]> cvs.zerfleddert.de Git - proxmark3-svn/blame - client/scripts/mifare.lua
Started an experiment with lua mifare hack
[proxmark3-svn] / client / scripts / mifare.lua
CommitLineData
3510cdff 1local desc = "How would the classic mifare hack look in lua? Let's find out "
2print(desc);
3
4print("This script isn't even remotely finished!")
5print("Checking preconditions");
6print("core", core)
7print("core.SendCommand", core.SendCommand)
8print("core.WaitForResponseTimeout", core.WaitForResponseTimeout)
9print("core.nonce2key", core.nonce2key)
10-- To actually send something meaningful, we need to include the 'Binlib' or 'lpack' library.
11local x = core.SendCommand("aaaabbbb2222111100000ggggaaaabbbb2222111100000ggggaaaabbbb2222111100000ggggaaaabbbb2222111100000ggggaaaabbbb2222111100000ggggaaaabbbb2222111100000ggggaaaabbbb2222111100000ggggaaaabbbb2222111100000ggggaaaabbbb2222111100000ggggaaaabbbb2222111100000ggggaaaabbbb2222111100000ggggaaaabbbb2222111100000ggggaaaabbbb2222111100000ggggaaaabbbb2222111100000ggggaaaabbbb2222111100000ggggaaaabbbb2222111100000ggggaaaabbbb2222111100000ggggaaaabbbb2222111100000ggggaaaabbbb2222111100000ggggaaaabbbb2222111100000gggg12345678901234567890123456789012345678901234")
12local result = core.WaitForResponseTimeout(0x0611,1000)
13--- Oh, and nonce2Key is not 'glued' yet.
14print("err", result)
Impressum, Datenschutz