1 local cmds = require('commands')
2 local getopt = require('getopt')
3 local bin = require('bin')
4 local lib14a = require('read14a')
5 local utils = require('utils')
6 local md5 = require('md5')
7 local dumplib = require('html_dumplib')
8 local toyNames = require('default_toys')
13 3. script run tnp3 -k aabbccddeeff
14 4. script run tnp3 -k aabbccddeeff -n
15 5. script run tnp3 -o myfile
16 6. script run tnp3 -n -o myfile
17 7. script run tnp3 -k aabbccddeeff -n -o myfile
20 usage = "script run tnp3 -k <key> -n -o <filename>"
22 This script will try to dump the contents of a Mifare TNP3xxx card.
23 It will need a valid KeyA in order to find the other keys and decode the card.
26 -k <key> : Sector 0 Key A.
27 -n : Use the nested cmd to find all keys
28 -o : filename for the saved dumps
31 local hashconstant = '20436F707972696768742028432920323031302041637469766973696F6E2E20416C6C205269676874732052657365727665642E20'
33 local TIMEOUT = 2000 -- Shouldn't take longer than 2 seconds
34 local DEBUG = true -- the debug flag
38 -- A debug printout-function
44 if type(args) == "table" then
55 -- This is only meant to be used when errors occur
63 print("Example usage")
69 print( string.rep('--',20) )
70 print( string.rep('--',20) )
75 local function readdumpkeys(infile)
76 t = infile:read("*all")
78 local len,hex = bin.unpack(("H%d"):format(len),t)
82 local function waitCmd()
83 local response = core.WaitForResponseTimeout(cmds.CMD_ACK,TIMEOUT)
85 local count,cmd,arg0 = bin.unpack('LL',response)
87 local count,arg1,arg2,data = bin.unpack('LLH511',response,count)
90 return nil, "Couldn't read block.."
93 return nil, "No response from device"
96 local function computeCrc16(s)
97 local hash = core.crc16(utils.ConvertHexToAscii(s))
101 local function reverseCrcBytes(crc)
102 crc2 = crc:sub(3,4)..crc:sub(1,2)
103 return tonumber(crc2,16)
106 local function main(args)
108 print( string.rep('--',20) )
109 print( string.rep('--',20) )
114 local useNested = false
115 local cmdReadBlockString = 'hf mf rdbl %d A %s'
116 local input = "dumpkeys.bin"
117 local outputTemplate = os.date("toydump_%Y-%m-%d_%H%M%S");
119 -- Arguments for the script
120 for o, a in getopt.getopt(args, 'hk:no:') do
121 if o == "h" then return help() end
122 if o == "k" then keyA = a end
123 if o == "n" then useNested = true end
124 if o == "o" then outputTemplate = a end
127 -- validate input args.
128 keyA = keyA or '4b0b20107ccb'
129 if #(keyA) ~= 12 then
130 return oops( string.format('Wrong length of write key (was %d) expected 12', #keyA))
134 local cmdSetDbgOff = "hf mf dbg 0"
135 core.console( cmdSetDbgOff)
137 result, err = lib14a.read1443a(false)
142 core.clearCommandBuffer()
144 if 0x01 ~= result.sak then -- NXP MIFARE TNP3xxx
145 return oops('This is not a TNP3xxx tag. aborting.')
149 print((' Found tag : %s'):format(result.name))
150 print(('Using keyA : %s'):format(keyA))
152 --Trying to find the other keys
154 core.console( ('hf mf nested 1 0 A %s d'):format(keyA) )
158 print('Loading dumpkeys.bin')
159 local infile = io.open(input, "rb")
160 if infile == nil then
161 return oops('Could not read file ', input)
163 local akeys = readdumpkeys(infile):sub(0,12*16)
166 cmd = Command:new{cmd = cmds.CMD_MIFARE_READBL, arg1 = 0,arg2 = 0,arg3 = 0, data = keyA}
167 err = core.SendCommand(cmd:getBytes())
168 if err then return oops(err) end
169 local block0, err = waitCmd()
170 if err then return oops(err) end
173 cmd = Command:new{cmd = cmds.CMD_MIFARE_READBL, arg1 = 1,arg2 = 0,arg3 = 0, data = keyA}
174 err = core.SendCommand(cmd:getBytes())
175 if err then return oops(err) end
176 local block1, err = waitCmd()
177 if err then return oops(err) end
184 print('Reading card data')
185 core.clearCommandBuffer()
188 io.write('Decrypting blocks > ')
189 for blockNo = 0, numBlocks-1, 1 do
191 if core.ukbhit() then
192 print("aborted by user")
196 pos = (math.floor( blockNo / 4 ) * 12)+1
197 key = akeys:sub(pos, pos + 11 )
198 cmd = Command:new{cmd = cmds.CMD_MIFARE_READBL, arg1 = blockNo ,arg2 = 0,arg3 = 0, data = key}
199 local err = core.SendCommand(cmd:getBytes())
200 if err then return oops(err) end
201 local blockdata, err = waitCmd()
202 if err then return oops(err) end
204 if blockNo%4 ~= 3 then
206 -- Block 0-7 not encrypted
207 blocks[blockNo+1] = ('%02d :: %s'):format(blockNo,blockdata)
209 local base = ('%s%s%02x%s'):format(block0, block1, blockNo, hashconstant)
210 local baseStr = utils.ConvertHexToAscii(base)
211 local md5hash = md5.sumhexa(baseStr)
212 local aestest = core.aes(md5hash, blockdata)
214 local hex = utils.ConvertAsciiStringToBytes(aestest)
215 hex = utils.ConvertBytes2HexString(hex)
216 --local _,hex = bin.unpack(("H%d"):format(16),aestest)
218 -- blocks with zero not encrypted.
219 if string.find(blockdata, '^0+$') then
220 blocks[blockNo+1] = ('%02d :: %s'):format(blockNo,blockdata)
222 blocks[blockNo+1] = ('%02d :: %s'):format(blockNo,hex)
223 io.write( blockNo..',')
227 -- Sectorblocks, not encrypted
228 blocks[blockNo+1] = ('%02d :: %s%s'):format(blockNo,key,blockdata:sub(13,32))
233 core.clearCommandBuffer()
239 for _,s in pairs(blocks) do
240 local slice = s:sub(8,#s)
241 local str = utils.ConvertBytesToAsciiString(
242 utils.ConvertHexStringToBytes(slice)
244 emldata = emldata..slice..'\n'
245 for c in (str):gmatch('.') do
246 bindata[#bindata+1] = c
250 -- Write dump to files
252 local foo = dumplib.SaveAsBinary(bindata, outputTemplate..'.bin')
253 print(("Wrote a BIN dump to the file %s"):format(foo))
254 local bar = dumplib.SaveAsText(emldata, outputTemplate..'.eml')
255 print(("Wrote a EML dump to the file %s"):format(bar))
258 local uid = block0:sub(1,8)
259 local itemtype = block1:sub(1,4)
260 local cardid = block1:sub(9,24)
263 print( string.rep('--',20) )
264 print( (' ITEM TYPE : 0x%s - %s'):format(itemtype, toyNames[itemtype]) )
265 print( (' UID : 0x%s'):format(uid) )
266 print( (' CARDID : 0x%s'):format(cardid ) )
267 print( string.rep('--',20) )
269 print('Validating checksums')
271 local test1 = ('%s%s'):format(block0, block1:sub(1,28))
272 local crc = block1:sub(29,32)
273 local revcrc = reverseCrcBytes(crc)
275 io.write( ('BLOCK 0-1 : %04x = %04x \n'):format(revcrc,computeCrc16(test1)))
277 -- Checksum Typ 1 BLOCK 9
278 local block9 = blocks[9]:sub(8,35)
279 test1 = ('%s0500'):format(block9)
280 crc = blocks[9]:sub(36,39)
281 revcrc = reverseCrcBytes(crc)
282 io.write( ('BLOCK 8 : %04x = %04x \n'):format(revcrc,computeCrc16(test1)))
284 -- Checksum Typ 1 BLOCK 37
285 local block37 = blocks[37]:sub(8,35)
286 test1 = ('%s0500'):format(block37)
287 crc = blocks[37]:sub(36,39)
288 revcrc = reverseCrcBytes(crc)
289 io.write( ('BLOCK 36 : %04x = %04x \n'):format(revcrc,computeCrc16(test1)))
293 test1 = blocks[10]:sub(8,39)..
294 blocks[11]:sub(8,39)..
297 crc = blocks[9]:sub(32,35)
298 revcrc = reverseCrcBytes(crc)
299 io.write( ('BLOCK 10-11-13 :%04x = %04x \n'):format(revcrc,computeCrc16(test1)))
302 crc = blocks[9]:sub(28,31)
303 revcrc = reverseCrcBytes(crc)
304 test1 = blocks[14]:sub(8,39)..
305 blocks[15]:sub(8,39)..
308 local tohash = test1..string.rep('00',0xe0)
309 local hashed = computeCrc16(tohash)
310 io.write( ('BLOCK 14-15-17 %04x = %04x \n'):format(revcrc,hashed))