]>
git.zerfleddert.de Git - proxmark3-svn/blob - client/cmdlfawid.c
1 //-----------------------------------------------------------------------------
2 // Authored by Craig Young <cyoung@tripwire.com> based on cmdlfhid.c structure
4 // cmdlfhid.c is Copyright (C) 2010 iZsh <izsh at fail0verflow.com>
6 // This code is licensed to you under the terms of the GNU GPL, version 2 or,
7 // at your option, any later version. See the LICENSE.txt file for the text of
9 //-----------------------------------------------------------------------------
10 // Low frequency AWID26 commands
11 //-----------------------------------------------------------------------------
13 #include <stdio.h> // sscanf
14 #include "proxmark3.h" // Definitions, USB controls, etc
15 #include "ui.h" // PrintAndLog
16 #include "cmdparser.h" // CmdsParse, CmdsHelp
17 #include "cmdlfawid.h" // AWID function declarations
18 #include "lfdemod.h" // parityTest
19 #include "util.h" // weigandparity
20 #include "protocols.h" // for T55xx config register definitions
24 static int CmdHelp(const char *Cmd
);
26 int usage_lf_awid_fskdemod(void) {
27 PrintAndLog("Enables AWID compatible reader mode printing details of scanned AWID26 or AWID50 tags.");
28 PrintAndLog("By default, values are printed and logged until the button is pressed or another USB command is issued.");
29 PrintAndLog("If the [1] option is provided, reader mode is exited after reading a single AWID card.");
31 PrintAndLog("Usage: lf awid fskdemod [h] [1]");
32 PrintAndLog("Options :");
33 PrintAndLog(" h : This help");
34 PrintAndLog(" 1 : (optional) stop after reading a single card");
36 PrintAndLog("Samples");
37 PrintAndLog(" lf awid fskdemod");
38 PrintAndLog(" lf awid fskdemod 1");
42 int usage_lf_awid_sim(void) {
43 PrintAndLog("Enables simulation of AWID card with specified facility-code and card number.");
44 PrintAndLog("Simulation runs until the button is pressed or another USB command is issued.");
46 PrintAndLog("Usage: lf awid sim [h] <format> <facility-code> <card-number>");
47 PrintAndLog("Options :");
48 PrintAndLog(" h : This help");
49 PrintAndLog(" <format> : format length 26|50");
50 PrintAndLog(" <facility-code> : 8|16bit value facility code");
51 PrintAndLog(" <card number> : 16|32-bit value card number");
53 PrintAndLog("Samples");
54 PrintAndLog(" lf awid sim 26 224 1337");
55 PrintAndLog(" lf awid sim 50 2001 13371337");
59 int usage_lf_awid_clone(void) {
60 PrintAndLog("Enables cloning of AWID card with specified facility-code and card number onto T55x7.");
61 PrintAndLog("The T55x7 must be on the antenna when issuing this command. T55x7 blocks are calculated and printed in the process.");
63 PrintAndLog("Usage: lf awid clone [h] <format> <facility-code> <card-number> [Q5]");
64 PrintAndLog("Options :");
65 PrintAndLog(" h : This help");
66 PrintAndLog(" <format> : format length 26|50");
67 PrintAndLog(" <facility-code> : 8|16bit value facility code");
68 PrintAndLog(" <card number> : 16|32-bit value card number");
69 PrintAndLog(" Q5 : optional - clone to Q5 (T5555) instead of T55x7 chip");
71 PrintAndLog("Samples");
72 PrintAndLog(" lf awid clone 26 224 1337");
73 PrintAndLog(" lf awid clone 50 2001 13371337");
77 int usage_lf_awid_brute(void){
78 PrintAndLog("Enables bruteforce of AWID reader with specified facility-code.");
79 PrintAndLog("This is a incremental attack against reader.");
81 PrintAndLog("Usage: lf awid brute [h] <format> <facility-code>");
82 PrintAndLog("Options :");
83 PrintAndLog(" h : This help");
84 PrintAndLog(" <format> : format length 26|50");
85 PrintAndLog(" <facility-code> : 8|16bit value facility code");
87 PrintAndLog("Samples");
88 PrintAndLog(" lf awid brute 26 224");
89 PrintAndLog(" lf awid brute 50 2001");
93 int CmdAWIDDemodFSK(const char *Cmd
) {
95 if (Cmd
[0] == 'h' || Cmd
[0] == 'H') return usage_lf_awid_fskdemod();
96 if (Cmd
[0] == '1') findone
= 1;
98 UsbCommand c
= {CMD_AWID_DEMOD_FSK
, {findone
, 0, 0}};
104 //refactored by marshmellow
105 int getAWIDBits(uint8_t fmtlen
, uint32_t fc
, uint32_t cn
, uint8_t *bits
) {
107 // the return bits, preamble 0000 0001
111 memset(pre
, 0, sizeof(pre
));
114 num_to_bytebits(fmtlen
, 8, pre
);
116 // add facilitycode, cardnumber and wiegand parity bits
117 if ( fmtlen
== 26 ) {
119 num_to_bytebits(fc
, 8, wiegand
);
120 num_to_bytebits(cn
, 16, wiegand
+8);
121 wiegand_add_parity(pre
+8, wiegand
, sizeof(wiegand
));
124 num_to_bytebits(fc
, 16, wiegand
);
125 num_to_bytebits(cn
, 32, wiegand
+16);
126 wiegand_add_parity(pre
+8, wiegand
, sizeof(wiegand
));
129 // add AWID 4bit parity
130 size_t bitLen
= addParity(pre
, bits
+8, 66, 4, 1);
132 if (bitLen
!= 88) return 0;
136 int CmdAWIDSim(const char *Cmd
) {
137 uint32_t fc
= 0, cn
= 0;
141 size_t size
= sizeof(bits
);
142 memset(bs
, 0x00, size
);
144 uint64_t arg1
= ( 10 << 8 ) + 8; // fcHigh = 10, fcLow = 8
145 uint64_t arg2
= 50; // clk RF/50 invert=0
147 char cmdp
= param_getchar(Cmd
, 0);
148 if (strlen(Cmd
) == 0 || cmdp
== 'h' || cmdp
== 'H') return usage_lf_awid_sim();
150 fmtlen
= param_get8(Cmd
, 0);
151 fc
= param_get32ex(Cmd
, 1, 0, 10);
152 cn
= param_get32ex(Cmd
, 2, 0, 10);
153 if ( !fc
|| !cn
) return usage_lf_awid_sim();
157 if ((fc
& 0xFF) != fc
) {
159 PrintAndLog("Facility-Code Truncated to 8-bits (AWID26): %u", fc
);
162 if ((cn
& 0xFFFF) != cn
) {
164 PrintAndLog("Card Number Truncated to 16-bits (AWID26): %u", cn
);
168 if ((fc
& 0xFFFF) != fc
) {
170 PrintAndLog("Facility-Code Truncated to 16-bits (AWID50): %u", fc
);
176 PrintAndLog("Emulating AWID %u -- FC: %u; CN: %u\n", fmtlen
, fc
, cn
);
177 PrintAndLog("Press pm3-button to abort simulation or run another command");
179 if (!getAWIDBits(fmtlen
, fc
, cn
, bs
)) {
180 PrintAndLog("Error with tag bitstream generation.");
183 // AWID uses: fcHigh: 10, fcLow: 8, clk: 50, invert: 0
184 // arg1 --- fcHigh<<8 + fcLow
185 // arg2 --- Inversion and clk setting
186 // 96 --- Bitstream length: 96-bits == 12 bytes
187 UsbCommand c
= {CMD_FSK_SIM_TAG
, {arg1
, arg2
, size
}};
188 memcpy(c
.d
.asBytes
, bs
, size
);
189 clearCommandBuffer();
194 int CmdAWIDClone(const char *Cmd
) {
195 uint32_t blocks
[4] = {T55x7_MODULATION_FSK2a
| T55x7_BITRATE_RF_50
| 3<<T55x7_MAXBLOCK_SHIFT
, 0, 0, 0};
196 uint32_t fc
= 0, cn
= 0;
200 memset(bs
,0,sizeof(bits
));
202 char cmdp
= param_getchar(Cmd
, 0);
203 if (strlen(Cmd
) == 0 || cmdp
== 'h' || cmdp
== 'H') return usage_lf_awid_clone();
205 fmtlen
= param_get8(Cmd
, 0);
206 fc
= param_get32ex(Cmd
, 1, 0, 10);
207 cn
= param_get32ex(Cmd
, 2, 0, 10);
209 if ( !fc
|| !cn
) return usage_lf_awid_clone();
213 if ((fc
& 0xFFFF) != fc
) {
215 PrintAndLog("Facility-Code Truncated to 16-bits (AWID50): %u", fc
);
220 if ((fc
& 0xFF) != fc
) {
222 PrintAndLog("Facility-Code Truncated to 8-bits (AWID26): %u", fc
);
225 if ((cn
& 0xFFFF) != cn
) {
227 PrintAndLog("Card Number Truncated to 16-bits (AWID26): %u", cn
);
232 if (param_getchar(Cmd
, 4) == 'Q' || param_getchar(Cmd
, 4) == 'q')
233 //t5555 (Q5) BITRATE = (RF-2)/2 (iceman)
234 blocks
[0] = T5555_MODULATION_FSK2
| T5555_INVERT_OUTPUT
| 50<<T5555_BITRATE_SHIFT
| 3<<T5555_MAXBLOCK_SHIFT
;
236 if ( !getAWIDBits(fmtlen
, fc
, cn
, bs
)) {
237 PrintAndLog("Error with tag bitstream generation.");
241 blocks
[1] = bytebits_to_byte(bs
,32);
242 blocks
[2] = bytebits_to_byte(bs
+32,32);
243 blocks
[3] = bytebits_to_byte(bs
+64,32);
245 PrintAndLog("Preparing to clone AWID %u to T55x7 with FC: %u, CN: %u", fmtlen
, fc
, cn
);
246 PrintAndLog("Blk | Data ");
247 PrintAndLog("----+------------");
248 PrintAndLog(" 00 | 0x%08x", blocks
[0]);
249 PrintAndLog(" 01 | 0x%08x", blocks
[1]);
250 PrintAndLog(" 02 | 0x%08x", blocks
[2]);
251 PrintAndLog(" 03 | 0x%08x", blocks
[3]);
254 UsbCommand c
= {CMD_T55XX_WRITE_BLOCK
, {0,0,0}};
256 for (uint8_t i
=0; i
<4; i
++) {
257 c
.arg
[0] = blocks
[i
];
259 clearCommandBuffer();
261 if (!WaitForResponseTimeout(CMD_ACK
, &resp
, 1500)){
262 PrintAndLog("Error occurred, device did not respond during write operation.");
269 int CmdAWIDBrute(const char *Cmd
){
275 size_t size
= sizeof(bits
);
276 memset(bs
, 0x00, size
);
278 char cmdp
= param_getchar(Cmd
, 0);
279 if (strlen(Cmd
) > 4 || strlen(Cmd
) == 0 || cmdp
== 'h' || cmdp
== 'H') return usage_lf_awid_brute();
281 fmtlen
= param_get8(Cmd
, 0);
282 fc
= param_get32ex(Cmd
, 1, 0, 10);
283 if ( !fc
) return usage_lf_awid_brute();
287 if ((fc
& 0xFFFF) != fc
) {
289 PrintAndLog("Facility-Code Truncated to 16-bits (AWID50): %u", fc
);
293 if ((fc
& 0xFF) != fc
) {
295 PrintAndLog("Facility-Code Truncated to 8-bits (AWID26): %u", fc
);
300 PrintAndLog("Bruteforceing AWID %d Reader", fmtlen
);
301 PrintAndLog("Press pm3-button to abort simulation or run another command");
303 uint64_t arg1
= (10<<8) + 8; // fcHigh = 10, fcLow = 8
304 uint64_t arg2
= 50; // clk RF/50 invert=0
305 UsbCommand c
= {CMD_FSK_SIM_TAG
, {arg1
, arg2
, size
}};
307 for ( uint16_t cn
= 1; cn
< 0xFFFF; ++cn
){
309 PrintAndLog("aborted via keyboard!");
314 clearCommandBuffer();
319 (void)getAWIDBits(fmtlen
, fc
, cn
, bs
);
320 memcpy(c
.d
.asBytes
, bs
, size
);
321 clearCommandBuffer();
324 PrintAndLog("Trying FC: %u; CN: %u", fc
, cn
);
331 static command_t CommandTable
[] = {
332 {"help", CmdHelp
, 1, "This help"},
333 {"fskdemod", CmdAWIDDemodFSK
, 0, "['1'] Realtime AWID FSK demodulator (option '1' for one tag only)"},
334 {"sim", CmdAWIDSim
, 0, "<Facility-Code> <Card Number> -- AWID tag simulator"},
335 {"clone", CmdAWIDClone
, 0, "<Facility-Code> <Card Number> <Q5> -- Clone AWID to T55x7"},
336 {"brute", CmdAWIDBrute
, 0, "<Facility-Code> -- bruteforce card number"},
337 {NULL
, NULL
, 0, NULL
}
340 int CmdLFAWID(const char *Cmd
) {
341 clearCommandBuffer();
342 CmdsParse(CommandTable
, Cmd
);
346 int CmdHelp(const char *Cmd
) {
347 CmdsHelp(CommandTable
);