b915fda3 |
1 | local cmds = require('commands') |
2 | local getopt = require('getopt') |
3 | local bin = require('bin') |
4 | local lib14a = require('read14a') |
5 | local utils = require('utils') |
6 | local md5 = require('md5') |
7 | local dumplib = require('html_dumplib') |
8 | local toyNames = require('default_toys') |
9 | |
04a6113f |
10 | |
b915fda3 |
11 | example =[[ |
04a6113f |
12 | script run tnp3dump |
13 | script run tnp3dump -n |
14 | script run tnp3dump -p |
15 | script run tnp3dump -k aabbccddeeff |
16 | script run tnp3dump -k aabbccddeeff -n |
17 | script run tnp3dump -o myfile |
18 | script run tnp3dump -n -o myfile |
19 | script run tnp3dump -p -o myfile |
20 | script run tnp3dump -k aabbccddeeff -n -o myfile |
b915fda3 |
21 | ]] |
22 | author = "Iceman" |
04a6113f |
23 | usage = "script run tnp3dump -k <key> -n -p -o <filename>" |
b915fda3 |
24 | desc =[[ |
25 | This script will try to dump the contents of a Mifare TNP3xxx card. |
26 | It will need a valid KeyA in order to find the other keys and decode the card. |
27 | Arguments: |
28 | -h : this help |
29 | -k <key> : Sector 0 Key A. |
30 | -n : Use the nested cmd to find all keys |
04a6113f |
31 | -p : Use the precalc to find all keys |
b915fda3 |
32 | -o : filename for the saved dumps |
33 | ]] |
34 | |
35 | local HASHCONSTANT = '20436F707972696768742028432920323031302041637469766973696F6E2E20416C6C205269676874732052657365727665642E20' |
36 | |
37 | local TIMEOUT = 2000 -- Shouldn't take longer than 2 seconds |
38 | local DEBUG = false -- the debug flag |
39 | local numBlocks = 64 |
40 | local numSectors = 16 |
41 | --- |
42 | -- A debug printout-function |
43 | function dbg(args) |
44 | if not DEBUG then |
45 | return |
46 | end |
47 | |
48 | if type(args) == "table" then |
49 | local i = 1 |
50 | while result[i] do |
51 | dbg(result[i]) |
52 | i = i+1 |
53 | end |
54 | else |
55 | print("###", args) |
56 | end |
57 | end |
58 | --- |
59 | -- This is only meant to be used when errors occur |
60 | function oops(err) |
61 | print("ERROR: ",err) |
62 | end |
63 | --- |
64 | -- Usage help |
65 | function help() |
66 | print(desc) |
67 | print("Example usage") |
68 | print(example) |
69 | end |
70 | -- |
71 | -- Exit message |
72 | function ExitMsg(msg) |
73 | print( string.rep('--',20) ) |
74 | print( string.rep('--',20) ) |
75 | print(msg) |
76 | print() |
77 | end |
78 | |
79 | local function readdumpkeys(infile) |
80 | t = infile:read("*all") |
81 | len = string.len(t) |
82 | local len,hex = bin.unpack(("H%d"):format(len),t) |
83 | return hex |
84 | end |
85 | |
86 | local function waitCmd() |
87 | local response = core.WaitForResponseTimeout(cmds.CMD_ACK,TIMEOUT) |
88 | if response then |
89 | local count,cmd,arg0 = bin.unpack('LL',response) |
90 | if(arg0==1) then |
91 | local count,arg1,arg2,data = bin.unpack('LLH511',response,count) |
92 | return data:sub(1,32) |
93 | else |
94 | return nil, "Couldn't read block.." |
95 | end |
96 | end |
97 | return nil, "No response from device" |
98 | end |
99 | |
100 | local function computeCrc16(s) |
101 | local hash = core.crc16(utils.ConvertHexToAscii(s)) |
102 | return hash |
103 | end |
104 | |
105 | local function reverseCrcBytes(crc) |
106 | crc2 = crc:sub(3,4)..crc:sub(1,2) |
107 | return tonumber(crc2,16) |
108 | end |
109 | |
110 | local function main(args) |
111 | |
112 | print( string.rep('--',20) ) |
113 | print( string.rep('--',20) ) |
114 | |
115 | local keyA |
116 | local cmd |
117 | local err |
118 | local useNested = false |
04a6113f |
119 | local usePreCalc = false |
b915fda3 |
120 | local cmdReadBlockString = 'hf mf rdbl %d A %s' |
121 | local input = "dumpkeys.bin" |
122 | local outputTemplate = os.date("toydump_%Y-%m-%d_%H%M%S"); |
123 | |
124 | -- Arguments for the script |
04a6113f |
125 | for o, a in getopt.getopt(args, 'hk:npo:') do |
b915fda3 |
126 | if o == "h" then return help() end |
127 | if o == "k" then keyA = a end |
128 | if o == "n" then useNested = true end |
04a6113f |
129 | if o == "p" then usePreCalc = true end |
b915fda3 |
130 | if o == "o" then outputTemplate = a end |
131 | end |
132 | |
133 | -- validate input args. |
134 | keyA = keyA or '4b0b20107ccb' |
135 | if #(keyA) ~= 12 then |
136 | return oops( string.format('Wrong length of write key (was %d) expected 12', #keyA)) |
137 | end |
138 | |
139 | -- Turn off Debug |
140 | local cmdSetDbgOff = "hf mf dbg 0" |
141 | core.console( cmdSetDbgOff) |
142 | |
143 | result, err = lib14a.read1443a(false) |
144 | if not result then |
145 | return oops(err) |
146 | end |
147 | |
148 | core.clearCommandBuffer() |
149 | |
150 | if 0x01 ~= result.sak then -- NXP MIFARE TNP3xxx |
151 | return oops('This is not a TNP3xxx tag. aborting.') |
152 | end |
153 | |
154 | -- Show tag info |
04a6113f |
155 | print((' Found tag %s'):format(result.name)) |
156 | |
157 | dbg(('Using keyA : %s'):format(keyA)) |
b915fda3 |
158 | |
159 | --Trying to find the other keys |
160 | if useNested then |
161 | core.console( ('hf mf nested 1 0 A %s d'):format(keyA) ) |
162 | end |
04a6113f |
163 | |
b915fda3 |
164 | core.clearCommandBuffer() |
165 | |
04a6113f |
166 | local akeys = '' |
167 | if usePreCalc then |
168 | local pre = require('precalc') |
169 | akeys = pre.GetAll(result.uid) |
170 | else |
171 | print('Loading dumpkeys.bin') |
172 | local hex, err = utils.ReadDumpFile(input) |
173 | if not hex then |
174 | return oops(err) |
175 | end |
176 | akeys = hex:sub(0,12*16) |
b915fda3 |
177 | end |
04a6113f |
178 | |
b915fda3 |
179 | -- Read block 0 |
180 | cmd = Command:new{cmd = cmds.CMD_MIFARE_READBL, arg1 = 0,arg2 = 0,arg3 = 0, data = keyA} |
181 | err = core.SendCommand(cmd:getBytes()) |
182 | if err then return oops(err) end |
183 | local block0, err = waitCmd() |
184 | if err then return oops(err) end |
185 | |
186 | -- Read block 1 |
187 | cmd = Command:new{cmd = cmds.CMD_MIFARE_READBL, arg1 = 1,arg2 = 0,arg3 = 0, data = keyA} |
188 | err = core.SendCommand(cmd:getBytes()) |
189 | if err then return oops(err) end |
190 | local block1, err = waitCmd() |
191 | if err then return oops(err) end |
192 | |
193 | local key |
194 | local pos = 0 |
195 | local blockNo |
196 | local blocks = {} |
197 | |
198 | print('Reading card data') |
199 | core.clearCommandBuffer() |
200 | |
201 | -- main loop |
04a6113f |
202 | io.write('Reading blocks > ') |
b915fda3 |
203 | for blockNo = 0, numBlocks-1, 1 do |
204 | |
205 | if core.ukbhit() then |
206 | print("aborted by user") |
207 | break |
208 | end |
209 | |
210 | pos = (math.floor( blockNo / 4 ) * 12)+1 |
211 | key = akeys:sub(pos, pos + 11 ) |
212 | cmd = Command:new{cmd = cmds.CMD_MIFARE_READBL, arg1 = blockNo ,arg2 = 0,arg3 = 0, data = key} |
213 | local err = core.SendCommand(cmd:getBytes()) |
214 | if err then return oops(err) end |
215 | local blockdata, err = waitCmd() |
216 | if err then return oops(err) end |
217 | |
218 | if blockNo%4 ~= 3 then |
219 | if blockNo < 8 then |
220 | -- Block 0-7 not encrypted |
221 | blocks[blockNo+1] = ('%02d :: %s'):format(blockNo,blockdata) |
222 | else |
223 | local base = ('%s%s%02x%s'):format(block0, block1, blockNo, HASHCONSTANT) |
224 | local baseStr = utils.ConvertHexToAscii(base) |
225 | local md5hash = md5.sumhexa(baseStr) |
226 | local aestest = core.aes(md5hash, blockdata) |
227 | |
228 | local hex = utils.ConvertAsciiToBytes(aestest) |
229 | hex = utils.ConvertBytesToHex(hex) |
230 | |
231 | -- blocks with zero not encrypted. |
232 | if string.find(blockdata, '^0+$') then |
233 | blocks[blockNo+1] = ('%02d :: %s'):format(blockNo,blockdata) |
234 | else |
235 | blocks[blockNo+1] = ('%02d :: %s'):format(blockNo,hex) |
236 | io.write( blockNo..',') |
237 | end |
238 | end |
239 | else |
240 | -- Sectorblocks, not encrypted |
241 | blocks[blockNo+1] = ('%02d :: %s%s'):format(blockNo,key,blockdata:sub(13,32)) |
242 | end |
243 | end |
244 | io.write('\n') |
245 | |
246 | core.clearCommandBuffer() |
247 | |
248 | -- Print results |
249 | local bindata = {} |
250 | local emldata = '' |
251 | |
252 | for _,s in pairs(blocks) do |
253 | local slice = s:sub(8,#s) |
254 | local str = utils.ConvertBytesToAscii( |
255 | utils.ConvertHexToBytes(slice) |
256 | ) |
257 | emldata = emldata..slice..'\n' |
258 | for c in (str):gmatch('.') do |
259 | bindata[#bindata+1] = c |
260 | end |
261 | end |
262 | |
5149e37e |
263 | local uid = block0:sub(1,8) |
264 | local itemtype = block1:sub(1,4) |
04a6113f |
265 | local cardidLsw = block1:sub(9,16) |
266 | local cardidMsw = block1:sub(16,24) |
5149e37e |
267 | local cardid = block1:sub(9,24) |
a8d4906b |
268 | local traptype = block1:sub(25,28) |
5149e37e |
269 | |
b915fda3 |
270 | -- Write dump to files |
271 | if not DEBUG then |
5149e37e |
272 | local foo = dumplib.SaveAsBinary(bindata, outputTemplate..'_uid_'..uid..'.bin') |
04a6113f |
273 | print(("Wrote a BIN dump to: %s"):format(foo)) |
5149e37e |
274 | local bar = dumplib.SaveAsText(emldata, outputTemplate..'_uid_'..uid..'.eml') |
04a6113f |
275 | print(("Wrote a EML dump to: %s"):format(bar)) |
b915fda3 |
276 | end |
277 | |
04a6113f |
278 | local itemtypename = toyNames[itemtype] |
279 | if itemtypename == nil then |
280 | itemtypename = toyNames[utils.SwapEndiannessStr(itemtype,16)] |
281 | end |
b915fda3 |
282 | -- Show info |
283 | print( string.rep('--',20) ) |
04a6113f |
284 | print( (' ITEM TYPE : 0x%s - %s'):format(itemtype, itemtypename) ) |
a8d4906b |
285 | print( (' Alter ego / traptype : 0x%s'):format(traptype) ) |
286 | print( (' UID : 0x%s'):format(uid) ) |
287 | print( (' CARDID : 0x%s'):format(cardid ) ) |
288 | |
b915fda3 |
289 | print( string.rep('--',20) ) |
290 | |
291 | end |
292 | main(args) |