nested works

This commit is contained in:
merlokk 2018-02-13 15:12:41 +02:00
commit 0113dcf3fd
2 changed files with 42 additions and 27 deletions

View file

@ -266,6 +266,7 @@ bool DecodeMifareData(uint8_t *cmd, uint8_t cmdsize, uint8_t *parity, bool isRes
if (MifareAuthState == masAuthComplete) { if (MifareAuthState == masAuthComplete) {
if (traceCrypto1) { if (traceCrypto1) {
crypto1_destroy(traceCrypto1); crypto1_destroy(traceCrypto1);
traceCrypto1 = NULL;
} }
MifareAuthState = masFirstData; MifareAuthState = masFirstData;
@ -279,19 +280,10 @@ bool DecodeMifareData(uint8_t *cmd, uint8_t cmdsize, uint8_t *parity, bool isRes
if (AuthData.first_auth) { if (AuthData.first_auth) {
AuthData.ks2 = AuthData.ar_enc ^ prng_successor(AuthData.nt, 64); AuthData.ks2 = AuthData.ar_enc ^ prng_successor(AuthData.nt, 64);
AuthData.ks3 = AuthData.at_enc ^ prng_successor(AuthData.nt, 96); AuthData.ks3 = AuthData.at_enc ^ prng_successor(AuthData.nt, 96);
struct Crypto1State *revstate = lfsr_recovery64(AuthData.ks2, AuthData.ks3);
lfsr_rollback_word(revstate, 0, 0);
lfsr_rollback_word(revstate, 0, 0);
lfsr_rollback_word(revstate, AuthData.nr_enc, 1);
lfsr_rollback_word(revstate, AuthData.uid ^ AuthData.nt, 0);
uint64_t lfsr = 0; mfLastKey = GetCrypto1ProbableKey(&AuthData);
crypto1_get_lfsr(revstate, &lfsr); PrintAndLog(" | * | key | probable key:%010"PRIx64" Prng:%s ks2:%08x ks3:%08x | |",
crypto1_destroy(revstate); mfLastKey,
mfLastKey = lfsr;
PrintAndLog(" | * | key | probable key:%x%x Prng:%s ks2:%08x ks3:%08x | |",
(unsigned int)((lfsr & 0xFFFFFFFF00000000) >> 32),
(unsigned int)(lfsr & 0xFFFFFFFF),
validate_prng_nonce(AuthData.nt) ? "WEAK": "HARD", validate_prng_nonce(AuthData.nt) ? "WEAK": "HARD",
AuthData.ks2, AuthData.ks2,
AuthData.ks3); AuthData.ks3);
@ -300,12 +292,16 @@ bool DecodeMifareData(uint8_t *cmd, uint8_t cmdsize, uint8_t *parity, bool isRes
traceCrypto1 = lfsr_recovery64(AuthData.ks2, AuthData.ks3); traceCrypto1 = lfsr_recovery64(AuthData.ks2, AuthData.ks3);
} else { } else {
if (traceCrypto1) {
crypto1_destroy(traceCrypto1);
traceCrypto1 = NULL;
}
// check last used key // check last used key
if (mfLastKey) { if (false && mfLastKey) {
if (NestedCheckKey(mfLastKey, &AuthData, cmd, cmdsize, parity)) { if (NestedCheckKey(mfLastKey, &AuthData, cmd, cmdsize, parity)) {
PrintAndLog(" | * | key | last used key:%x%x ks2:%08x ks3:%08x | |", PrintAndLog(" | * | key | last used key:%010"PRIx64" ks2:%08x ks3:%08x | |",
(unsigned int)((mfLastKey & 0xFFFFFFFF00000000) >> 32), mfLastKey,
(unsigned int)(mfLastKey & 0xFFFFFFFF),
AuthData.ks2, AuthData.ks2,
AuthData.ks3); AuthData.ks3);
@ -314,15 +310,15 @@ bool DecodeMifareData(uint8_t *cmd, uint8_t cmdsize, uint8_t *parity, bool isRes
} }
// check default keys // check default keys
if (!traceCrypto1) { if (false && !traceCrypto1) {
for (int defaultKeyCounter = 0; defaultKeyCounter < MifareDefaultKeysSize; defaultKeyCounter++){ for (int defaultKeyCounter = 0; defaultKeyCounter < MifareDefaultKeysSize; defaultKeyCounter++){
if (NestedCheckKey(MifareDefaultKeys[defaultKeyCounter], &AuthData, cmd, cmdsize, parity)) { if (NestedCheckKey(MifareDefaultKeys[defaultKeyCounter], &AuthData, cmd, cmdsize, parity)) {
PrintAndLog(" | * | key | default key:%x%x ks2:%08x ks3:%08x | |", PrintAndLog(" | * | key | default key:%010"PRIx64" ks2:%08x ks3:%08x | |",
(unsigned int)((MifareDefaultKeys[defaultKeyCounter] & 0xFFFFFFFF00000000) >> 32), MifareDefaultKeys[defaultKeyCounter],
(unsigned int)(MifareDefaultKeys[defaultKeyCounter] & 0xFFFFFFFF),
AuthData.ks2, AuthData.ks2,
AuthData.ks3); AuthData.ks3);
mfLastKey = MifareDefaultKeys[defaultKeyCounter];
traceCrypto1 = lfsr_recovery64(AuthData.ks2, AuthData.ks3); traceCrypto1 = lfsr_recovery64(AuthData.ks2, AuthData.ks3);
break; break;
}; };
@ -331,8 +327,7 @@ bool DecodeMifareData(uint8_t *cmd, uint8_t cmdsize, uint8_t *parity, bool isRes
// nested // nested
if (!traceCrypto1 && validate_prng_nonce(AuthData.nt)) { if (!traceCrypto1 && validate_prng_nonce(AuthData.nt)) {
printf("nested. uid:%x nt:%x ar_enc:%x at_enc:%x\n", AuthData.uid, AuthData.nt, AuthData.ar_enc, AuthData.at_enc); uint32_t ntx = prng_successor(AuthData.nt, 90);
uint32_t ntx = prng_successor(AuthData.nt, 90);
for (int i = 0; i < 16383; i++) { for (int i = 0; i < 16383; i++) {
ntx = prng_successor(ntx, 1); ntx = prng_successor(ntx, 1);
if (NTParityChk(&AuthData, ntx)){ if (NTParityChk(&AuthData, ntx)){
@ -344,18 +339,22 @@ printf("nested. uid:%x nt:%x ar_enc:%x at_enc:%x\n", AuthData.uid, AuthData.nt,
mf_crypto1_decrypt(pcs, mfData, cmdsize, 0); mf_crypto1_decrypt(pcs, mfData, cmdsize, 0);
crypto1_destroy(pcs); crypto1_destroy(pcs);
if (CheckCrc14443(CRC_14443_A, mfData, cmdsize)) { if (CheckCrypto1Parity(cmd, cmdsize, mfData, parity) && CheckCrc14443(CRC_14443_A, mfData, cmdsize)) {
AuthData.ks2 = ks2; AuthData.ks2 = ks2;
AuthData.ks3 = ks3; AuthData.ks3 = ks3;
AuthData.nt = ntx;
mfLastKey = GetCrypto1ProbableKey(&AuthData);
PrintAndLog(" | * | key | nested probable key:%010"PRIx64" ks2:%08x ks3:%08x | |",
mfLastKey,
AuthData.ks2,
AuthData.ks3);
traceCrypto1 = lfsr_recovery64(AuthData.ks2, AuthData.ks3); traceCrypto1 = lfsr_recovery64(AuthData.ks2, AuthData.ks3);
break; break;
} }
} }
} }
if (traceCrypto1)
printf("key> nt=%08x nonce distance=%d \n", ntx, nonce_distance(AuthData.nt, ntx));
else
printf("key> don't have any valid nt( \n");
} }
//hardnested //hardnested
@ -437,6 +436,7 @@ bool NestedCheckKey(uint64_t key, TAuthData *ad, uint8_t *cmd, uint8_t cmdsize,
if(!CheckCrc14443(CRC_14443_A, buf, cmdsize)) if(!CheckCrc14443(CRC_14443_A, buf, cmdsize))
return false; return false;
AuthData.nt = nt1;
AuthData.ks2 = AuthData.ar_enc ^ ar; AuthData.ks2 = AuthData.ar_enc ^ ar;
AuthData.ks3 = AuthData.at_enc ^ at; AuthData.ks3 = AuthData.at_enc ^ at;
@ -451,3 +451,17 @@ bool CheckCrypto1Parity(uint8_t *cmd_enc, uint8_t cmdsize, uint8_t *cmd, uint8_t
return true; return true;
} }
uint64_t GetCrypto1ProbableKey(TAuthData *ad) {
struct Crypto1State *revstate = lfsr_recovery64(ad->ks2, ad->ks3);
lfsr_rollback_word(revstate, 0, 0);
lfsr_rollback_word(revstate, 0, 0);
lfsr_rollback_word(revstate, ad->nr_enc, 1);
lfsr_rollback_word(revstate, ad->uid ^ ad->nt, 0);
uint64_t lfsr = 0;
crypto1_get_lfsr(revstate, &lfsr);
crypto1_destroy(revstate);
return lfsr;
}

View file

@ -38,5 +38,6 @@ extern bool DecodeMifareData(uint8_t *cmd, uint8_t cmdsize, uint8_t *parity, boo
extern bool NTParityChk(TAuthData *ad, uint32_t ntx); extern bool NTParityChk(TAuthData *ad, uint32_t ntx);
extern bool NestedCheckKey(uint64_t key, TAuthData *ad, uint8_t *cmd, uint8_t cmdsize, uint8_t *parity); extern bool NestedCheckKey(uint64_t key, TAuthData *ad, uint8_t *cmd, uint8_t cmdsize, uint8_t *parity);
extern bool CheckCrypto1Parity(uint8_t *cmd_enc, uint8_t cmdsize, uint8_t *cmd, uint8_t *parity_enc); extern bool CheckCrypto1Parity(uint8_t *cmd_enc, uint8_t cmdsize, uint8_t *cmd, uint8_t *parity_enc);
extern uint64_t GetCrypto1ProbableKey(TAuthData *ad);
#endif // CMDHFLIST #endif // CMDHFLIST