mirror of
https://github.com/RfidResearchGroup/proxmark3.git
synced 2025-08-19 21:03:48 -07:00
fix lau scripts renaming
This commit is contained in:
parent
6414e00f37
commit
610b456a97
17 changed files with 35 additions and 35 deletions
|
@ -187,7 +187,7 @@ void RunMod(void) {
|
||||||
read_successful = false;
|
read_successful = false;
|
||||||
break;
|
break;
|
||||||
}
|
}
|
||||||
// We're skipping 14 blocks (56 bytes) here, as that "[...] has version/signature/counter data here" according to comments on dumptoemul-mfu
|
// We're skipping 14 blocks (56 bytes) here, as that "[...] has version/signature/counter data here" according to comments on hf_mfu_dumptoemulator
|
||||||
// When converting a bin, it's almost all 0 other than one 0x0F byte, and functionality seems to be unaffected if that byte is set to 0x00.
|
// When converting a bin, it's almost all 0 other than one 0x0F byte, and functionality seems to be unaffected if that byte is set to 0x00.
|
||||||
emlSetMem_xt(dataout, 14 + i, 1, 4);
|
emlSetMem_xt(dataout, 14 + i, 1, 4);
|
||||||
Dbhexdump(4, dataout, 0);
|
Dbhexdump(4, dataout, 0);
|
||||||
|
|
|
@ -15,7 +15,7 @@ The retrieved sniffing session can be acquired by connecting the device
|
||||||
to a client that supports the reconnect capability and issue 'hf 14a list'.
|
to a client that supports the reconnect capability and issue 'hf 14a list'.
|
||||||
|
|
||||||
In order to view the grabbed authentication attempts in the flash mem,
|
In order to view the grabbed authentication attempts in the flash mem,
|
||||||
you can simply run 'script run read_pwd_mem' or just 'mem dump p l 256'
|
you can simply run 'script run data_readpwdmem' or just 'mem dump p l 256'
|
||||||
from the client to view the stored quadlets.
|
from the client to view the stored quadlets.
|
||||||
*/
|
*/
|
||||||
|
|
||||||
|
@ -249,5 +249,5 @@ void RunMod(void) {
|
||||||
LEDsoff();
|
LEDsoff();
|
||||||
SpinDelay(300);
|
SpinDelay(300);
|
||||||
Dbprintf("- [ End ] -> You can take shell back ...");
|
Dbprintf("- [ End ] -> You can take shell back ...");
|
||||||
Dbprintf("- [ ! ] -> use 'script run read_pwd_mem_spiffs' to print passwords");
|
Dbprintf("- [ ! ] -> use 'script run data_read_pwd_mem_spiffs' to print passwords");
|
||||||
}
|
}
|
||||||
|
|
|
@ -4,7 +4,7 @@ local getopt = require('getopt')
|
||||||
local ansicolors = require('ansicolors')
|
local ansicolors = require('ansicolors')
|
||||||
|
|
||||||
copyright = ''
|
copyright = ''
|
||||||
usage = 'script run parameters.lua -a 1 -blala -c -de'
|
usage = 'script run data_example_parameters.lua -a 1 -blala -c -de'
|
||||||
author = 'Martin Holst Swende'
|
author = 'Martin Holst Swende'
|
||||||
version = 'v1.0.2'
|
version = 'v1.0.2'
|
||||||
desc = [[
|
desc = [[
|
||||||
|
@ -52,7 +52,7 @@ local function main(args)
|
||||||
5 parameters; two with values and three flags. The following
|
5 parameters; two with values and three flags. The following
|
||||||
should be valid:
|
should be valid:
|
||||||
|
|
||||||
script run parameters.lua -a 1 -blala -c -de
|
script run data_example_parameters.lua -a 1 -blala -c -de
|
||||||
|
|
||||||
Notice two things:
|
Notice two things:
|
||||||
1. 'blala' works just like 'b lala', both set 'b' to 'lala'
|
1. 'blala' works just like 'b lala', both set 'b' to 'lala'
|
||||||
|
|
|
@ -9,7 +9,7 @@ desc = [[
|
||||||
This script will read the flash memory of RDV4 and print the stored passwords/keys.
|
This script will read the flash memory of RDV4 and print the stored passwords/keys.
|
||||||
|
|
||||||
It was meant to be used as a help tool after using the BogRun standalone mode before SPIFFS.
|
It was meant to be used as a help tool after using the BogRun standalone mode before SPIFFS.
|
||||||
You should now use read_pwd_mem_spiffs instead after the updated BogRun standalone mode.
|
You should now use data_read_pwd_mem_spiffs instead after the updated BogRun standalone mode.
|
||||||
|
|
||||||
(Iceman) script adapted to read and print keys in the default dictionary flashmemory sections.
|
(Iceman) script adapted to read and print keys in the default dictionary flashmemory sections.
|
||||||
]]
|
]]
|
||||||
|
|
|
@ -26,7 +26,7 @@ It uses both LF and HF simulations.
|
||||||
-- Author note
|
-- Author note
|
||||||
-- I wrote this as i was doing a PACS audit. This is far from complete, but is easily expandable.
|
-- I wrote this as i was doing a PACS audit. This is far from complete, but is easily expandable.
|
||||||
-- The idea was based on proxbrute, but i needed more options, and support for different readers.
|
-- The idea was based on proxbrute, but i needed more options, and support for different readers.
|
||||||
-- I dont know LUA, so I used Brian Redbeards lf_bulk_program.lua script as a starting point, sorry if its kludgy.
|
-- I dont know LUA, so I used Brian Redbeards lf_hid_bulkclone.lua script as a starting point, sorry if its kludgy.
|
||||||
|
|
||||||
]]
|
]]
|
||||||
example = [[
|
example = [[
|
||||||
|
@ -110,7 +110,7 @@ local function isempty(s)
|
||||||
return s == nil or s == ''
|
return s == nil or s == ''
|
||||||
end
|
end
|
||||||
|
|
||||||
-- The code below was blatantly stolen from Brian Redbeard's lf_bulk_program.lua script
|
-- The code below was blatantly stolen from Brian Redbeard's lf_hid_bulkclone.lua script
|
||||||
local function toBits(num, bits)
|
local function toBits(num, bits)
|
||||||
bits = bits or math.max(1, select(2, math.frexp(num)))
|
bits = bits or math.max(1, select(2, math.frexp(num)))
|
||||||
local t = {}
|
local t = {}
|
||||||
|
|
|
@ -128,10 +128,10 @@ local function dump_tag(uid, numsectors)
|
||||||
|
|
||||||
-- Save the global args, those are *our* arguments
|
-- Save the global args, those are *our* arguments
|
||||||
local myargs = args
|
local myargs = args
|
||||||
-- Set the arguments for htmldump script
|
-- Set the arguments for data_dumptohtml script
|
||||||
args =('-i %s.bin -o %s.html'):format(dumpfile, dumpfile)
|
args =('-i %s.bin -o %s.html'):format(dumpfile, dumpfile)
|
||||||
-- call it
|
-- call it
|
||||||
require('htmldump')
|
require('data_dumptohtml')
|
||||||
|
|
||||||
-- Set back args. Not that it's used, just for the karma...
|
-- Set back args. Not that it's used, just for the karma...
|
||||||
args = myargs
|
args = myargs
|
||||||
|
|
|
@ -1,7 +1,7 @@
|
||||||
---
|
---
|
||||||
-- This Lua script is designed to run with Iceman/RRG Proxmark3 fork
|
-- This Lua script is designed to run with Iceman/RRG Proxmark3 fork
|
||||||
-- Just copy luxeodump.lua to client/luascripts/
|
-- Just copy hf_mf_dump-laundromat.lua to client/luascripts/
|
||||||
-- and run "script run luxeodump"
|
-- and run "script run hf_mf_dump-laundromat"
|
||||||
|
|
||||||
-- requirements
|
-- requirements
|
||||||
local cmds = require('commands')
|
local cmds = require('commands')
|
||||||
|
|
|
@ -60,7 +60,7 @@ end
|
||||||
-- waits for answer from pm3 device
|
-- waits for answer from pm3 device
|
||||||
local function checkCommand(response)
|
local function checkCommand(response)
|
||||||
if not response then
|
if not response then
|
||||||
print("Timeout while waiting for response. Increase TIMEOUT in mfckeys.lua to wait longer")
|
print("Timeout while waiting for response. Increase TIMEOUT in hf_mf_keycheck.lua to wait longer")
|
||||||
return nil, "Timeout while waiting for device to respond"
|
return nil, "Timeout while waiting for device to respond"
|
||||||
end
|
end
|
||||||
|
|
||||||
|
@ -237,7 +237,7 @@ local function perform_check(uid, numsectors)
|
||||||
|
|
||||||
local end_time = os.time()
|
local end_time = os.time()
|
||||||
print('')
|
print('')
|
||||||
print('[+] mfckeys - Checkkey execution time: '..os.difftime(end_time, start_time)..' sec')
|
print('[+] hf_mf_keycheck - Checkkey execution time: '..os.difftime(end_time, start_time)..' sec')
|
||||||
|
|
||||||
core.fast_push_mode(false)
|
core.fast_push_mode(false)
|
||||||
|
|
||||||
|
|
|
@ -19,7 +19,7 @@ script run hf_mf_magicrevive [-h] [-u]
|
||||||
]]
|
]]
|
||||||
arguments = [[
|
arguments = [[
|
||||||
-h this help
|
-h this help
|
||||||
-u remagic a Ultralight tag w 7 bytes UID.
|
-u try to revive a bricked magic Ultralight tag w 7 bytes UID.
|
||||||
]]
|
]]
|
||||||
---
|
---
|
||||||
-- A debug printout-function
|
-- A debug printout-function
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
-- Run me like this (connected via USB): ./pm3 -l hf_bruteforce.lua
|
-- Run me like this (connected via USB): ./pm3 -l hf_mfc_uidbruteforce.lua
|
||||||
-- Run me like this (connected via Blueshark addon): ./client/proxmark3 /dev/rfcomm0 -l ./hf_bruteforce.lua
|
-- Run me like this (connected via Blueshark addon): ./client/proxmark3 /dev/rfcomm0 -l ./hf_mfc_uidbruteforce.lua
|
||||||
|
|
||||||
local getopt = require('getopt')
|
local getopt = require('getopt')
|
||||||
local ansicolors = require('ansicolors')
|
local ansicolors = require('ansicolors')
|
||||||
|
|
|
@ -221,13 +221,13 @@ local function configure_magic_ntag(uid)
|
||||||
|
|
||||||
local pwd, pack = core.keygen_algo_d(uid)
|
local pwd, pack = core.keygen_algo_d(uid)
|
||||||
|
|
||||||
-- Set the arguments for mfu_magic script v1.0.8
|
-- Set the arguments for hf_mfu_magicwrite script v1.0.8
|
||||||
-- -t 12 == configure NTAG213F
|
-- -t 12 == configure NTAG213F
|
||||||
-- -u == set UID
|
-- -u == set UID
|
||||||
-- -p == set pwd
|
-- -p == set pwd
|
||||||
-- -a == set pack
|
-- -a == set pack
|
||||||
args =('-t 12 -u %s -p %08X -a %04X'):format(uid, pwd, pack)
|
args =('-t 12 -u %s -p %08X -a %04X'):format(uid, pwd, pack)
|
||||||
require('mfu_magic')
|
require('hf_mfu_magicwrite')
|
||||||
|
|
||||||
-- Set back args. Not that it's used, just for the karma...
|
-- Set back args. Not that it's used, just for the karma...
|
||||||
args = myargs
|
args = myargs
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
--
|
--
|
||||||
-- lf_bulk.lua - A tool to clone a large number of tags at once.
|
-- lf_hid_bulkclone.lua - A tool to clone a large number of tags at once.
|
||||||
-- Updated 2017-04-18
|
-- Updated 2017-04-18
|
||||||
-- Updated 2018-02-20 iceman
|
-- Updated 2018-02-20 iceman
|
||||||
local getopt = require('getopt')
|
local getopt = require('getopt')
|
||||||
|
|
|
@ -35,7 +35,7 @@ example = [[
|
||||||
3. script run lf_t55xx_writetest -t PSK1
|
3. script run lf_t55xx_writetest -t PSK1
|
||||||
]]
|
]]
|
||||||
usage = [[
|
usage = [[
|
||||||
script run test_t55x7 [-h] [-t <modulation type>
|
script run lf_t55xx_writetest [-h] [-t <modulation type>
|
||||||
]]
|
]]
|
||||||
arguments = [[
|
arguments = [[
|
||||||
-h this help
|
-h this help
|
||||||
|
|
|
@ -136,7 +136,7 @@ static int usage_hf_mfu_wrbl(void) {
|
||||||
|
|
||||||
static int usage_hf_mfu_eload(void) {
|
static int usage_hf_mfu_eload(void) {
|
||||||
PrintAndLogEx(NORMAL, "It loads emul dump from the file " _YELLOW_("`filename.eml`"));
|
PrintAndLogEx(NORMAL, "It loads emul dump from the file " _YELLOW_("`filename.eml`"));
|
||||||
PrintAndLogEx(NORMAL, "Hint: See " _YELLOW_("`script run dumptoemul-mfu`") " to convert the .bin to the eml");
|
PrintAndLogEx(NORMAL, "Hint: See " _YELLOW_("`script run hf_mfu_dumptoemulator`") " to convert the .bin to the eml");
|
||||||
PrintAndLogEx(NORMAL, "Usage: hf mfu eload u <file name w/o `.eml`> [numblocks]");
|
PrintAndLogEx(NORMAL, "Usage: hf mfu eload u <file name w/o `.eml`> [numblocks]");
|
||||||
PrintAndLogEx(NORMAL, " Options:");
|
PrintAndLogEx(NORMAL, " Options:");
|
||||||
PrintAndLogEx(NORMAL, " h : this help");
|
PrintAndLogEx(NORMAL, " h : this help");
|
||||||
|
|
|
@ -55,7 +55,7 @@ static int l_clearCommandBuffer(lua_State *L) {
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Enable / Disable fast push mode for lua scripts like mfckeys
|
* Enable / Disable fast push mode for lua scripts like hf_mf_keycheck
|
||||||
* The following params expected:
|
* The following params expected:
|
||||||
*
|
*
|
||||||
*@brief l_fast_push_mode
|
*@brief l_fast_push_mode
|
||||||
|
|
|
@ -233,7 +233,7 @@ Options
|
||||||
---
|
---
|
||||||
i <file> : Specifies the dump-file (input). If omitted, 'dumpdata.bin' is used
|
i <file> : Specifies the dump-file (input). If omitted, 'dumpdata.bin' is used
|
||||||
|
|
||||||
pm3 --> script run dumptoemul -i dumpdata.bin
|
pm3 --> script run hf_mf_dumptoemulator -i dumpdata.bin
|
||||||
```
|
```
|
||||||
|
|
||||||
Write to MIFARE block
|
Write to MIFARE block
|
||||||
|
@ -285,7 +285,7 @@ Simulate MIFARE Sequence
|
||||||
```
|
```
|
||||||
pm3 --> hf mf chk *1 ? d mfc_default_keys
|
pm3 --> hf mf chk *1 ? d mfc_default_keys
|
||||||
pm3 --> hf mf dump 1
|
pm3 --> hf mf dump 1
|
||||||
pm3 --> script run dumptoemul -i dumpdata.bin
|
pm3 --> script run hf_mf_dumptoemulator -i dumpdata.bin
|
||||||
pm3 --> hf mf eload 353C2AA6
|
pm3 --> hf mf eload 353C2AA6
|
||||||
pm3 --> hf mf sim u 353c2aa6
|
pm3 --> hf mf sim u 353c2aa6
|
||||||
```
|
```
|
||||||
|
@ -305,19 +305,19 @@ pm3 --> hf mfu info
|
||||||
Clone MIFARE Ultralight EV1 Sequence
|
Clone MIFARE Ultralight EV1 Sequence
|
||||||
```
|
```
|
||||||
pm3 --> hf mfu dump k FFFFFFFF
|
pm3 --> hf mfu dump k FFFFFFFF
|
||||||
pm3 --> script run dumptoemul-mfu -i hf-mfu-XXXX-dump.bin -o hf-mfu-XXXX-dump.eml
|
pm3 --> script run hf_mfu_dumptoemulator -i hf-mfu-XXXX-dump.bin -o hf-mfu-XXXX-dump.eml
|
||||||
pm3 --> hf mfu eload u hf-mfu-XXXX-dump.eml
|
pm3 --> hf mfu eload u hf-mfu-XXXX-dump.eml
|
||||||
pm3 --> hf mfu sim t 7 u hf-mfu-XXXX-dump.eml
|
pm3 --> hf mfu sim t 7 u hf-mfu-XXXX-dump.eml
|
||||||
```
|
```
|
||||||
|
|
||||||
Bruteforce MIFARE Classic card numbers from 11223344 to 11223346
|
Bruteforce MIFARE Classic card numbers from 11223344 to 11223346
|
||||||
```
|
```
|
||||||
pm3 --> script run hf_bruteforce -s 0x11223344 -e 0x11223346 -t 1000 -x mfc
|
pm3 --> script run hf_mfc_uidbruteforce -s 0x11223344 -e 0x11223346 -t 1000 -x mfc
|
||||||
```
|
```
|
||||||
|
|
||||||
Bruteforce MIFARE Ultralight EV1 card numbers from 11223344556677 to 11223344556679
|
Bruteforce MIFARE Ultralight EV1 card numbers from 11223344556677 to 11223344556679
|
||||||
```
|
```
|
||||||
pm3 --> script run hf_bruteforce -s 0x11223344556677 -e 0x11223344556679 -t 1000 -x mfu
|
pm3 --> script run hf_mfc_uidbruteforce -s 0x11223344556677 -e 0x11223344556679 -t 1000 -x mfu
|
||||||
```
|
```
|
||||||
|
|
||||||
## Wiegand manipulation
|
## Wiegand manipulation
|
||||||
|
@ -563,7 +563,7 @@ Options
|
||||||
-i <file> Specifies the dump-file (input). If omitted, 'dumpdata.bin' is used
|
-i <file> Specifies the dump-file (input). If omitted, 'dumpdata.bin' is used
|
||||||
-o <filename> Specifies the output file. If omitted, <uid>.eml is used
|
-o <filename> Specifies the output file. If omitted, <uid>.eml is used
|
||||||
|
|
||||||
pm3 --> script run dumptoemul -i xxxxxxxxxxxxxx.bin
|
pm3 --> script run hf_mf_dumptoemulator -i xxxxxxxxxxxxxx.bin
|
||||||
```
|
```
|
||||||
|
|
||||||
Convert .eml to .bin
|
Convert .eml to .bin
|
||||||
|
@ -573,7 +573,7 @@ Options
|
||||||
-i <filename> Specifies the dump-file (input). If omitted, 'dumpdata.eml' is used
|
-i <filename> Specifies the dump-file (input). If omitted, 'dumpdata.eml' is used
|
||||||
-o <filename> Specifies the output file. If omitted, <currdate>.bin is used
|
-o <filename> Specifies the output file. If omitted, <currdate>.bin is used
|
||||||
|
|
||||||
pm3 --> script run emul2dump -i myfile.eml -o myfile.bin
|
pm3 --> script run data_emulatortohtml -i myfile.eml -o myfile.bin
|
||||||
```
|
```
|
||||||
|
|
||||||
Format Mifare card
|
Format Mifare card
|
||||||
|
@ -585,7 +585,7 @@ Options
|
||||||
-a <access> The new access bytes that will be written to the card
|
-a <access> The new access bytes that will be written to the card
|
||||||
-x Execute the commands aswell
|
-x Execute the commands aswell
|
||||||
|
|
||||||
pm3 --> script run formatMifare -k FFFFFFFFFFFF -n FFFFFFFFFFFF -x
|
pm3 --> script run hf_mf_format -k FFFFFFFFFFFF -n FFFFFFFFFFFF -x
|
||||||
```
|
```
|
||||||
|
|
||||||
## Memory
|
## Memory
|
||||||
|
|
|
@ -195,7 +195,7 @@ hf mf csetuid 11223344 0044 18
|
||||||
```
|
```
|
||||||
|
|
||||||
```
|
```
|
||||||
script run remagic
|
script run run hf_mf_magicrevive
|
||||||
```
|
```
|
||||||
|
|
||||||
To execute commands manually:
|
To execute commands manually:
|
||||||
|
@ -518,14 +518,14 @@ Only 7b versions
|
||||||
### Proxmark3 commands
|
### Proxmark3 commands
|
||||||
|
|
||||||
```
|
```
|
||||||
script run ul_uid -h
|
script run hf_mfu_setuid -h
|
||||||
```
|
```
|
||||||
|
|
||||||
When "soft-bricked" (by writing invalid data in block0), these ones may help:
|
When "soft-bricked" (by writing invalid data in block0), these ones may help:
|
||||||
|
|
||||||
```
|
```
|
||||||
hf 14a config h
|
hf 14a config h
|
||||||
script run remagic -u
|
script run run hf_mf_magicrevive -u
|
||||||
```
|
```
|
||||||
|
|
||||||
## MIFARE Ultralight DirectWrite
|
## MIFARE Ultralight DirectWrite
|
||||||
|
@ -723,7 +723,7 @@ Emulates partially UL EV1 48k/128k, NTAG210, NTAG212, NTAGI2C 1K/2K, NTAGI2C 1K
|
||||||
### Proxmark3 commands
|
### Proxmark3 commands
|
||||||
|
|
||||||
```
|
```
|
||||||
script run mfu_magic -h
|
script run hf_mfu_magicwrite -h
|
||||||
```
|
```
|
||||||
|
|
||||||
# DESFire
|
# DESFire
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue