start_password = param_get32ex(Cmd, 0, 0, 16);\r
end_password = param_get32ex(Cmd, 1, 0, 16);\r
\r
- if ( start_password == end_password ) return usage_t55xx_bruteforce();\r
+ if ( start_password >= end_password ) return usage_t55xx_bruteforce();\r
\r
- PrintAndLog("Start Password %08x", start_password);\r
- PrintAndLog(" End Password %08x", end_password);\r
+ PrintAndLog("Search password range [%08X -> %08X]", start_password, end_password);\r
\r
- int i = start_password;\r
+ uint32_t i = start_password;\r
\r
while ((!found) && (i <= end_password)){\r
\r
PrintAndLog("");\r
\r
if (found)\r
- PrintAndLog("Found Password [%08x]", i);\r
+ PrintAndLog("Password found [%08x]", i);\r
else\r
- PrintAndLog("NOT Found Last Password [%08x]", i);\r
+ PrintAndLog("Password NOT found. Last tried: [%08x]", i);\r
return 0;\r
}\r
\r
static command_t CommandTable[] = {\r
{"help", CmdHelp, 1, "This help"},\r
- {"bruceforce", CmdT55xxBruteForce,0, "Simple bruteforce attack to find password"},\r
+ {"bruteforce", CmdT55xxBruteForce,0, "Simple bruteforce attack to find password"},\r
{"config", CmdT55xxSetConfig, 1, "Set/Get T55XX configuration (modulation, inverted, offset, rate)"},\r
{"detect", CmdT55xxDetect, 1, "[1] Try detecting the tag modulation from reading the configuration block."},\r
{"dump", CmdT55xxDump, 0, "[password] [o] Dump T55xx card block 0-7. Optional [password], [override]"},\r