]> git.zerfleddert.de Git - proxmark3-svn/blob - client/scripts/tnp3dump.lua
FIX: introduced a bug in luascripts when adding the "safe ascii chars" to ConvertHex...
[proxmark3-svn] / client / scripts / tnp3dump.lua
1 local cmds = require('commands')
2 local getopt = require('getopt')
3 local bin = require('bin')
4 local lib14a = require('read14a')
5 local utils = require('utils')
6 local md5 = require('md5')
7 local dumplib = require('html_dumplib')
8 local toys = require('default_toys')
9
10 example =[[
11 script run tnp3dump
12 script run tnp3dump -n
13 script run tnp3dump -p
14 script run tnp3dump -k aabbccddeeff
15 script run tnp3dump -k aabbccddeeff -n
16 script run tnp3dump -o myfile
17 script run tnp3dump -n -o myfile
18 script run tnp3dump -p -o myfile
19 script run tnp3dump -k aabbccddeeff -n -o myfile
20 ]]
21 author = "Iceman"
22 usage = "script run tnp3dump -k <key> -n -p -o <filename>"
23 desc =[[
24 This script will try to dump the contents of a Mifare TNP3xxx card.
25 It will need a valid KeyA in order to find the other keys and decode the card.
26 Arguments:
27 -h : this help
28 -k <key> : Sector 0 Key A.
29 -n : Use the nested cmd to find all keys
30 -p : Use the precalc to find all keys
31 -o : filename for the saved dumps
32 ]]
33 local RANDOM = '20436F707972696768742028432920323031302041637469766973696F6E2E20416C6C205269676874732052657365727665642E20'
34 local TIMEOUT = 2500 -- Shouldn't take longer than 2 seconds
35 local DEBUG = false -- the debug flag
36 local numBlocks = 64
37 local numSectors = 16
38 ---
39 -- A debug printout-function
40 function dbg(args)
41 if not DEBUG then return end
42
43 if type(args) == "table" then
44 local i = 1
45 while result[i] do
46 dbg(result[i])
47 i = i+1
48 end
49 else
50 print("###", args)
51 end
52 end
53 ---
54 -- This is only meant to be used when errors occur
55 function oops(err)
56 print("ERROR: ",err)
57 return nil,err
58 end
59 ---
60 -- Usage help
61 function help()
62 print(desc)
63 print("Example usage")
64 print(example)
65 end
66 --
67 -- Exit message
68 function ExitMsg(msg)
69 print( string.rep('--',20) )
70 print( string.rep('--',20) )
71 print(msg)
72 print()
73 end
74
75 local function readdumpkeys(infile)
76 t = infile:read("*all")
77 len = string.len(t)
78 local len,hex = bin.unpack(("H%d"):format(len),t)
79 return hex
80 end
81
82 local function waitCmd()
83 local response = core.WaitForResponseTimeout(cmds.CMD_ACK, TIMEOUT)
84 if response then
85 local count, cmd, arg0 = bin.unpack('LL',response)
86 if(arg0==1) then
87 local count,arg1,arg2,data = bin.unpack('LLH511',response,count)
88 return data:sub(1,32)
89 else
90 return nil, "Couldn't read block.. ["..arg0.."]"
91 end
92 end
93 return nil, 'No response from device'
94 end
95
96 local function main(args)
97
98 print( string.rep('--',20) )
99 print( string.rep('--',20) )
100
101 local keyA
102 local cmd
103 local err
104 local useNested = false
105 local usePreCalc = false
106 local cmdReadBlockString = 'hf mf rdbl %d A %s'
107 local input = "dumpkeys.bin"
108 local outputTemplate = os.date("toydump_%Y-%m-%d_%H%M%S");
109
110 -- Arguments for the script
111 for o, a in getopt.getopt(args, 'hk:npo:') do
112 if o == "h" then return help() end
113 if o == "k" then keyA = a end
114 if o == "n" then useNested = true end
115 if o == "p" then usePreCalc = true end
116 if o == "o" then outputTemplate = a end
117 end
118
119 -- validate input args.
120 keyA = keyA or '4b0b20107ccb'
121 if #(keyA) ~= 12 then
122 return oops( string.format('Wrong length of write key (was %d) expected 12', #keyA))
123 end
124
125 -- Turn off Debug
126 local cmdSetDbgOff = "hf mf dbg 0"
127 core.console( cmdSetDbgOff)
128
129 result, err = lib14a.read1443a(false)
130 if not result then
131 return oops(err)
132 end
133
134 core.clearCommandBuffer()
135
136 -- Show tag info
137 print((' Found tag %s'):format(result.name))
138
139 dbg(('Using keyA : %s'):format(keyA))
140
141 --Trying to find the other keys
142 if useNested then
143 core.console( ('hf mf nested 1 0 A %s d'):format(keyA) )
144 end
145
146 core.clearCommandBuffer()
147
148 local akeys = ''
149 if usePreCalc then
150 local pre = require('precalc')
151 akeys = pre.GetAll(result.uid)
152 dbg(akeys)
153 else
154 print('Loading dumpkeys.bin')
155 local hex, err = utils.ReadDumpFile(input)
156 if not hex then
157 return oops(err)
158 end
159 akeys = hex:sub(0,12*16)
160 end
161
162 -- Read block 0
163 dbg('Reading block 0')
164 cmd = Command:new{cmd = cmds.CMD_MIFARE_READBL, arg1 = 0, arg2 = 0, arg3 = 0, data = keyA}
165 err = core.SendCommand(cmd:getBytes())
166 if err then return oops(err) end
167 local block0, err = waitCmd()
168 if err then return oops(err) end
169
170 core.clearCommandBuffer()
171
172 -- Read block 1
173 dbg('Reading block 1')
174 cmd = Command:new{cmd = cmds.CMD_MIFARE_READBL, arg1 = 1, arg2 = 0, arg3 = 0, data = keyA}
175 err = core.SendCommand(cmd:getBytes())
176 if err then return oops(err) end
177 local block1, err = waitCmd()
178 if err then return oops(err) end
179
180 core.clearCommandBuffer()
181
182 local tmpHash = block0..block1..'%02x'..RANDOM
183
184 local key
185 local pos = 0
186 local blockNo
187 local blocks = {}
188
189 -- main loop
190 io.write('Reading blocks > ')
191 for blockNo = 0, numBlocks-1, 1 do
192
193 io.flush()
194
195 if core.ukbhit() then
196 print("aborted by user")
197 break
198 end
199
200 core.clearCommandBuffer()
201
202 pos = (math.floor( blockNo / 4 ) * 12)+1
203 key = akeys:sub(pos, pos + 11 )
204 cmd = Command:new{cmd = cmds.CMD_MIFARE_READBL, arg1 = blockNo ,arg2 = 0,arg3 = 0, data = key}
205 local err = core.SendCommand(cmd:getBytes())
206 if err then return oops(err) end
207 local blockdata, err = waitCmd()
208 if err then return oops(err) end
209
210
211 if blockNo%4 ~= 3 then
212
213 if blockNo < 8 then
214 -- Block 0-7 not encrypted
215 blocks[blockNo+1] = ('%02d :: %s'):format(blockNo,blockdata)
216 else
217 -- blocks with zero not encrypted.
218 if string.find(blockdata, '^0+$') then
219 blocks[blockNo+1] = ('%02d :: %s'):format(blockNo,blockdata)
220 else
221 local baseStr = utils.ConvertHexToAscii(tmpHash:format(blockNo))
222 local key = md5.sumhexa(baseStr)
223 local aestest = core.aes128_decrypt(key, blockdata)
224 local hex = utils.ConvertAsciiToHex(aestest)
225
226 blocks[blockNo+1] = ('%02d :: %s'):format(blockNo,hex)
227 io.write(blockNo..',')
228 end
229 end
230 else
231 -- Sectorblocks, not encrypted
232 blocks[blockNo+1] = ('%02d :: %s%s'):format(blockNo,key,blockdata:sub(13,32))
233 end
234 end
235 io.write('\n')
236
237 core.clearCommandBuffer()
238
239 -- Print results
240 local bindata = {}
241 local emldata = ''
242
243 for _,s in pairs(blocks) do
244 local slice = s:sub(8,#s)
245 local str = utils.ConvertHexToAscii(slice)
246 emldata = emldata..slice..'\n'
247 for c in (str):gmatch('.') do
248 bindata[#bindata+1] = c
249 end
250 end
251
252 print( string.rep('--',20) )
253
254 local uid = block0:sub(1,8)
255 local toytype = block1:sub(1,4)
256 local cardidLsw = block1:sub(9,16)
257 local cardidMsw = block1:sub(16,24)
258 local cardid = block1:sub(9,24)
259 local subtype = block1:sub(25,28)
260
261 -- Write dump to files
262 if not DEBUG then
263 local foo = dumplib.SaveAsBinary(bindata, outputTemplate..'-'..uid..'.bin')
264 print(("Wrote a BIN dump to: %s"):format(foo))
265 local bar = dumplib.SaveAsText(emldata, outputTemplate..'-'..uid..'.eml')
266 print(("Wrote a EML dump to: %s"):format(bar))
267 end
268
269 print( string.rep('--',20) )
270 -- Show info
271
272 local item = toys.Find(toytype, subtype)
273 if item then
274 print((' ITEM TYPE : %s - %s (%s)'):format(item[6],item[5], item[4]) )
275 else
276 print((' ITEM TYPE : 0x%s 0x%s'):format(toytype, subtype))
277 end
278
279 print( (' UID : 0x%s'):format(uid) )
280 print( (' CARDID : 0x%s'):format(cardid ) )
281 print( string.rep('--',20) )
282
283 core.clearCommandBuffer()
284 end
285 main(args)
Impressum, Datenschutz