chg 'hf mf chk':

* don't repeatedly clear trace while running (PR 243 by @mceloff from https://github.com/RfidResearchGroup/proxmark3)
* standard LED handling
* better check for key file syntax
* get rid of "res" column when printing the result. Show unknown keys more prominent as "     ?     "
This commit is contained in:
pwpiwi 2019-08-10 23:30:47 +02:00 committed by GitHub
commit f98702bace
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23
2 changed files with 51 additions and 36 deletions

View file

@ -980,16 +980,17 @@ void MifareChkKeys(uint16_t arg0, uint16_t arg1, uint8_t arg2, uint8_t *datain)
uint8_t set14aTimeout = (arg1 >> 8) & 0xff;
uint8_t keyCount = arg2;
LED_A_ON();
// clear debug level
int OLD_MF_DBGLEVEL = MF_DBGLEVEL;
MF_DBGLEVEL = MF_DBG_NONE;
LED_A_ON();
LED_B_OFF();
LED_C_OFF();
iso14443a_setup(FPGA_HF_ISO14443A_READER_LISTEN);
if (clearTrace) clear_trace();
if (clearTrace) {
clear_trace();
}
set_tracing(true);
if (set14aTimeout){
@ -1001,30 +1002,28 @@ void MifareChkKeys(uint16_t arg0, uint16_t arg1, uint8_t arg2, uint8_t *datain)
uint8_t sectorCnt = blockNo;
int res = MifareMultisectorChk(datain, keyCount, sectorCnt, keyType, OLD_MF_DBGLEVEL, &keyIndex);
LED_B_ON();
if (res >= 0) {
cmd_send(CMD_ACK, 1, 0, 0, keyIndex, 80);
} else {
cmd_send(CMD_ACK, 0, 0, 0, NULL, 0);
}
LED_B_OFF();
} else {
int res = MifareChkBlockKeys(datain, keyCount, blockNo, keyType, OLD_MF_DBGLEVEL);
LED_B_ON();
if (res > 0) {
cmd_send(CMD_ACK, 1, 0, 0, datain + (res - 1) * 6, 6);
} else {
cmd_send(CMD_ACK, 0, 0, 0, NULL, 0);
}
LED_B_OFF();
}
FpgaWriteConfWord(FPGA_MAJOR_MODE_OFF);
LEDsoff();
LED_D_OFF();
// restore debug level
MF_DBGLEVEL = OLD_MF_DBGLEVEL;
LED_A_OFF();
}
//-----------------------------------------------------------------------------

View file

@ -1099,16 +1099,17 @@ int CmdHF14AMfChk(const char *Cmd)
if (param_getchar(Cmd, 0)=='*') {
SectorsCnt = ParamCardSizeSectors(param_getchar(Cmd + 1, 0));
}
else {
} else {
blockNo = param_get8(Cmd, 0);
// Singe Key check, so Set Sector count to cover sectors (1 to sector that contains the block)
// 1 and 2 Cards : Sector = blockNo/4 + 1
// Sectors 0 - 31 : 4 blocks per sector : Blocks 0 - 127
// Sectors 32 - 39 : 16 blocks per sector : Blocks 128 - 255 (4K)
if (blockNo < 128) SectorsCnt = (blockNo / 4) + 1;
else SectorsCnt = 32 + ((blockNo-128)/16) + 1;
if (blockNo < 128) {
SectorsCnt = (blockNo / 4) + 1;
} else {
SectorsCnt = 32 + ((blockNo-128)/16) + 1;
}
singleBlock = true; // Set flag for single key check
}
@ -1143,7 +1144,7 @@ int CmdHF14AMfChk(const char *Cmd)
param3InUse = transferToEml | createDumpFile | (btimeout14a != MF_CHKKEYS_DEFTIMEOUT);
PrintAndLog("--chk keys. sectors:%2d, block no:%3d, key type:%c, eml:%c, dmp=%c checktimeout=%d us",
SectorsCnt, blockNo, keyType?'B':'A', transferToEml?'y':'n', createDumpFile?'y':'n', ((int)btimeout14a * 10000) / 106);
SectorsCnt, blockNo, keyType==0?'A':keyType==1?'B':'?', transferToEml?'y':'n', createDumpFile?'y':'n', ((int)btimeout14a * 10000) / 106);
for (i = param3InUse; param_getchar(Cmd, 2 + i); i++) {
if (!param_gethex(Cmd, 2 + i, keyBlock + 6 * keycnt, 12)) {
@ -1168,8 +1169,8 @@ int CmdHF14AMfChk(const char *Cmd)
return 2;
}
if ( (f = fopen( filename , "r")) ) {
while( fgets(buf, sizeof(buf), f) ){
if ((f = fopen( filename , "r"))) {
while (fgets(buf, sizeof(buf), f)) {
if (strlen(buf) < 12 || buf[11] == '\n')
continue;
@ -1177,14 +1178,20 @@ int CmdHF14AMfChk(const char *Cmd)
if( buf[0]=='#' ) continue; //The line start with # is comment, skip
if (!isxdigit((unsigned char)buf[0])){
PrintAndLog("File content error. '%s' must include 12 HEX symbols",buf);
bool content_error = false;
for (int i = 0; i < 12; i++) {
if (!isxdigit((unsigned char)buf[i])) {
content_error = true;
}
}
if (content_error) {
PrintAndLog("File content error. '%s' must include 12 HEX symbols", buf);
continue;
}
buf[12] = 0;
if ( stKeyBlock - keycnt < 2) {
if (stKeyBlock - keycnt < 2) {
p = realloc(keyBlock, 6*(stKeyBlock+=10));
if (!p) {
PrintAndLog("Cannot allocate memory for defKeys");
@ -1232,8 +1239,9 @@ int CmdHF14AMfChk(const char *Cmd)
}
printf("\n");
bool foundAKey = false;
uint32_t max_keys = keycnt > USB_CMD_DATA_SIZE / 6 ? USB_CMD_DATA_SIZE / 6 : keycnt;
bool foundAKey = false;
bool clearTraceLog = true;
uint32_t max_keys = keycnt > USB_CMD_DATA_SIZE / 6 ? USB_CMD_DATA_SIZE / 6 : keycnt;
// !SingleKey, so all key check (if SectorsCnt > 0)
if (!singleBlock) {
@ -1242,7 +1250,8 @@ int CmdHF14AMfChk(const char *Cmd)
for (uint32_t c = 0; c < keycnt; c += max_keys) {
uint32_t size = keycnt-c > max_keys ? max_keys : keycnt-c;
res = mfCheckKeysSec(SectorsCnt, keyType, btimeout14a, true, size, &keyBlock[6 * c], e_sector); // timeout is (ms * 106)/10 or us*0.0106
res = mfCheckKeysSec(SectorsCnt, keyType, btimeout14a, clearTraceLog, size, &keyBlock[6 * c], e_sector); // timeout is (ms * 106)/10 or us*0.0106
clearTraceLog = false;
if (res != 1) {
if (!res) {
@ -1259,10 +1268,11 @@ int CmdHF14AMfChk(const char *Cmd)
} else {
int keyAB = keyType;
do {
for (uint32_t c = 0; c < keycnt; c+=max_keys) {
for (uint32_t c = 0; c < keycnt; c += max_keys) {
uint32_t size = keycnt-c > max_keys ? max_keys : keycnt-c;
res = mfCheckKeys(blockNo, keyAB & 0x01, true, size, &keyBlock[6 * c], &key64);
clearTraceLog = false;
if (res != 1) {
if (!res) {
@ -1285,20 +1295,25 @@ int CmdHF14AMfChk(const char *Cmd)
// print result
if (foundAKey) {
if (SectorsCnt) {
PrintAndLog("");
PrintAndLog("|---|----------------|---|----------------|---|");
PrintAndLog("|sec|key A |res|key B |res|");
PrintAndLog("|---|----------------|---|----------------|---|");
for (i = 0; i < SectorsCnt; i++) {
// If a block key check, only print a line if a key was found.
if (!singleBlock || (e_sector[i].foundKey[0]) || (e_sector[i].foundKey[1]) ){
PrintAndLog("|%03d| %012" PRIx64 " | %d | %012" PRIx64 " | %d |", i,
e_sector[i].Key[0], e_sector[i].foundKey[0], e_sector[i].Key[1], e_sector[i].foundKey[1]);
}
PrintAndLog("");
PrintAndLog("|---|----------------|----------------|");
PrintAndLog("|sec|key A |key B |");
PrintAndLog("|---|----------------|----------------|");
for (i = 0; i < SectorsCnt; i++) {
// If a block key check, only print a line if a key was found.
if (!singleBlock || e_sector[i].foundKey[0] || e_sector[i].foundKey[1]) {
char keyAString[13] = " ? ";
char keyBString[13] = " ? ";
if (e_sector[i].foundKey[0]) {
sprintf(keyAString, "%012" PRIx64, e_sector[i].Key[0]);
}
if (e_sector[i].foundKey[1]) {
sprintf(keyBString, "%012" PRIx64, e_sector[i].Key[1]);
}
PrintAndLog("|%03d| %s | %s |", i, keyAString, keyBString);
}
PrintAndLog("|---|----------------|---|----------------|---|");
}
PrintAndLog("|---|----------------|----------------|");
} else {
PrintAndLog("");
PrintAndLog("No valid keys found.");
@ -1347,6 +1362,7 @@ int CmdHF14AMfChk(const char *Cmd)
return 0;
}
void readerAttack(nonces_t ar_resp[], bool setEmulatorMem, bool doStandardAttack) {
#define ATTACK_KEY_COUNT 7 // keep same as define in iso14443a.c -> Mifare1ksim()
// cannot be more than 7 or it will overrun c.d.asBytes(512)