mirror of
https://github.com/RfidResearchGroup/proxmark3.git
synced 2025-08-19 13:00:42 -07:00
fix em 4x05 bf
This commit is contained in:
parent
ecf50070dd
commit
a6beff18a5
2 changed files with 3 additions and 2 deletions
|
@ -2545,9 +2545,10 @@ void EM4xBruteforce(uint32_t start_pwd, uint32_t n) {
|
||||||
DoPartialAcquisition(0, false, 350, 1000);
|
DoPartialAcquisition(0, false, 350, 1000);
|
||||||
uint8_t *mem = BigBuf_get_addr();
|
uint8_t *mem = BigBuf_get_addr();
|
||||||
if (mem[334] < 128) {
|
if (mem[334] < 128) {
|
||||||
|
candidates_found++;
|
||||||
Dbprintf("Password candidate: " _GREEN_("%08X"), pwd);
|
Dbprintf("Password candidate: " _GREEN_("%08X"), pwd);
|
||||||
if ((n != 0) && (candidates_found == n)) {
|
if ((n != 0) && (candidates_found == n)) {
|
||||||
Dbprintf("EM4x05 Bruteforce Stopped. %i candidates found", candidates_found);
|
Dbprintf("EM4x05 Bruteforce Stopped. %i candidate%s found", candidates_found, candidates_found > 1 ? "s" : "");
|
||||||
break;
|
break;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -1196,7 +1196,7 @@ int CmdEM4x05Brute(const char *Cmd) {
|
||||||
};
|
};
|
||||||
CLIExecWithReturn(ctx, Cmd, argtable, true);
|
CLIExecWithReturn(ctx, Cmd, argtable, true);
|
||||||
uint32_t start_pwd = arg_get_u64_def(ctx, 1, 0);
|
uint32_t start_pwd = arg_get_u64_def(ctx, 1, 0);
|
||||||
uint32_t n = arg_get_int_def(ctx, 1, 0);
|
uint32_t n = arg_get_int_def(ctx, 2, 0);
|
||||||
CLIParserFree(ctx);
|
CLIParserFree(ctx);
|
||||||
|
|
||||||
PrintAndLogEx(NORMAL, "");
|
PrintAndLogEx(NORMAL, "");
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue