mirror of
https://github.com/RfidResearchGroup/proxmark3.git
synced 2025-08-14 02:27:26 -07:00
Add files via upload
Add a Python script to simplify interactions with DESFire. Signed-off-by: Trigat <trigat@protonmail.com>
This commit is contained in:
parent
1171127094
commit
7a129e7be0
1 changed files with 392 additions and 0 deletions
392
client/pyscripts/des_talk.py
Normal file
392
client/pyscripts/des_talk.py
Normal file
|
@ -0,0 +1,392 @@
|
|||
"""
|
||||
DES Talk - A Proxmark3 DESFire Communication Tool
|
||||
|
||||
Copyright (C) 2025 Trigat
|
||||
|
||||
Description:
|
||||
This script simplifies the creation and deletion of
|
||||
DESFire applications and files. It supports USB, Bluetooth,
|
||||
and Termux connections and has been tested on Android and Linux.
|
||||
|
||||
Note: Modify TCP_PORT below if using TCP app with Android or Termux
|
||||
|
||||
License: GNU General Public License v3.0
|
||||
|
||||
This program is free software: you can redistribute it and/or modify
|
||||
it under the terms of the GNU General Public License as published by
|
||||
the Free Software Foundation, either version 3 of the License, or
|
||||
(at your option) any later version.
|
||||
|
||||
This program is distributed in the hope that it will be useful,
|
||||
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
GNU General Public License for more details.
|
||||
|
||||
Full license text: <https://www.gnu.org/licenses/gpl-3.0.html>
|
||||
"""
|
||||
|
||||
|
||||
import subprocess
|
||||
import time
|
||||
import os
|
||||
import re
|
||||
|
||||
try:
|
||||
import pm3 # Used when inside the pm3 environment
|
||||
PM3_AVAILABLE = True
|
||||
p = pm3.pm3()
|
||||
except ImportError:
|
||||
PM3_AVAILABLE = False # Use subprocess instead
|
||||
|
||||
# SPECIFY PORT IF USING TCP APP WITH ANDROID OR TERMUX
|
||||
TCP_PORT = 4444
|
||||
|
||||
def detect_proxmark_device():
|
||||
|
||||
# Detect the Proxmark3 connection type (USB, Bluetooth, or TCP).
|
||||
try:
|
||||
# Try running `pm3 --list` to detect available Proxmark devices
|
||||
result = subprocess.run(["pm3", "--list"], capture_output=True, text=True, check=True)
|
||||
lines = result.stdout.splitlines()
|
||||
|
||||
for line in lines:
|
||||
if ":" in line: # Expected format: "1: /dev/ttyACM0" or "1: bt:xx:xx:xx:xx:xx"
|
||||
device = line.split(": ", 1)[1].strip()
|
||||
print(f"✅ Using Proxmark device: {device}")
|
||||
return device
|
||||
except Exception:
|
||||
print("⚠️ `pm3 --list` failed, falling back to manual detection.")
|
||||
|
||||
# If `pm3 --list` doesn't work, check manually (Android or fallback mode)
|
||||
usb_devices = ["/dev/ttyACM0", "/dev/ttyACM1", "/dev/ttyUSB0", "/dev/ttyUSB1"]
|
||||
for dev in usb_devices:
|
||||
if os.path.exists(dev):
|
||||
print(f"✅ Using USB device: {dev}")
|
||||
return dev
|
||||
|
||||
# Default to TCP mode for Android Termux
|
||||
print(f"⚠️ No USB or Bluetooth device found, defaulting to TCP (localhost:{TCP_PORT})")
|
||||
return f"tcp:localhost:{TCP_PORT}"
|
||||
|
||||
def send_proxmark_command(command):
|
||||
|
||||
if PM3_AVAILABLE:
|
||||
p.console(command)
|
||||
return p.grabbed_output.strip()
|
||||
|
||||
else:
|
||||
full_command = f"{command}\n"
|
||||
host_device = detect_proxmark_device()
|
||||
|
||||
process = subprocess.Popen(
|
||||
["proxmark3", host_device],
|
||||
stdin=subprocess.PIPE,
|
||||
stdout=subprocess.PIPE,
|
||||
stderr=subprocess.PIPE,
|
||||
text=True
|
||||
)
|
||||
|
||||
output, error = process.communicate(full_command)
|
||||
|
||||
time.sleep(0.2) # Small delay to let Proxmark process fully
|
||||
|
||||
# Combine stdout and stderr
|
||||
response_lines = (output or "").splitlines() + (error or "").splitlines()
|
||||
|
||||
# Remove the harmless "STDIN unexpected end" message
|
||||
filtered_response = "\n".join(line for line in response_lines if "STDIN unexpected end" not in line)
|
||||
|
||||
return filtered_response.strip()
|
||||
|
||||
def authenticate_and_menu():
|
||||
|
||||
key_type = input("Enter key type (DES, 2TDEA, 3TDEA, AES): ").strip()
|
||||
key = input("Enter 8, 16, 24 or 32-byte hex key (no spaces): ").strip()
|
||||
|
||||
# Authenticate
|
||||
auth_command = f"hf mfdes auth -t {key_type} -k {key}"
|
||||
auth_response = send_proxmark_command(auth_command)
|
||||
print(auth_response)
|
||||
|
||||
# Check for Proxmark failure messages
|
||||
if "error" in auth_response.lower() or "must have" in auth_response.lower():
|
||||
print("❌ Authentication failed. Check your connection, key, and key type.")
|
||||
return
|
||||
|
||||
while True:
|
||||
|
||||
# Get AIDs
|
||||
aids_command = f"hf mfdes getaids -n 0 -t {key_type} -k {key}"
|
||||
aids_response = send_proxmark_command(aids_command)
|
||||
print(aids_response)
|
||||
|
||||
# Regex to match valid 6-character hex AIDs
|
||||
hex_pattern = re.compile(r"\b[0-9A-Fa-f]{6}\b")
|
||||
|
||||
aids = []
|
||||
for line in aids_response.split("\n"):
|
||||
if "PM3 UART serial baudrate" in line:
|
||||
continue
|
||||
match = hex_pattern.search(line)
|
||||
if match:
|
||||
aids.append(match.group(0))
|
||||
|
||||
if aids: # Check if there are any AIDs
|
||||
print("\nAvailable AIDs:")
|
||||
for i, aid in enumerate(aids):
|
||||
print(f"{i + 1}. {aid}")
|
||||
else:
|
||||
print("\n❌ No AID found on the card.")
|
||||
|
||||
print("\nChoose an option:")
|
||||
print("1. Select an AID")
|
||||
print("2. Create a new AID")
|
||||
print("3. Delete an AID")
|
||||
print("4. Format PICC")
|
||||
print("5. Show free memory")
|
||||
print("6. Exit")
|
||||
|
||||
choice = input("Enter your choice: ").strip()
|
||||
|
||||
if choice == "1":
|
||||
selected_index = int(input("Select an available AID number (e.g., 1, 2, or 3): ")) - 1
|
||||
if selected_index < 0 or selected_index >= len(aids):
|
||||
print("\nInvalid selection.")
|
||||
continue
|
||||
|
||||
selected_aid = aids[selected_index]
|
||||
print(f"\nSelecting AID: {selected_aid}")
|
||||
|
||||
select_command = f"hf mfdes selectapp --aid {selected_aid} -t {key_type} -k {key}"
|
||||
select_response = send_proxmark_command(select_command)
|
||||
print(select_response)
|
||||
|
||||
# Show file menu
|
||||
aid_file_menu(selected_aid, key_type, key)
|
||||
|
||||
elif choice == "2":
|
||||
create_aid(key_type, key)
|
||||
|
||||
elif choice == "3":
|
||||
delete_aid(key_type, key)
|
||||
|
||||
elif choice == "4":
|
||||
format_picc(key_type, key)
|
||||
|
||||
elif choice == "5":
|
||||
free_memory(key_type, key)
|
||||
|
||||
elif choice == "6":
|
||||
print("Exiting...")
|
||||
break
|
||||
else:
|
||||
print("Invalid choice, please try again.")
|
||||
|
||||
def aid_file_menu(selected_aid, key_type, key):
|
||||
|
||||
while True:
|
||||
print(f"\n[ AID {selected_aid} is open ]")
|
||||
print("\nChoose an operation:")
|
||||
print("1. List Files")
|
||||
print("2. Read a File")
|
||||
print("3. Create a File")
|
||||
print("4. Write to a File")
|
||||
print("5. Delete a File")
|
||||
print("6. Exit")
|
||||
|
||||
choice = input("Enter your choice: ").strip()
|
||||
|
||||
if choice == "1":
|
||||
list_files(selected_aid, key_type, key)
|
||||
elif choice == "2":
|
||||
read_file(selected_aid, key_type, key)
|
||||
elif choice == "3":
|
||||
create_file(selected_aid, key_type, key)
|
||||
elif choice == "4":
|
||||
write_to_file(selected_aid, key_type, key)
|
||||
elif choice == "5":
|
||||
delete_file(selected_aid, key_type, key)
|
||||
elif choice == "6":
|
||||
print("Returning to AID selection...")
|
||||
break
|
||||
else:
|
||||
print("Invalid choice, please try again.")
|
||||
|
||||
def create_aid(key_type, key):
|
||||
|
||||
aid = input("Enter new AID (6 hex characters, e.g., 112233): ").strip()
|
||||
iso_fid = input("Enter ISO File ID (4 hex characters, e.g., 1234): ").strip()
|
||||
dstalgo = input("Enter encryption algorithm (DES, 2TDEA, 3TDEA, AES): ").strip().upper()
|
||||
|
||||
create_command = f"hf mfdes createapp -n 0 --aid {aid} --fid {iso_fid} --dstalgo {dstalgo} -t {key_type} -k {key} -a"
|
||||
response = send_proxmark_command(create_command)
|
||||
print(response)
|
||||
|
||||
def delete_aid(key_type, key):
|
||||
|
||||
aid = input("Enter AID to delete (6 hex characters): ").strip()
|
||||
delete_command = f"hf mfdes deleteapp --aid {aid} -n 0 -t {key_type} -k {key}"
|
||||
response = send_proxmark_command(delete_command)
|
||||
print(response)
|
||||
|
||||
def format_picc(key_type, key):
|
||||
|
||||
confirm = input("Are you sure you want to format the PICC? This will erase all data. (y/n): ").strip().lower()
|
||||
|
||||
if confirm == "y":
|
||||
format_command = f"hf mfdes formatpicc -t {key_type} -k {key} -v"
|
||||
response = send_proxmark_command(format_command)
|
||||
print(response)
|
||||
elif confirm == "n":
|
||||
print("Formatting cancelled.")
|
||||
else:
|
||||
print("Invalid input. Please enter 'y' or 'n'.")
|
||||
|
||||
def free_memory(key_type, key):
|
||||
|
||||
memory_command = f"hf mfdes freemem -t {key_type} -k {key}"
|
||||
response = send_proxmark_command(memory_command)
|
||||
|
||||
for line in response.splitlines():
|
||||
if "Free memory" in line:
|
||||
print(f"\n✅ {line}")
|
||||
return
|
||||
|
||||
print("❌ Unable to retrieve free memory information.")
|
||||
|
||||
def list_files(aid, key_type, key):
|
||||
|
||||
print("\nFetching file list...")
|
||||
command = f"hf mfdes getfileids --aid {aid} -t {key_type} -k {key}"
|
||||
response = send_proxmark_command(command)
|
||||
|
||||
# Extract file IDs by looking for "File ID:" regex
|
||||
file_ids = []
|
||||
for line in response.splitlines():
|
||||
match = re.search(r"File ID:\s*([0-9A-Fa-f]{2})", line)
|
||||
if match:
|
||||
file_ids.append(match.group(1))
|
||||
|
||||
if file_ids:
|
||||
print("\nAvailable File IDs:")
|
||||
for i, file_id in enumerate(file_ids, 1):
|
||||
print(f"{i}. {file_id}")
|
||||
return file_ids
|
||||
else:
|
||||
print("No files found in this AID.")
|
||||
return []
|
||||
|
||||
def read_file(aid, key_type, key):
|
||||
|
||||
file_id = input("Enter file ID to read: ").strip()
|
||||
|
||||
# Get offset and ensure it's a 3-byte hex value (default: 000000)
|
||||
offset_input = input("Enter offset (default 0): ").strip() or "0"
|
||||
offset_hex = format(int(offset_input), '06X') # Convert to 3-byte hex
|
||||
|
||||
# Get length and ensure it's a 3-byte hex value (default: 000000 for full read)
|
||||
length_input = input("Enter length to read (e.g., 16 for 16 bytes, 64 for 64 bytes, default full read): ").strip() or "0"
|
||||
length_hex = format(int(length_input), '06X') # Convert to 3-byte hex
|
||||
|
||||
read_command = f"hf mfdes read --aid {aid} --fid {file_id} -t {key_type} -k {key} --offset {offset_hex} --length {length_hex}"
|
||||
response = send_proxmark_command(read_command)
|
||||
|
||||
# Extract and display file content
|
||||
print("\nFile Data:")
|
||||
for line in response.splitlines():
|
||||
if re.search(r"\| [0-9A-Fa-f]{2} .* \|", line): # Matches data table format
|
||||
print(line)
|
||||
|
||||
return response
|
||||
|
||||
def create_file(aid, key_type, key):
|
||||
|
||||
# Prompt for file ID in hex format
|
||||
file_id = input("Enter file ID (2 hex characters, e.g., 01, 02): ").strip()
|
||||
# Prompt for file size in KB, allowing for decimal values like 0.2KB
|
||||
file_size_kb_input = input("Enter file size in KB (e.g., .2 for 0.2KB, 1 for 1KB, 4 for 4KB, 16 for 16KB): ").strip()
|
||||
# Prefixes "00" to file_id for ISO file ID
|
||||
iso_file_id = f"00{file_id}"
|
||||
|
||||
try:
|
||||
# Convert the input to a float
|
||||
file_size_kb = float(file_size_kb_input)
|
||||
|
||||
if file_size_kb <= 0:
|
||||
raise ValueError("File size must be greater than 0.")
|
||||
|
||||
# Convert KB to bytes (1 KB = 1024 bytes)
|
||||
file_size_bytes = int(file_size_kb * 1024)
|
||||
|
||||
if file_size_bytes < 3:
|
||||
print("⚠️ File size is too small. Setting to minimum size of 3 bytes.")
|
||||
file_size_bytes = 3
|
||||
|
||||
# Convert bytes to hexadecimal
|
||||
file_size_hex = format(file_size_bytes, 'X').upper().zfill(6)
|
||||
|
||||
print(f"File size in bytes: {file_size_bytes} bytes")
|
||||
print(f"File size in hex: {file_size_hex}")
|
||||
|
||||
except ValueError as e:
|
||||
print(f"Invalid file size: {e}")
|
||||
return
|
||||
|
||||
create_command = f"hf mfdes createfile --aid {aid} --fid {file_id} --isofid {iso_file_id} --size {file_size_hex} -t {key_type} -k {key}"
|
||||
response = send_proxmark_command(create_command)
|
||||
print(response)
|
||||
|
||||
def write_to_file(aid, key_type, key):
|
||||
|
||||
file_id = input("Enter file ID to write to: ").strip()
|
||||
|
||||
# Get file size
|
||||
file_size_command = f"hf mfdes getfilesettings --aid {aid} --fid {file_id} -t {key_type} -k {key}"
|
||||
response = send_proxmark_command(file_size_command)
|
||||
|
||||
# Extract the file size from the response
|
||||
file_size_match = re.search(r"File size \(bytes\)... (\d+) / 0x([0-9A-Fa-f]+)", response)
|
||||
if not file_size_match:
|
||||
print("❌ Unable to determine file size.")
|
||||
return
|
||||
|
||||
file_size = int(file_size_match.group(1)) # Decimal file size
|
||||
|
||||
print(f"✅ File size detected: {file_size} bytes")
|
||||
|
||||
# Prompt user for data format choice (plain text or hex)
|
||||
while True:
|
||||
data_format = input("Enter data format (Type 1 for plain text, 2 for hex): ").strip()
|
||||
|
||||
if data_format == "1":
|
||||
# Text input (no hex)
|
||||
write_data = input(f"Enter text to write (up to {file_size} bytes, no need for hex): ").strip()
|
||||
write_data_hex = write_data.encode().hex().upper() # Convert to hex
|
||||
break
|
||||
|
||||
elif data_format == "2":
|
||||
# Hex input
|
||||
write_data_hex = input(f"Enter hex data to write (up to {file_size * 2} hex chars): ").strip()
|
||||
if len(write_data_hex) % 2 != 0: # Ensure it's a valid hex string
|
||||
print("❌ Invalid hex input. Please enter an even number of characters.")
|
||||
elif len(write_data_hex) // 2 > file_size:
|
||||
print(f"❌ Data exceeds file size limit of {file_size} bytes. Try again.")
|
||||
else:
|
||||
break
|
||||
else:
|
||||
print("❌ Invalid choice. Please choose 1 for text or 2 for hex.")
|
||||
|
||||
write_command = f"hf mfdes write --aid {aid} --fid {file_id} -t {key_type} -k {key} -d {write_data_hex}"
|
||||
response = send_proxmark_command(write_command)
|
||||
print(response)
|
||||
|
||||
def delete_file(aid, key_type, key):
|
||||
|
||||
file_id = input("Enter file ID to delete: ").strip()
|
||||
|
||||
delete_command = f"hf mfdes deletefile --aid {aid} --fid {file_id} -t {key_type} -k {key}"
|
||||
response = send_proxmark_command(delete_command)
|
||||
print(response)
|
||||
|
||||
if __name__ == "__main__":
|
||||
authenticate_and_menu()
|
Loading…
Add table
Add a link
Reference in a new issue