mirror of
https://github.com/RfidResearchGroup/proxmark3.git
synced 2025-08-14 02:27:26 -07:00
Merge pull request #2916 from Antiklesys/master
Sam firmware output in decimal and unhash to detect AES key format
This commit is contained in:
commit
fbdc85d6ad
2 changed files with 23 additions and 3 deletions
|
@ -229,7 +229,8 @@ int sam_get_version(bool info) {
|
|||
uint16_t response_len = ISO7816_MAX_FRAME;
|
||||
|
||||
uint8_t payload[] = {
|
||||
0xa0, 0x02, // <- SAM command
|
||||
0xa0, // <- SAM command
|
||||
0x02, // <- Length
|
||||
0x82, 0x00 // <- get version
|
||||
};
|
||||
uint16_t payload_len = sizeof(payload);
|
||||
|
@ -278,7 +279,7 @@ int sam_get_version(bool info) {
|
|||
}
|
||||
if (g_dbglevel >= DBG_INFO || info) {
|
||||
DbpString(_BLUE_("-- SAM Information --"));
|
||||
Dbprintf(_YELLOW_("Firmware version: ")"%X.%X", sam_version_an[2], sam_version_an[3]);
|
||||
Dbprintf(_YELLOW_("Firmware version: ")"%d.%d", sam_version_an[2], sam_version_an[3]);
|
||||
Dbprintf(_YELLOW_("Firmware ID: "));
|
||||
Dbhexdump(sam_build_an[1], sam_build_an + 2, false);
|
||||
}
|
||||
|
@ -309,7 +310,8 @@ int sam_get_serial_number(void) {
|
|||
uint16_t response_len = ISO7816_MAX_FRAME;
|
||||
|
||||
uint8_t payload[] = {
|
||||
0xa0, 0x02, // <- SAM command
|
||||
0xa0, // <- SAM command
|
||||
0x02, // <- Length
|
||||
0x96, 0x00 // <- get serial number
|
||||
};
|
||||
uint16_t payload_len = sizeof(payload);
|
||||
|
|
|
@ -5058,6 +5058,24 @@ static int CmdHFiClassUnhash(const char *Cmd) {
|
|||
return PM3_EINVARG;
|
||||
}
|
||||
|
||||
//check if divkey respects hash0 rules (legacy format) or if it could be AES Based
|
||||
|
||||
int count_lsb0 = 0;
|
||||
int count_lsb1 = 0;
|
||||
|
||||
for (int i = 0; i < PICOPASS_BLOCK_SIZE; i++) {
|
||||
if ((div_key[i] & 0x01) == 0) {
|
||||
count_lsb0++;
|
||||
} else {
|
||||
count_lsb1++;
|
||||
}
|
||||
}
|
||||
|
||||
if(count_lsb0 != 4 || count_lsb1 != 4){
|
||||
PrintAndLogEx(INFO, _RED_("Incorrect LSB Distribution, unable to unhash - the key might be AES based."));
|
||||
return PM3_SUCCESS;
|
||||
}
|
||||
|
||||
PrintAndLogEx(INFO, "Diversified key... %s", sprint_hex_inrow(div_key, sizeof(div_key)));
|
||||
PrintAndLogEx(INFO, "-----------------------------------");
|
||||
invert_hash0(div_key);
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue