From 3510cdff4b1abbd224e731a871c5a7c8687d0c93 Mon Sep 17 00:00:00 2001 From: "martin.holst@gmail.com" Date: Fri, 24 May 2013 21:43:02 +0000 Subject: [PATCH] Started an experiment with lua mifare hack --- client/scripts/mifare.lua | 14 ++++++++++++++ 1 file changed, 14 insertions(+) create mode 100644 client/scripts/mifare.lua diff --git a/client/scripts/mifare.lua b/client/scripts/mifare.lua new file mode 100644 index 00000000..174c760e --- /dev/null +++ b/client/scripts/mifare.lua @@ -0,0 +1,14 @@ +local desc = "How would the classic mifare hack look in lua? Let's find out " +print(desc); + +print("This script isn't even remotely finished!") +print("Checking preconditions"); +print("core", core) +print("core.SendCommand", core.SendCommand) +print("core.WaitForResponseTimeout", core.WaitForResponseTimeout) +print("core.nonce2key", core.nonce2key) +-- To actually send something meaningful, we need to include the 'Binlib' or 'lpack' library. +local x = core.SendCommand("aaaabbbb2222111100000ggggaaaabbbb2222111100000ggggaaaabbbb2222111100000ggggaaaabbbb2222111100000ggggaaaabbbb2222111100000ggggaaaabbbb2222111100000ggggaaaabbbb2222111100000ggggaaaabbbb2222111100000ggggaaaabbbb2222111100000ggggaaaabbbb2222111100000ggggaaaabbbb2222111100000ggggaaaabbbb2222111100000ggggaaaabbbb2222111100000ggggaaaabbbb2222111100000ggggaaaabbbb2222111100000ggggaaaabbbb2222111100000ggggaaaabbbb2222111100000ggggaaaabbbb2222111100000ggggaaaabbbb2222111100000ggggaaaabbbb2222111100000gggg12345678901234567890123456789012345678901234") +local result = core.WaitForResponseTimeout(0x0611,1000) +--- Oh, and nonce2Key is not 'glued' yet. +print("err", result) \ No newline at end of file -- 2.39.5