mirror of
https://github.com/RfidResearchGroup/proxmark3.git
synced 2025-08-14 18:48:13 -07:00
Rename data_readpwdmem.lua -> mem_readpwd.lua and data_readpwdmem-spiffs.lua -> mem_spiffs_readpwd.lua
This commit is contained in:
parent
9dc2f38ac8
commit
3909053cee
3 changed files with 12 additions and 12 deletions
148
client/luascripts/mem_readpwd.lua
Normal file
148
client/luascripts/mem_readpwd.lua
Normal file
|
@ -0,0 +1,148 @@
|
|||
local getopt = require('getopt')
|
||||
local bin = require('bin')
|
||||
local ansicolors = require('ansicolors')
|
||||
|
||||
copyright = 'Copyright (c) 2018 Bogito. All rights reserved.'
|
||||
author = 'Bogito'
|
||||
version = 'v1.0.4'
|
||||
desc = [[
|
||||
This script will read the flash memory of RDV4 and print the stored passwords/keys.
|
||||
|
||||
It was meant to be used as a help tool after using the BogRun standalone mode before SPIFFS.
|
||||
You should now use data_read_pwd_mem_spiffs instead after the updated BogRun standalone mode.
|
||||
|
||||
(Iceman) script adapted to read and print keys in the default dictionary flashmemory sections.
|
||||
]]
|
||||
example = [[
|
||||
-- This will scan the first 256 bytes of flash memory for stored passwords
|
||||
script run mem_readpwd
|
||||
|
||||
-- This will scan 256 bytes of flash memory at offset 64 for stored passwords
|
||||
script run mem_readpwd -o 64
|
||||
|
||||
-- This will scan 32 bytes of flash memory at offset 64 for stored passwords
|
||||
script run mem_readpwd -o 64 -l 32
|
||||
|
||||
-- This will print the stored Mifare dictionary keys
|
||||
script run mem_readpwd -m
|
||||
|
||||
-- This will print the stored t55xx dictionary passwords
|
||||
script run mem_readpwd -t
|
||||
|
||||
-- This will print the stored iClass dictionary keys
|
||||
script run mem_readpwd -i
|
||||
]]
|
||||
usage = [[
|
||||
script run mem_readpwd [-h] [-o <offset>] [-l <length>] [-k <keylength>] [-m] [-t] [-i]
|
||||
]]
|
||||
arguments = [[
|
||||
-h : this help
|
||||
-o <offset> : memory offset, default is 0
|
||||
-l <length> : length in bytes, default is 256
|
||||
-k <keylen> : key length in bytes <4|6|8> , default is 4
|
||||
-m : print Mifare dictionary keys
|
||||
-t : print t55xx dictionary passwords
|
||||
-i : print iClass dictionary keys
|
||||
]]
|
||||
---
|
||||
-- This is only meant to be used when errors occur
|
||||
local function oops(err)
|
||||
print('ERROR:', err)
|
||||
core.clearCommandBuffer()
|
||||
return nil, err
|
||||
end
|
||||
---
|
||||
-- Usage help
|
||||
local function help()
|
||||
print(copyright)
|
||||
print(author)
|
||||
print(version)
|
||||
print(desc)
|
||||
print(ansicolors.cyan..'Usage'..ansicolors.reset)
|
||||
print(usage)
|
||||
print(ansicolors.cyan..'Arguments'..ansicolors.reset)
|
||||
print(arguments)
|
||||
print(ansicolors.cyan..'Example usage'..ansicolors.reset)
|
||||
print(example)
|
||||
end
|
||||
---
|
||||
-- The main entry point
|
||||
local function main(args)
|
||||
|
||||
print( string.rep('--',20) )
|
||||
print( string.rep('--',20) )
|
||||
print()
|
||||
|
||||
local data, err, quadlet
|
||||
local offset = 0
|
||||
local length = 256
|
||||
local keylength = 4
|
||||
local usedkey = false
|
||||
|
||||
for o, a in getopt.getopt(args, 'ho:l:k:mti') do
|
||||
|
||||
-- help
|
||||
if o == 'h' then return help() end
|
||||
|
||||
-- offset
|
||||
if o == 'o' then offset = tonumber(a) end
|
||||
|
||||
-- num of bytes to read
|
||||
if o == 'l' then
|
||||
length = tonumber(a)
|
||||
if length < 0 or length > 256 then
|
||||
return oops('Error: Length is not valid. Must be less than 256')
|
||||
end
|
||||
end
|
||||
|
||||
-- keylength
|
||||
if o == 'k' then keylength = tonumber(a); usedkey = true end
|
||||
|
||||
if o == 'm' then keylength = 6; usedkey = true; length = 8192; offset = 0x3F000-0x6000; end
|
||||
if o == 't' then keylength = 4; usedkey = true; length = 4096; offset = 0x3F000-0x3000; end
|
||||
if o == 'i' then keylength = 8; usedkey = true; length = 4096; offset = 0x3F000-0x4000; end
|
||||
end
|
||||
|
||||
if (offset < 0) or (offset % 4 ~= 0) then
|
||||
return oops('Error: Offset is not valid. Mod-4 values are only allowed.')
|
||||
end
|
||||
|
||||
print('Memory offset', offset)
|
||||
print('Length ', length)
|
||||
print('Key length ', keylength)
|
||||
print( string.rep('--', 20) )
|
||||
|
||||
data, err = core.GetFromFlashMem(offset, length)
|
||||
if err then return oops(err) end
|
||||
|
||||
if usedkey then
|
||||
|
||||
_, keys, s = bin.unpack('SH'..length-2, data)
|
||||
if keys == 0xFFFF then return "No keys found in section" end
|
||||
|
||||
local kl = keylength * 2
|
||||
for i = 1, keys do
|
||||
key = string.sub(s, (i - 1) * kl + 1, i * kl )
|
||||
print(string.format('[%02d] %s',i, key))
|
||||
end
|
||||
print( string.rep('--',20) )
|
||||
print( ('[+] found %d passwords'):format(keys))
|
||||
else
|
||||
|
||||
_, s = bin.unpack('H'..length, data)
|
||||
|
||||
local cnt = 0, i
|
||||
for i = 1, (length/keylength) do
|
||||
|
||||
key = string.sub(s, (i-1)*8+1, i*8)
|
||||
if key == 'FFFFFFFF' then break end
|
||||
print(string.format('[%02d] %s',i, key))
|
||||
cnt = cnt + 1
|
||||
end
|
||||
print( string.rep('--',20) )
|
||||
print( ('[+] found %d passwords'):format(cnt))
|
||||
end
|
||||
print( string.rep('--',20) )
|
||||
end
|
||||
|
||||
main(args)
|
Loading…
Add table
Add a link
Reference in a new issue