From 11b0a69869ded8f437c459c8dc02e6fd8393b0a8 Mon Sep 17 00:00:00 2001 From: bogiton <34060135+bogiton@users.noreply.github.com> Date: Fri, 8 Nov 2019 17:44:52 +0000 Subject: [PATCH] Update read_pwd_mem.lua --- client/luascripts/read_pwd_mem.lua | 19 +++++++++++++------ 1 file changed, 13 insertions(+), 6 deletions(-) diff --git a/client/luascripts/read_pwd_mem.lua b/client/luascripts/read_pwd_mem.lua index 4a097d26d..8456fd51f 100644 --- a/client/luascripts/read_pwd_mem.lua +++ b/client/luascripts/read_pwd_mem.lua @@ -3,11 +3,13 @@ local bin = require('bin') copyright = 'Copyright (c) 2018 Bogito. All rights reserved.' author = 'Bogito' -version = 'v1.0.2' +version = 'v1.0.3' desc = [[ -This script will read the flash memory of RDV4 and print the stored passwords. -It was meant to be used as a help tool after using the BogRun standalone mode. +This script will read the flash memory of RDV4 and print the stored passwords/keys. + +It was meant to be used as a help tool after using the BogRun standalone mode before SPIFFS. +You should now use read_pwd_mem_spiffs instead after the updated BogRun standalone mode. (Iceman) script adapted to read and print keys in the default dictionary flashmemory sections. ]] @@ -22,8 +24,14 @@ example = -- This will scan 32 bytes of flash memory at offset 64 for stored passwords script run read_pwd_mem -o 64 -l 32 - -- This will print found - script run read_pwd_mem -o 241664 -k 6 + -- This will print the stored Mifare dictionary keys + script run read_pwd_mem -m + + -- This will print the stored t55xx dictionary passwords + script run read_pwd_mem -t + + -- This will print the stored iClass dictionary keys + script run read_pwd_mem -i ]] usage = [[ @@ -66,7 +74,6 @@ local function main(args) print() local data, err, quadlet - local cnt = 0 local offset = 0 local length = 256 local keylength = 4