mirror of
https://github.com/RfidResearchGroup/proxmark3.git
synced 2025-07-16 10:03:04 -07:00
style
This commit is contained in:
parent
b19973368d
commit
22fd440c83
14 changed files with 270 additions and 222 deletions
|
@ -1312,7 +1312,7 @@ static void print_blocks_15693(uint8_t *data, uint16_t bytes, int blocksize, boo
|
|||
|
||||
// suppress repeating blocks, truncate as such that the first and last block with the same data is shown
|
||||
// but the blocks in between are replaced with a single line of "......" if dense_output is enabled
|
||||
if ( dense_output &&
|
||||
if (dense_output &&
|
||||
(i > 6) &&
|
||||
(i < (blocks - 1)) &&
|
||||
(in_repeated_block == false) &&
|
||||
|
|
|
@ -519,7 +519,7 @@ static const xerox_part_t xerox_part_mappings[] = {
|
|||
static const xerox_part_t *get_xerox_part_info(const char *pn) {
|
||||
for (int i = 0; i < ARRAYLEN(xerox_part_mappings); i++) {
|
||||
// Todo: make str_startswith, accept additional "Maximum number of characters to compare"
|
||||
if(strncmp(pn, xerox_part_mappings[i].partnumber, strlen(pn)-3) == 0){
|
||||
if (strncmp(pn, xerox_part_mappings[i].partnumber, strlen(pn) - 3) == 0) {
|
||||
return &xerox_part_mappings[i];
|
||||
}
|
||||
}
|
||||
|
@ -911,7 +911,7 @@ static int CmdHFXeroxDump(const char *Cmd) {
|
|||
, (decrypt) ? "-dump-dec" : "-dump"
|
||||
, card.uidlen
|
||||
);
|
||||
}
|
||||
}
|
||||
|
||||
pm3_save_dump(filename, data, blockno * XEROX_BLOCK_SIZE, jsf14b_v2);
|
||||
return PM3_SUCCESS;
|
||||
|
|
|
@ -674,7 +674,7 @@ static void printEM4x05config(em_tech_type_t card_type, uint32_t wordData) {
|
|||
PrintAndLogEx(INFO, "Default read..... " _YELLOW_("%u") " blocks", numblks);
|
||||
PrintAndLogEx(INFO, "Last word read... " _YELLOW_("%u") " th block", LWR);
|
||||
|
||||
uint8_t bits[32+1] = {0};
|
||||
uint8_t bits[32 + 1] = {0};
|
||||
num_to_bytebitsLSBF(wordData, 32, bits);
|
||||
const char *bs = sprint_bytebits_bin(bits, 32);
|
||||
|
||||
|
@ -693,13 +693,13 @@ static void printEM4x05config(em_tech_type_t card_type, uint32_t wordData) {
|
|||
if (card_type == EM_4369 || card_type == EM_4469) {
|
||||
PrintAndLogEx(INFO, "%s", sprint_breakdown_bin(C_NONE, bs, 32, 10, 2, cf));
|
||||
} else {
|
||||
PrintAndLogEx(INFO, "%s", sprint_breakdown_bin( (PSKcf) ? C_RED : C_NONE, bs, 32, 10, 2, "Must be 0"));
|
||||
PrintAndLogEx(INFO, "%s", sprint_breakdown_bin((PSKcf) ? C_RED : C_NONE, bs, 32, 10, 2, "Must be 0"));
|
||||
}
|
||||
|
||||
if (card_type == EM_4305) {
|
||||
PrintAndLogEx(INFO, "%s", sprint_breakdown_bin(C_NONE, bs, 32, 12, 2, "Delayed ON"));
|
||||
} else {
|
||||
PrintAndLogEx(INFO, "%s", sprint_breakdown_bin( (delay) ? C_RED : C_NONE, bs, 32, 12, 2, "Must be 0"));
|
||||
PrintAndLogEx(INFO, "%s", sprint_breakdown_bin((delay) ? C_RED : C_NONE, bs, 32, 12, 2, "Must be 0"));
|
||||
}
|
||||
|
||||
PrintAndLogEx(INFO, "%s", sprint_breakdown_bin(C_NONE, bs, 32, 14, 4, "LWR, Last default read word "));
|
||||
|
@ -717,7 +717,7 @@ static void printEM4x05config(em_tech_type_t card_type, uint32_t wordData) {
|
|||
PrintAndLogEx(INFO, "%s", sprint_breakdown_bin(C_GREEN, bs, 32, 19, 1, "Read HK, not required"));
|
||||
}
|
||||
} else {
|
||||
PrintAndLogEx(INFO, "%s", sprint_breakdown_bin( (readHKL) ? C_RED : C_NONE, bs, 32, 19, 1, "Must be 0"));
|
||||
PrintAndLogEx(INFO, "%s", sprint_breakdown_bin((readHKL) ? C_RED : C_NONE, bs, 32, 19, 1, "Must be 0"));
|
||||
}
|
||||
|
||||
if (writeLogin) {
|
||||
|
@ -733,7 +733,7 @@ static void printEM4x05config(em_tech_type_t card_type, uint32_t wordData) {
|
|||
PrintAndLogEx(INFO, "%s", sprint_breakdown_bin(C_NONE, bs, 32, 21, 1, "Write HK, login not required"));
|
||||
}
|
||||
} else {
|
||||
PrintAndLogEx(INFO, "%s", sprint_breakdown_bin( (writeHKL) ? C_RED : C_NONE, bs, 32, 21, 1, "Must be 0"));
|
||||
PrintAndLogEx(INFO, "%s", sprint_breakdown_bin((writeHKL) ? C_RED : C_NONE, bs, 32, 21, 1, "Must be 0"));
|
||||
}
|
||||
|
||||
if (card_type == EM_4369 || card_type == EM_4469) {
|
||||
|
@ -743,7 +743,7 @@ static void printEM4x05config(em_tech_type_t card_type, uint32_t wordData) {
|
|||
PrintAndLogEx(INFO, "%s", sprint_breakdown_bin(C_NONE, bs, 32, 22, 1, "Read after write is OFF"));
|
||||
}
|
||||
} else {
|
||||
PrintAndLogEx(INFO, "%s", sprint_breakdown_bin( (raw) ? C_RED : C_NONE, bs, 32, 22, 1, "Must be 0"));
|
||||
PrintAndLogEx(INFO, "%s", sprint_breakdown_bin((raw) ? C_RED : C_NONE, bs, 32, 22, 1, "Must be 0"));
|
||||
}
|
||||
|
||||
if (disable) {
|
||||
|
@ -765,7 +765,7 @@ static void printEM4x05config(em_tech_type_t card_type, uint32_t wordData) {
|
|||
PrintAndLogEx(INFO, "%s", sprint_breakdown_bin(C_NONE, bs, 32, 25, 1, "Invert data? no"));
|
||||
}
|
||||
} else {
|
||||
PrintAndLogEx(INFO, "%s", sprint_breakdown_bin( (invert) ? C_RED : C_NONE, bs, 32, 25, 1, "Must be 0"));
|
||||
PrintAndLogEx(INFO, "%s", sprint_breakdown_bin((invert) ? C_RED : C_NONE, bs, 32, 25, 1, "Must be 0"));
|
||||
}
|
||||
|
||||
if (card_type == EM_4305) {
|
||||
|
@ -775,7 +775,7 @@ static void printEM4x05config(em_tech_type_t card_type, uint32_t wordData) {
|
|||
PrintAndLogEx(INFO, "%s", sprint_breakdown_bin(C_NONE, bs, 32, 26, 1, "Pigeon mode disabled"));
|
||||
}
|
||||
} else {
|
||||
PrintAndLogEx(INFO, "%s", sprint_breakdown_bin( (pigeon) ? C_RED : C_NONE, bs, 32, 26, 1, "Must be 0"));
|
||||
PrintAndLogEx(INFO, "%s", sprint_breakdown_bin((pigeon) ? C_RED : C_NONE, bs, 32, 26, 1, "Must be 0"));
|
||||
}
|
||||
|
||||
PrintAndLogEx(INFO, "%s", sprint_breakdown_bin(C_NONE, bs, 32, 27, 5, "RFU, Reserved for future use"));
|
||||
|
@ -883,10 +883,10 @@ static void em4x05_print_blocks(uint32_t cardtype, uint8_t *data, uint8_t dlen)
|
|||
return;
|
||||
}
|
||||
|
||||
uint32_t *d = (uint32_t*)data;
|
||||
uint32_t *d = (uint32_t *)data;
|
||||
|
||||
uint8_t i;
|
||||
for (i = 0; i< (dlen >> 2); i++) {
|
||||
for (i = 0; i < (dlen >> 2); i++) {
|
||||
d[i] = BSWAP_32(d[i]);
|
||||
}
|
||||
i = 0;
|
||||
|
@ -926,7 +926,7 @@ static void em4x05_print_blocks(uint32_t cardtype, uint8_t *data, uint8_t dlen)
|
|||
, (got_lock_bits) ? (lockbit ? _RED_("x") : " ") : _YELLOW_("?")
|
||||
, em4x05_annotation[i]
|
||||
);
|
||||
} else if ( i == EM_CONFIG_BLOCK) {
|
||||
} else if (i == EM_CONFIG_BLOCK) {
|
||||
PrintAndLogEx(INFO, " %02u | " _YELLOW_("%08X") " | %s | %s | " _YELLOW_("%s")
|
||||
, i
|
||||
, d[i]
|
||||
|
@ -1017,7 +1017,7 @@ static void em4x05_print_blocks(uint32_t cardtype, uint8_t *data, uint8_t dlen)
|
|||
, (got_lock_bits) ? (lockbit ? _RED_("x") : " ") : _YELLOW_("?")
|
||||
, em4x69_annotation[i]
|
||||
);
|
||||
} else if ( i == EM_CONFIG_BLOCK) {
|
||||
} else if (i == EM_CONFIG_BLOCK) {
|
||||
PrintAndLogEx(INFO, " %02u | " _YELLOW_("%08X") " | %s | %s | " _YELLOW_("%s")
|
||||
, i
|
||||
, d[i]
|
||||
|
|
|
@ -578,6 +578,7 @@ const static vocabulary_t vocabulary[] = {
|
|||
{ 0, "lf em 4x05 read" },
|
||||
{ 1, "lf em 4x05 sniff" },
|
||||
{ 0, "lf em 4x05 unlock" },
|
||||
{ 1, "lf em 4x05 view" },
|
||||
{ 0, "lf em 4x05 wipe" },
|
||||
{ 0, "lf em 4x05 write" },
|
||||
{ 1, "lf em 4x50 help" },
|
||||
|
|
|
@ -558,7 +558,7 @@ char *sprint_ascii(const uint8_t *data, const size_t len) {
|
|||
return sprint_ascii_ex(data, len, 0);
|
||||
}
|
||||
|
||||
char *sprint_breakdown_bin(color_t color, const char* bs, int width, int padn, int bits, const char* msg) {
|
||||
char *sprint_breakdown_bin(color_t color, const char *bs, int width, int padn, int bits, const char *msg) {
|
||||
|
||||
if (bs == NULL || width > 32) {
|
||||
return NULL;
|
||||
|
|
|
@ -88,7 +88,7 @@ char *sprint_hex_ascii(const uint8_t *data, const size_t len);
|
|||
char *sprint_ascii(const uint8_t *data, const size_t len);
|
||||
char *sprint_ascii_ex(const uint8_t *data, const size_t len, const size_t min_str_len);
|
||||
|
||||
char *sprint_breakdown_bin(color_t color, const char* bs, int width, int padn, int bits, const char* msg);
|
||||
char *sprint_breakdown_bin(color_t color, const char *bs, int width, int padn, int bits, const char *msg);
|
||||
|
||||
void print_buffer_with_offset(const uint8_t *data, const size_t len, int offset, bool print_header);
|
||||
void print_buffer(const uint8_t *data, const size_t len, int level);
|
||||
|
|
|
@ -228,16 +228,16 @@ int smart_generator_nibble_sequence(generator_context_t *ctx) {
|
|||
// also with offsets - A1A2A3, A2A3A4, etc
|
||||
// counter1 is high nibble (A, B, C), counter2 is low nibble (0,1, etc)
|
||||
|
||||
if(ctx->counter1 == 0){ // init values on first generator call
|
||||
if (ctx->counter1 == 0) { // init values on first generator call
|
||||
ctx->counter1 = 0x0A;
|
||||
}
|
||||
|
||||
uint8_t key_byte;
|
||||
|
||||
// we substract %2 value because max_offset must be even number
|
||||
uint8_t max_offset = 10 - (ctx->key_length / 2) - (ctx->key_length/2) % 2;
|
||||
uint8_t max_offset = 10 - (ctx->key_length / 2) - (ctx->key_length / 2) % 2;
|
||||
|
||||
if(ctx->counter1 == 0x10){
|
||||
if (ctx->counter1 == 0x10) {
|
||||
return BF_GENERATOR_END;
|
||||
}
|
||||
|
||||
|
@ -245,13 +245,13 @@ int smart_generator_nibble_sequence(generator_context_t *ctx) {
|
|||
|
||||
for (key_byte = 0; key_byte < ctx->key_length; key_byte++) {
|
||||
ctx->current_key |= (uint64_t) ctx->counter1 << (((ctx->key_length - key_byte - 1) * 8) + 4);
|
||||
ctx->current_key |= (uint64_t) (key_byte + ctx->counter2) %10 << ((ctx->key_length - key_byte - 1) * 8);
|
||||
ctx->current_key |= (uint64_t)(key_byte + ctx->counter2) % 10 << ((ctx->key_length - key_byte - 1) * 8);
|
||||
}
|
||||
|
||||
// counter 2 is the offset
|
||||
ctx->counter2++;
|
||||
|
||||
if(ctx->counter2 == max_offset){
|
||||
if (ctx->counter2 == max_offset) {
|
||||
ctx->counter2 = 0;
|
||||
ctx->counter1++;
|
||||
}
|
||||
|
|
|
@ -37,7 +37,7 @@ static void CONSTRUCTOR init_lut(void) {
|
|||
|
||||
for (uint32_t i = 0; i < 1 << 20; ++i) {
|
||||
filterlut[i] = filter(i);
|
||||
}
|
||||
}
|
||||
|
||||
for (uint32_t i = 0; i < 0x10E100A; i++) {
|
||||
uc_evenparity32_lut[i] = evenparity32(i);
|
||||
|
@ -47,7 +47,7 @@ static void CONSTRUCTOR init_lut(void) {
|
|||
// MSVC
|
||||
#if defined _MSC_VER
|
||||
|
||||
typedef void(__cdecl* PF)(void);
|
||||
typedef void(__cdecl *PF)(void);
|
||||
#pragma section(".CRT$XCG", read)
|
||||
__declspec(allocate(".CRT$XCG")) PF f[] = { init_lut };
|
||||
|
||||
|
@ -79,16 +79,14 @@ static inline void extend_table(uint32_t *tbl, uint32_t **end, int bit, int m1,
|
|||
*tbl |= tbl_filter ^ bit;
|
||||
update_contribution(tbl, m1, m2);
|
||||
*tbl ^= in;
|
||||
}
|
||||
else if (tbl_filter == bit) {
|
||||
} else if (tbl_filter == bit) {
|
||||
*++*end = tbl[1];
|
||||
tbl[1] = tbl[0] | 1;
|
||||
update_contribution(tbl, m1, m2);
|
||||
*tbl++ ^= in;
|
||||
update_contribution(tbl, m1, m2);
|
||||
*tbl ^= in;
|
||||
}
|
||||
else
|
||||
} else
|
||||
*tbl-- = *(*end)--;
|
||||
}
|
||||
}
|
||||
|
@ -102,12 +100,10 @@ static inline void extend_table_simple(uint32_t *tbl, uint32_t **end, int bit) {
|
|||
tbl_filter = filter(*tbl);
|
||||
if (tbl_filter ^ filter(*tbl | 1)) { // replace
|
||||
*tbl |= tbl_filter ^ bit;
|
||||
}
|
||||
else if (tbl_filter == bit) { // insert
|
||||
} else if (tbl_filter == bit) { // insert
|
||||
*++*end = *++tbl;
|
||||
*tbl = tbl[-1] | 1;
|
||||
}
|
||||
else { // drop
|
||||
} else { // drop
|
||||
*tbl-- = *(*end)--;
|
||||
}
|
||||
}
|
||||
|
|
|
@ -1277,21 +1277,21 @@
|
|||
"offline": false,
|
||||
"options": [
|
||||
"-h, --help This help",
|
||||
"-a active signal field ON without select",
|
||||
"-b <dec> number of bits to send. Useful for send partial byte",
|
||||
"-c calculate and append CRC",
|
||||
"-k keep signal field ON after receive",
|
||||
"-a Active signal field ON without select",
|
||||
"-c Calculate and append CRC",
|
||||
"-k Keep signal field ON after receive",
|
||||
"-3 ISO14443-3 select only (skip RATS)",
|
||||
"-r do not read response",
|
||||
"-s active signal field ON with select",
|
||||
"-t, --timeout <ms> timeout in milliseconds",
|
||||
"-r Do not read response",
|
||||
"-s Active signal field ON with select",
|
||||
"-t, --timeout <ms> Timeout in milliseconds",
|
||||
"-b <dec> Number of bits to send. Useful for send partial byte",
|
||||
"-v, --verbose Verbose output",
|
||||
"--topaz use Topaz protocol to send command",
|
||||
"--ecp use enhanced contactless polling",
|
||||
"--mag use Apple magsafe polling",
|
||||
"<hex> raw bytes to send"
|
||||
"--ecp Use enhanced contactless polling",
|
||||
"--mag Use Apple magsafe polling",
|
||||
"--topaz Use Topaz protocol to send command",
|
||||
"<hex> Raw bytes to send"
|
||||
],
|
||||
"usage": "hf 14a raw [-hack3rsv] [-b <dec>] [-t <ms>] [--topaz] [--ecp] [--mag] <hex> [<hex>]..."
|
||||
"usage": "hf 14a raw [-hack3rsv] [-t <ms>] [-b <dec>] [--ecp] [--mag] [--topaz] <hex> [<hex>]..."
|
||||
},
|
||||
"hf 14a reader": {
|
||||
"command": "hf 14a reader",
|
||||
|
@ -1450,7 +1450,7 @@
|
|||
},
|
||||
"hf 14b raw": {
|
||||
"command": "hf 14b raw",
|
||||
"description": "Sends raw bytes to card",
|
||||
"description": "Sends raw bytes to card. Activates field by default",
|
||||
"notes": [
|
||||
"hf 14b raw -cks --data 0200a40400 -> standard select, apdu 0200a4000 (7816)",
|
||||
"hf 14b raw -ck --sr --data 0200a40400 -> SRx select",
|
||||
|
@ -1459,18 +1459,20 @@
|
|||
"offline": false,
|
||||
"options": [
|
||||
"-h, --help This help",
|
||||
"-k, --keep leave the signal field ON after receive response",
|
||||
"-s, --std activate field, use ISO14B select",
|
||||
"--sr activate field, use SRx ST select",
|
||||
"--cts activate field, use ASK C-ticket select",
|
||||
"--xrx activate field, use Fuji/Xerox select",
|
||||
"-a active signal field ON without select",
|
||||
"-c, --crc calculate and append CRC",
|
||||
"-k, --keep leave the signal field ON after receive response",
|
||||
"-d, --data <hex> data, bytes to send",
|
||||
"-r do not read response from card",
|
||||
"-t, --timeout <dec> timeout in ms",
|
||||
"-v, --verbose verbose output",
|
||||
"-d, --data <hex> data, bytes to send"
|
||||
"-s, --std use ISO14B select",
|
||||
"--sr use SRx ST select",
|
||||
"--cts use ASK C-ticket select",
|
||||
"--xrx use Fuji/Xerox select",
|
||||
"--pico use Picopass select",
|
||||
"-v, --verbose verbose output"
|
||||
],
|
||||
"usage": "hf 14b raw [-hkscrv] [--sr] [--cts] [--xrx] [-t <dec>] [-d <hex>]"
|
||||
"usage": "hf 14b raw [-hackrsv] [-d <hex>] [-t <dec>] [--sr] [--cts] [--xrx] [--pico]"
|
||||
},
|
||||
"hf 14b rdbl": {
|
||||
"command": "hf 14b rdbl",
|
||||
|
@ -1659,9 +1661,10 @@
|
|||
"options": [
|
||||
"-h, --help This help",
|
||||
"-b, --blocksize <dec> block size (def 4)",
|
||||
"-c, --count <dec> number of blocks to display (def all)"
|
||||
"-c, --count <dec> number of blocks to display (def all)",
|
||||
"-z, --dense dense dump output style"
|
||||
],
|
||||
"usage": "hf 15 eview [-h] [-b <dec>] [-c <dec>]"
|
||||
"usage": "hf 15 eview [-hz] [-b <dec>] [-c <dec>]"
|
||||
},
|
||||
"hf 15 findafi": {
|
||||
"command": "hf 15 findafi",
|
||||
|
@ -1748,21 +1751,21 @@
|
|||
"command": "hf 15 raw",
|
||||
"description": "Sends raw bytes over ISO-15693 to card",
|
||||
"notes": [
|
||||
"hf 15 raw -sc -d 260100 -> add crc",
|
||||
"hf 15 raw -skrc -d 260100 -> add crc, keep field on, skip response"
|
||||
"hf 15 raw -ac -d 260100 -> activate, add crc",
|
||||
"hf 15 raw -akrc -d 260100 -> activate, add crc, keep field on, skip response"
|
||||
],
|
||||
"offline": false,
|
||||
"options": [
|
||||
"-h, --help This help",
|
||||
"-2 use slower '1 out of 256' mode",
|
||||
"-a activate field",
|
||||
"-c, --crc calculate and append CRC",
|
||||
"-k keep signal field ON after receive",
|
||||
"-2 use slower '1 out of 256' mode",
|
||||
"-r do not read response",
|
||||
"-d, --data <hex> raw bytes to send",
|
||||
"-w, --wait wait longer for response. For writes etc.",
|
||||
"-a activate field"
|
||||
"-w, --wait wait longer for response. For writes etc."
|
||||
],
|
||||
"usage": "hf 15 raw [-h2ckrwa] -d <hex>"
|
||||
"usage": "hf 15 raw [-hack2rw] -d <hex>"
|
||||
},
|
||||
"hf 15 rdbl": {
|
||||
"command": "hf 15 rdbl",
|
||||
|
@ -1958,9 +1961,10 @@
|
|||
"offline": true,
|
||||
"options": [
|
||||
"-h, --help This help",
|
||||
"-f, --file <fn> Specify a filename for dump file"
|
||||
"-f, --file <fn> Specify a filename for dump file",
|
||||
"-z, --dense dense dump output style"
|
||||
],
|
||||
"usage": "hf 15 view [-h] -f <fn>"
|
||||
"usage": "hf 15 view [-hz] -f <fn>"
|
||||
},
|
||||
"hf 15 wipe": {
|
||||
"command": "hf 15 wipe",
|
||||
|
@ -4084,6 +4088,29 @@
|
|||
],
|
||||
"usage": "hf mf autopwn [-hablv] [-k <hex>]... [-s <dec>] [-f <fn>] [--slow] [--mini] [--1k] [--2k] [--4k] [--in] [--im] [--is] [--ia] [--i2] [--i5]"
|
||||
},
|
||||
"hf mf brute": {
|
||||
"command": "hf mf brute",
|
||||
"description": "This is a smart bruteforce, exploiting common patterns, bugs and bad designs in key generators.",
|
||||
"notes": [
|
||||
"hf mf brute --mini -> Key recovery against MIFARE Mini",
|
||||
"hf mf brute --1k -> Key recovery against MIFARE Classic 1k",
|
||||
"hf mf brute --2k -> Key recovery against MIFARE 2k",
|
||||
"hf mf brute --4k -> Key recovery against MIFARE 4k",
|
||||
"hf mf brute --1k --emu -> Target 1K, write keys to emulator memory",
|
||||
"hf mf brute --1k --dump -> Target 1K, write keys to file"
|
||||
],
|
||||
"offline": false,
|
||||
"options": [
|
||||
"-h, --help This help",
|
||||
"--mini MIFARE Classic Mini / S20",
|
||||
"--1k MIFARE Classic 1k / S50 (default)",
|
||||
"--2k MIFARE Classic/Plus 2k",
|
||||
"--4k MIFARE Classic 4k / S70",
|
||||
"--emu Fill simulator keys from found keys",
|
||||
"--dump Dump found keys to binary file"
|
||||
],
|
||||
"usage": "hf mf brute [-h] [--mini] [--1k] [--2k] [--4k] [--emu] [--dump]"
|
||||
},
|
||||
"hf mf cgetblk": {
|
||||
"command": "hf mf cgetblk",
|
||||
"description": "Get block data from magic Chinese card. Only works with magic gen1a cards",
|
||||
|
@ -4154,9 +4181,13 @@
|
|||
"options": [
|
||||
"-h, --help This help",
|
||||
"-f, --file <fn> Specify a filename for dump file",
|
||||
"--mini MIFARE Classic Mini / S20",
|
||||
"--1k MIFARE Classic 1k / S50 (def)",
|
||||
"--2k MIFARE Classic/Plus 2k",
|
||||
"--4k MIFARE Classic 4k / S70",
|
||||
"--emu from emulator memory"
|
||||
],
|
||||
"usage": "hf mf cload [-h] [-f <fn>] [--emu]"
|
||||
"usage": "hf mf cload [-h] [-f <fn>] [--mini] [--1k] [--2k] [--4k] [--emu]"
|
||||
},
|
||||
"hf mf csave": {
|
||||
"command": "hf mf csave",
|
||||
|
@ -8304,7 +8335,7 @@
|
|||
},
|
||||
"lf em 4x05 help": {
|
||||
"command": "lf em 4x05 help",
|
||||
"description": "help This help demod Demodulate a EM4x05/EM4x69 tag from the GraphBuffer sniff Attempt to recover em4x05 commands from sample buffer --------------------------------------------------------------------------------------- lf em 4x05 brute available offline: no This command tries to bruteforce the password of a EM4205/4305/4469/4569 The loop is running on device side, press Proxmark3 button to abort",
|
||||
"description": "help This help ----------- ----------------------- general ----------------------- demod Demodulate a EM4x05/EM4x69 tag from the GraphBuffer sniff Attempt to recover em4x05 commands from sample buffer view Display content from tag dump file --------------------------------------------------------------------------------------- lf em 4x05 brute available offline: no This command tries to bruteforce the password of a EM4205/4305/4469/4569 The loop is running on device side, press Proxmark3 button to abort",
|
||||
"notes": [
|
||||
"Note: if you get many false positives, change position on the antennalf em 4x05 brute",
|
||||
"lf em 4x05 brute -n 1 -> stop after first candidate found",
|
||||
|
@ -8328,9 +8359,10 @@
|
|||
"offline": false,
|
||||
"options": [
|
||||
"-h, --help This help",
|
||||
"-p, --pwd <hex> optional - password, 4 hex bytes"
|
||||
"-p, --pwd <hex> optional - password, 4 hex bytes",
|
||||
"-v, --verbose Verbose output"
|
||||
],
|
||||
"usage": "lf em 4x05 info [-h] [-p <hex>]"
|
||||
"usage": "lf em 4x05 info [-hv] [-p <hex>]"
|
||||
},
|
||||
"lf em 4x05 read": {
|
||||
"command": "lf em 4x05 read",
|
||||
|
@ -8382,6 +8414,20 @@
|
|||
],
|
||||
"usage": "lf em 4x05 unlock [-hv] [-n <int>] [-s <us>] [-e <us>] [-p <hex>]"
|
||||
},
|
||||
"lf em 4x05 view": {
|
||||
"command": "lf em 4x05 view",
|
||||
"description": "Print a EM4205/4305/4369/4469 dump file (bin/eml/json) note: We don't track if password is known in current dump file formats. All zeros password block might be filler data",
|
||||
"notes": [
|
||||
"lf em 4x05 view -f lf-4x05-01020304-dump.json"
|
||||
],
|
||||
"offline": true,
|
||||
"options": [
|
||||
"-h, --help This help",
|
||||
"-f, --file <fn> Specify a filename for dump file",
|
||||
"-v, --verbose Verbose output"
|
||||
],
|
||||
"usage": "lf em ex05 view [-hv] -f <fn>"
|
||||
},
|
||||
"lf em 4x05 wipe": {
|
||||
"command": "lf em 4x05 wipe",
|
||||
"description": "Wipe EM4x05/EM4x69. Tag must be on antenna.",
|
||||
|
@ -8494,12 +8540,13 @@
|
|||
"description": "help This help ----------- --------------------- operations --------------------- ----------- --------------------- simulation --------------------- --------------------------------------------------------------------------------------- lf em 4x50 brute available offline: no Tries to bruteforce the password of a EM4x50 card. Function can be stopped by pressing pm3 button.",
|
||||
"notes": [
|
||||
"lf em 4x50 brute --mode range --begin 12330000 --end 12340000 -> tries pwds from 0x12330000 to 0x12340000",
|
||||
"lf em 4x50 brute --mode charset --digits --uppercase -> tries all combinations of ASCII codes for digits and uppercase letters"
|
||||
"lf em 4x50 brute --mode charset --digits --uppercase -> tries all combinations of ASCII codes for digits and uppercase letters",
|
||||
"lf em 4x50 brute --mode smart -> enable 'smart' pattern key cracking"
|
||||
],
|
||||
"offline": true,
|
||||
"options": [
|
||||
"-h, --help This help",
|
||||
"--mode <str> Bruteforce mode (range|charset)",
|
||||
"--mode <str> Bruteforce mode (range|charset|smart)",
|
||||
"--begin <hex> Range mode - start of the key range",
|
||||
"--end <hex> Range mode - end of the key range",
|
||||
"--digits Charset mode - include ASCII codes for digits",
|
||||
|
@ -8763,9 +8810,10 @@
|
|||
"--err <dec> maximum allowed errors (default 100)",
|
||||
"--len <dec> maximum length",
|
||||
"-i, --invert invert output",
|
||||
"-a, --amp amplify signal"
|
||||
"-a, --amp amplify signal",
|
||||
"--bin <bin> Binary string i.e 0001001001"
|
||||
],
|
||||
"usage": "lf em 410x demod [-hia] [--clk <dec>] [--err <dec>] [--len <dec>]"
|
||||
"usage": "lf em 410x demod [-hia] [--clk <dec>] [--err <dec>] [--len <dec>] [--bin <bin>]"
|
||||
},
|
||||
"lf fdxb clone": {
|
||||
"command": "lf fdxb clone",
|
||||
|
@ -9304,13 +9352,15 @@
|
|||
"command": "lf idteck help",
|
||||
"description": "help This help demod demodulate an Idteck tag from the GraphBuffer --------------------------------------------------------------------------------------- lf idteck demod available offline: yes Try to find Idteck preamble, if found decode / descramble data",
|
||||
"notes": [
|
||||
"lf idteck demod"
|
||||
"lf idteck demod",
|
||||
"lf idteck demod --raw 4944544B351FBE4B"
|
||||
],
|
||||
"offline": true,
|
||||
"options": [
|
||||
"-h, --help This help"
|
||||
"-h, --help This help",
|
||||
"-r, --raw <hex> raw bytes"
|
||||
],
|
||||
"usage": "lf idteck demod [-h]"
|
||||
"usage": "lf idteck demod [-h] [-r <hex>]"
|
||||
},
|
||||
"lf idteck reader": {
|
||||
"command": "lf idteck reader",
|
||||
|
@ -12240,8 +12290,8 @@
|
|||
}
|
||||
},
|
||||
"metadata": {
|
||||
"commands_extracted": 707,
|
||||
"commands_extracted": 709,
|
||||
"extracted_by": "PM3Help2JSON v1.00",
|
||||
"extracted_on": "2024-01-16T12:52:56"
|
||||
"extracted_on": "2024-01-18T15:39:50"
|
||||
}
|
||||
}
|
|
@ -909,6 +909,7 @@ Check column "offline" for their availability.
|
|||
|`lf em 4x05 read `|N |`Read word data from EM4x05/EM4x69`
|
||||
|`lf em 4x05 sniff `|Y |`Attempt to recover em4x05 commands from sample buffer`
|
||||
|`lf em 4x05 unlock `|N |`Execute tear off against EM4x05/EM4x69`
|
||||
|`lf em 4x05 view `|Y |`Display content from tag dump file`
|
||||
|`lf em 4x05 wipe `|N |`Wipe EM4x05/EM4x69 tag`
|
||||
|`lf em 4x05 write `|N |`Write word data to EM4x05/EM4x69`
|
||||
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue