &fc, &cn);
289
8fd9bfb0 290 if ( !getAWIDBits(fmtlen, fc, cn, bs)) {
52f2df61 291 PrintAndLog("Error with tag bitstream generation.");
292 return 1;
293 }
294
a126332a 295 blocks[1] = bytebits_to_byte(bs,32);
296 blocks[2] = bytebits_to_byte(bs+32,32);
297 blocks[3] = bytebits_to_byte(bs+64,32);
52f2df61 298
8fd9bfb0 299 PrintAndLog("Preparing to clone AWID %u to T55x7 with FC: %u, CN: %u", fmtlen, fc, cn);
52f2df61 300 PrintAndLog("Blk | Data ");
301 PrintAndLog("----+------------");
302 PrintAndLog(" 00 | 0x%08x", blocks[0]);
303 PrintAndLog(" 01 | 0x%08x", blocks[1]);
304 PrintAndLog(" 02 | 0x%08x", blocks[2]);
305 PrintAndLog(" 03 | 0x%08x", blocks[3]);
306
307 UsbCommand resp;
308 UsbCommand c = {CMD_T55XX_WRITE_BLOCK, {0,0,0}};
f3cfe428 309
a126332a 310 for (uint8_t i=0; i<4; i++) {
52f2df61 311 c.arg[0] = blocks[i];
312 c.arg[1] = i;
313 clearCommandBuffer();
314 SendCommand(&c);
42c235e7 315 if (!WaitForResponseTimeout(CMD_ACK, &resp, T55XX_WRITE_TIMEOUT)){
52f2df61 316 PrintAndLog("Error occurred, device did not respond during write operation.");
317 return -1;
f3cfe428 318 }
319 }
320 return 0;
db25599d 321}
322
508b37ba 323int CmdAWIDBrute(const char *Cmd){
324
10c4231e 325 bool errors = false;
326 uint32_t fc = 0, cn = 0, delay = 1000;
8fd9bfb0 327 uint8_t fmtlen = 0;
508b37ba 328 uint8_t bits[96];
329 uint8_t *bs = bits;
330 size_t size = sizeof(bits);
331 memset(bs, 0x00, size);
10c4231e 332 uint8_t cmdp = 0;
934dfd72 333
10c4231e 334 while(param_getchar(Cmd, cmdp) != 0x00 && !errors) {
335 switch(param_getchar(Cmd, cmdp)) {
336 case 'h':
337 case 'H':
338 return usage_lf_awid_brute();
339 case 'f':
340 case 'F':
341 fc = param_get32ex(Cmd ,cmdp+1, 0, 10);
342 if ( !fc )
343 errors = true;
344 cmdp += 2;
345 break;
346 case 'd':
347 case 'D':
348 // delay between attemps, defaults to 1000ms.
349 delay = param_get32ex(Cmd, cmdp+1, 1000, 10);
350 cmdp += 2;
351 break;
352 case 'c':
353 case 'C':
354 cn = param_get32ex(Cmd, cmdp+1, 0, 10);
355 // truncate cardnumber.
356 cn &= 0xFFFF;
357 cmdp += 2;
358 break;
359 case 'a':
360 case 'A':
361 fmtlen = param_get8(Cmd, cmdp+1);
362 cmdp += 2;
363 break;
364 default:
365 PrintAndLog("Unknown parameter '%c'", param_getchar(Cmd, cmdp));
366 errors = true;
367 break;
368 }
369 }
370 if ( fc == 0 )errors = true;
371 if ( errors ) return usage_lf_awid_brute();
372
373 // limit fc according to selected format
8fd9bfb0 374 switch(fmtlen) {
375 case 50:
376 if ((fc & 0xFFFF) != fc) {
377 fc &= 0xFFFF;
10c4231e 378 PrintAndLog("Facility-code truncated to 16-bits (AWID50): %u", fc);
8fd9bfb0 379 }
380 break;
381 default:
382 if ((fc & 0xFF) != fc) {
383 fc &= 0xFF;
10c4231e 384 PrintAndLog("Facility-code truncated to 8-bits (AWID26): %u", fc);
8fd9bfb0 385 }
386 break;
387 }
508b37ba 388
8fd9bfb0 389 PrintAndLog("Bruteforceing AWID %d Reader", fmtlen);
934dfd72 390 PrintAndLog("Press pm3-button to abort simulation or press key");
508b37ba 391
10c4231e 392 uint16_t up = cn;
393 uint16_t down = cn;
394
395 for (;;){
396
f121b478 397 if ( offline ) {
398 printf("Device offline\n");
399 return 2;
400 }
89603cbd 401 if (ukbhit()) {
402 PrintAndLog("aborted via keyboard!");
403 return sendPing();
404 }
10c4231e 405
406 // Do one up
407 if ( up < 0xFFFF )
408 if ( !sendTry(fmtlen, fc, up++, delay, bs, size)) return 1;
508b37ba 409
10c4231e 410 // Do one down (if cardnumber is given)
411 if ( cn > 1 )
56f1aaa2 412 if ( down > 1 )
10c4231e 413 if ( !sendTry(fmtlen, fc, --down, delay, bs, size)) return 1;
508b37ba 414 }
415 return 0;
416}
417
a126332a 418static command_t CommandTable[] = {
f3cfe428 419 {"help", CmdHelp, 1, "This help"},
10c4231e 420 {"fskdemod", CmdAWIDDemodFSK, 0, "Realtime AWID FSK demodulator"},
87c10b2a 421 {"read", CmdAWIDRead, 0, "Attempt to read and extract tag data"},
10c4231e 422 {"sim", CmdAWIDSim, 0, "AWID tag simulator"},
423 {"clone", CmdAWIDClone, 0, "Clone AWID to T55x7"},
424 {"brute", CmdAWIDBrute, 0, "Bruteforce card number against reader"},
f3cfe428 425 {NULL, NULL, 0, NULL}
db25599d 426};
427
a126332a 428int CmdLFAWID(const char *Cmd) {
4c36581b 429 clearCommandBuffer();
f3cfe428 430 CmdsParse(CommandTable, Cmd);
431 return 0;
db25599d 432}
433
a126332a 434int CmdHelp(const char *Cmd) {
f3cfe428 435 CmdsHelp(CommandTable);
436 return 0;
db25599d 437}
Impressum, Datenschutz