]> cvs.zerfleddert.de Git - proxmark3-svn/blame - client/scripts/tnp3.lua
FIX: minor parseing bug when loading dumpkeys.bin file.
[proxmark3-svn] / client / scripts / tnp3.lua
CommitLineData
c15d2bdc 1local cmds = require('commands')
2local getopt = require('getopt')
3local bin = require('bin')
4local lib14a = require('read14a')
5local utils = require('utils')
6local md5 = require('md5')
7
8example =[[
9 1. script run tnp3
8aa79dee 10 2. script run tnp3 -n
11 3. script run tnp3 -k aabbccddeeff
12 4. script run tnp3 -k aabbccddeeff -n
c15d2bdc 13]]
14author = "Iceman"
8aa79dee 15usage = "script run tnp3 -k <key> -n"
c15d2bdc 16desc =[[
17This script will try to dump the contents of a Mifare TNP3xxx card.
18It will need a valid KeyA in order to find the other keys and decode the card.
19Arguments:
8aa79dee 20 -h : this help
21 -k <key> : Sector 0 Key A.
22 -n : Use the nested cmd to find all keys
c15d2bdc 23]]
24
8aa79dee 25-- AES konstant? LEN 0x24 36,
26-- I dekompilen är det för internal static array = 0x36 54
c15d2bdc 27local hashconstant = '20436F707972696768742028432920323031302041637469766973696F6E2E20416C6C205269676874732052657365727665642E20'
28
29local TIMEOUT = 2000 -- Shouldn't take longer than 2 seconds
30local DEBUG = true -- the debug flag
31local numBlocks = 64
32local numSectors = 16
33---
34-- A debug printout-function
35function dbg(args)
36 if not DEBUG then
37 return
38 end
39
40 if type(args) == "table" then
41 local i = 1
42 while result[i] do
43 dbg(result[i])
44 i = i+1
45 end
46 else
47 print("###", args)
48 end
49end
50---
51-- This is only meant to be used when errors occur
52function oops(err)
53 print("ERROR: ",err)
54end
55---
56-- Usage help
57function help()
58 print(desc)
59 print("Example usage")
60 print(example)
61end
62--
63-- Exit message
64function ExitMsg(msg)
65 print( string.rep('--',20) )
66 print( string.rep('--',20) )
67 print(msg)
68 print()
69end
70
c70cef97 71local function readdumpkeys(infile)
72 t = infile:read("*all")
73 len = string.len(t)
74 local len,hex = bin.unpack(("H%d"):format(len),t)
c70cef97 75 return hex
76end
77
78local function waitCmd()
c15d2bdc 79 local response = core.WaitForResponseTimeout(cmds.CMD_ACK,TIMEOUT)
80 if response then
81 local count,cmd,arg0 = bin.unpack('LL',response)
82 if(arg0==1) then
83 local count,arg1,arg2,data = bin.unpack('LLH511',response,count)
84 return data:sub(1,32)
85 else
86 return nil, "Couldn't read block.."
87 end
88 end
89 return nil, "No response from device"
90end
91
92local function main(args)
93
94 print( string.rep('--',20) )
95 print( string.rep('--',20) )
96 print()
97
98 local keyA
99 local cmd
100 local err
8aa79dee 101 local useNested = false
c15d2bdc 102 local cmdReadBlockString = 'hf mf rdbl %d A %s'
c70cef97 103 local input = "dumpkeys.bin"
c15d2bdc 104
105 -- Arguments for the script
8aa79dee 106 for o, a in getopt.getopt(args, 'hk:n') do
c15d2bdc 107 if o == "h" then return help() end
108 if o == "k" then keyA = a end
8aa79dee 109 if o == "n" then useNested = true end
c15d2bdc 110 end
111
112 -- validate input args.
113 keyA = keyA or '4b0b20107ccb'
114 if #(keyA) ~= 12 then
115 return oops( string.format('Wrong length of write key (was %d) expected 12', #keyA))
116 end
117
118 result, err = lib14a.read1443a(false)
119 if not result then
8aa79dee 120 return oops(err)
c15d2bdc 121 end
8aa79dee 122
c70cef97 123 print((' Found tag : %s'):format(result.name))
c15d2bdc 124
125 core.clearCommandBuffer()
126
127 if 0x01 ~= result.sak then -- NXP MIFARE TNP3xxx
8aa79dee 128 return oops('This is not a TNP3xxx tag. aborting.')
c15d2bdc 129 end
130
131 -- Show info
132 print(('Using keyA : %s'):format(keyA))
133 print( string.rep('--',20) )
134
1a5ff2c2 135
8aa79dee 136 if useNested then
1a5ff2c2 137 print('Trying to find keys.')
8aa79dee 138 core.console( ('hf mf nested 1 0 A %s d'):format(keyA) )
139 end
c70cef97 140
8aa79dee 141 -- Loading keyfile
1a5ff2c2 142 print('Loading dumpkeys.bin')
c70cef97 143 local infile = io.open(input, "rb")
144 if infile == nil then
145 return oops('Could not read file ', input)
146 end
147 local akeys = readdumpkeys(infile):sub(0,12*16)
9b989c45 148
c15d2bdc 149 -- Read block 0
150 cmd = Command:new{cmd = cmds.CMD_MIFARE_READBL, arg1 = 0,arg2 = 0,arg3 = 0, data = keyA}
151 err = core.SendCommand(cmd:getBytes())
152 if err then return oops(err) end
153 local block0, err = waitCmd()
154 if err then return oops(err) end
155
156 -- Read block 1
157 cmd = Command:new{cmd = cmds.CMD_MIFARE_READBL, arg1 = 1,arg2 = 0,arg3 = 0, data = keyA}
8aa79dee 158 err = core.SendCommand(cmd:getBytes())
c15d2bdc 159 if err then return oops(err) end
160 local block1, err = waitCmd()
161 if err then return oops(err) end
162
8aa79dee 163 local key
164 local pos = 0
165 local blockNo
166 local blocks = {}
c15d2bdc 167
c15d2bdc 168 -- main loop
1a5ff2c2 169 for blockNo = 0, numBlocks-1, 1 do
170
171 if core.ukbhit() then
172 print("aborted by user")
173 break
174 end
175
176 pos = (math.floor( blockNo / 4 ) * 12)+1
9b989c45 177 key = akeys:sub(pos, pos + 11 )
1a5ff2c2 178 cmd = Command:new{cmd = cmds.CMD_MIFARE_READBL, arg1 = blockNo ,arg2 = 0,arg3 = 0, data = key}
179 local err = core.SendCommand(cmd:getBytes())
180 if err then return oops(err) end
181 local blockdata, err = waitCmd()
182 if err then return oops(err) end
183
8aa79dee 184 local b = blockNo%4
1a5ff2c2 185
8aa79dee 186 if b ~= 3 then
1a5ff2c2 187 if blockNo < 8 then
188 -- Block 0-7 not encrypted
189 blocks[blockNo+1] = ('%02d :: %s :: %s'):format(blockNo,blockdata,blockdata)
8aa79dee 190 else
1a5ff2c2 191 local base = ('%s%s%d%s'):format(block0, block1, blockNo, hashconstant)
192 local md5hash = md5.sumhexa(base)
193 local aestest = core.aes(md5hash, blockdata)
194
195 local _,hex = bin.unpack(("H%d"):format(16),aestest)
196
197 -- local hexascii = string.gsub(hex, '(%x%x)',
198 -- function(value)
199 -- return string.char(tonumber(value, 16))
200 -- end
201 -- )
202
203 if string.find(blockdata, '^0+$') then
204 blocks[blockNo+1] = ('%02d :: %s :: %s'):format(blockNo,blockdata,blockdata)
205 else
206 --blocks[blockNo+1] = ('%02d :: %s :: %s :: %s '):format(blockNo,key,md5hash,hex)
207 blocks[blockNo+1] = ('%02d :: %s :: %s'):format(blockNo,blockdata,hex)
208 end
c70cef97 209 end
1a5ff2c2 210
211 else
212 -- Sectorblocks, not encrypted
213 blocks[blockNo+1] = ('%02d :: %s :: %s'):format(blockNo,blockdata,blockdata)
c70cef97 214 end
c15d2bdc 215 end
8aa79dee 216
217 -- Print results
218 print('BLK :: DATA DECRYPTED' )
219 print( string.rep('--',36) )
220 for _,s in pairs(blocks) do
221 print( s )
222 end
c15d2bdc 223end
224
225main(args)
Impressum, Datenschutz