mirror of
https://github.com/RfidResearchGroup/proxmark3.git
synced 2025-08-20 21:33:47 -07:00
Rename data_readpwdmem.lua -> mem_readpwd.lua and data_readpwdmem-spiffs.lua -> mem_spiffs_readpwd.lua
This commit is contained in:
parent
9dc2f38ac8
commit
3909053cee
3 changed files with 12 additions and 12 deletions
|
@ -15,7 +15,7 @@ The retrieved sniffing session can be acquired by connecting the device
|
||||||
to a client that supports the reconnect capability and issue 'hf 14a list'.
|
to a client that supports the reconnect capability and issue 'hf 14a list'.
|
||||||
|
|
||||||
In order to view the grabbed authentication attempts in the flash mem,
|
In order to view the grabbed authentication attempts in the flash mem,
|
||||||
you can simply run 'script run data_readpwdmem' or just 'mem dump p l 256'
|
you can simply run 'script run mem_readpwd' or just 'mem dump p l 256'
|
||||||
from the client to view the stored quadlets.
|
from the client to view the stored quadlets.
|
||||||
*/
|
*/
|
||||||
|
|
||||||
|
|
|
@ -15,25 +15,25 @@ You should now use data_read_pwd_mem_spiffs instead after the updated BogRun sta
|
||||||
]]
|
]]
|
||||||
example = [[
|
example = [[
|
||||||
-- This will scan the first 256 bytes of flash memory for stored passwords
|
-- This will scan the first 256 bytes of flash memory for stored passwords
|
||||||
script run data_readpwdmem
|
script run mem_readpwd
|
||||||
|
|
||||||
-- This will scan 256 bytes of flash memory at offset 64 for stored passwords
|
-- This will scan 256 bytes of flash memory at offset 64 for stored passwords
|
||||||
script run data_readpwdmem -o 64
|
script run mem_readpwd -o 64
|
||||||
|
|
||||||
-- This will scan 32 bytes of flash memory at offset 64 for stored passwords
|
-- This will scan 32 bytes of flash memory at offset 64 for stored passwords
|
||||||
script run data_readpwdmem -o 64 -l 32
|
script run mem_readpwd -o 64 -l 32
|
||||||
|
|
||||||
-- This will print the stored Mifare dictionary keys
|
-- This will print the stored Mifare dictionary keys
|
||||||
script run data_readpwdmem -m
|
script run mem_readpwd -m
|
||||||
|
|
||||||
-- This will print the stored t55xx dictionary passwords
|
-- This will print the stored t55xx dictionary passwords
|
||||||
script run data_readpwdmem -t
|
script run mem_readpwd -t
|
||||||
|
|
||||||
-- This will print the stored iClass dictionary keys
|
-- This will print the stored iClass dictionary keys
|
||||||
script run data_readpwdmem -i
|
script run mem_readpwd -i
|
||||||
]]
|
]]
|
||||||
usage = [[
|
usage = [[
|
||||||
script run data_readpwdmem [-h] [-o <offset>] [-l <length>] [-k <keylength>] [-m] [-t] [-i]
|
script run mem_readpwd [-h] [-o <offset>] [-l <length>] [-k <keylength>] [-m] [-t] [-i]
|
||||||
]]
|
]]
|
||||||
arguments = [[
|
arguments = [[
|
||||||
-h : this help
|
-h : this help
|
|
@ -11,16 +11,16 @@ It was meant to be used as a help tool after using the BogRun standalone mode.
|
||||||
]]
|
]]
|
||||||
example = [[
|
example = [[
|
||||||
-- This will read the hf_bog.log file in SPIFFS and print the stored passwords
|
-- This will read the hf_bog.log file in SPIFFS and print the stored passwords
|
||||||
script run data_readpwdmem-spiffs
|
script run mem_spiffs_readpwd
|
||||||
|
|
||||||
-- This will read the other.log file in SPIFFS and print the stored passwords
|
-- This will read the other.log file in SPIFFS and print the stored passwords
|
||||||
script run data_readpwdmem-spiffs -f other.log
|
script run mem_spiffs_readpwd -f other.log
|
||||||
|
|
||||||
-- This will delete the hf_bog.log file from SPIFFS
|
-- This will delete the hf_bog.log file from SPIFFS
|
||||||
script run data_readpwdmem-spiffs -r
|
script run mem_spiffs_readpwd -r
|
||||||
]]
|
]]
|
||||||
usage = [[
|
usage = [[
|
||||||
script run data_readpwdmem-spiffs [-h] [-f <filename>] [-r]
|
script run mem_spiffs_readpwd [-h] [-f <filename>] [-r]
|
||||||
]]
|
]]
|
||||||
arguments = [[
|
arguments = [[
|
||||||
-h : this help
|
-h : this help
|
Loading…
Add table
Add a link
Reference in a new issue