]>
cvs.zerfleddert.de Git - proxmark3-svn/blob - client/cmdlfawid.c
7a8aff9b168a2be920828f8211f26f9cf8b16968
1 //-----------------------------------------------------------------------------
2 // Authored by Craig Young <cyoung@tripwire.com> based on cmdlfhid.c structure
4 // cmdlfhid.c is Copyright (C) 2010 iZsh <izsh at fail0verflow.com>
6 // This code is licensed to you under the terms of the GNU GPL, version 2 or,
7 // at your option, any later version. See the LICENSE.txt file for the text of
9 //-----------------------------------------------------------------------------
10 // Low frequency AWID26 commands
11 //-----------------------------------------------------------------------------
13 #include <stdio.h> // sscanf
14 #include "proxmark3.h" // Definitions, USB controls, etc
15 #include "ui.h" // PrintAndLog
16 #include "cmdparser.h" // CmdsParse, CmdsHelp
17 #include "cmdlfawid.h" // AWID function declarations
18 #include "lfdemod.h" // parityTest
19 #include "util.h" // weigandparity
20 #include "protocols.h" // for T55xx config register definitions
24 static int CmdHelp(const char *Cmd
);
26 int usage_lf_awid_fskdemod(void) {
27 PrintAndLog("Enables AWID compatible reader mode printing details of scanned AWID26 or AWID50 tags.");
28 PrintAndLog("By default, values are printed and logged until the button is pressed or another USB command is issued.");
29 PrintAndLog("If the [1] option is provided, reader mode is exited after reading a single AWID card.");
31 PrintAndLog("Usage: lf awid fskdemod [h] [1]");
32 PrintAndLog("Options :");
33 PrintAndLog(" h : This help");
34 PrintAndLog(" 1 : (optional) stop after reading a single card");
36 PrintAndLog("Samples");
37 PrintAndLog(" lf awid fskdemod");
38 PrintAndLog(" lf awid fskdemod 1");
42 int usage_lf_awid_sim(void) {
43 PrintAndLog("Enables simulation of AWID card with specified facility-code and card number.");
44 PrintAndLog("Simulation runs until the button is pressed or another USB command is issued.");
46 PrintAndLog("Usage: lf awid sim [h] <format> <facility-code> <card-number>");
47 PrintAndLog("Options :");
48 PrintAndLog(" h : This help");
49 PrintAndLog(" <format> : format length 26|50");
50 PrintAndLog(" <facility-code> : 8|16bit value facility code");
51 PrintAndLog(" <card number> : 16|32-bit value card number");
53 PrintAndLog("Samples");
54 PrintAndLog(" lf awid sim 26 224 1337");
55 PrintAndLog(" lf awid sim 50 2001 13371337");
59 int usage_lf_awid_clone(void) {
60 PrintAndLog("Enables cloning of AWID card with specified facility-code and card number onto T55x7.");
61 PrintAndLog("The T55x7 must be on the antenna when issuing this command. T55x7 blocks are calculated and printed in the process.");
63 PrintAndLog("Usage: lf awid clone [h] <format> <facility-code> <card-number> [Q5]");
64 PrintAndLog("Options :");
65 PrintAndLog(" h : This help");
66 PrintAndLog(" <format> : format length 26|50");
67 PrintAndLog(" <facility-code> : 8|16bit value facility code");
68 PrintAndLog(" <card number> : 16|32-bit value card number");
69 PrintAndLog(" Q5 : optional - clone to Q5 (T5555) instead of T55x7 chip");
71 PrintAndLog("Samples");
72 PrintAndLog(" lf awid clone 26 224 1337");
73 PrintAndLog(" lf awid clone 50 2001 13371337");
77 int usage_lf_awid_brute(void){
78 PrintAndLog("Enables bruteforce of AWID reader with specified facility-code.");
79 PrintAndLog("This is a incremental attack against reader.");
81 PrintAndLog("Usage: lf awid brute [h] <format> <facility-code>");
82 PrintAndLog("Options :");
83 PrintAndLog(" h : This help");
84 PrintAndLog(" <format> : format length 26|50");
85 PrintAndLog(" <facility-code> : 8|16bit value facility code");
86 PrintAndLog(" <delay> : delay betweens attempts in ms. Default 1000ms");
88 PrintAndLog("Samples");
89 PrintAndLog(" lf awid brute 26 224");
90 PrintAndLog(" lf awid brute 50 2001 2000");
94 int CmdAWIDDemodFSK(const char *Cmd
) {
96 if (Cmd
[0] == 'h' || Cmd
[0] == 'H') return usage_lf_awid_fskdemod();
97 if (Cmd
[0] == '1') findone
= 1;
99 UsbCommand c
= {CMD_AWID_DEMOD_FSK
, {findone
, 0, 0}};
100 clearCommandBuffer();
105 //refactored by marshmellow
106 int getAWIDBits(uint8_t fmtlen
, uint32_t fc
, uint32_t cn
, uint8_t *bits
) {
108 // the return bits, preamble 0000 0001
112 memset(pre
, 0, sizeof(pre
));
115 num_to_bytebits(fmtlen
, 8, pre
);
117 // add facilitycode, cardnumber and wiegand parity bits
118 if ( fmtlen
== 26 ) {
120 num_to_bytebits(fc
, 8, wiegand
);
121 num_to_bytebits(cn
, 16, wiegand
+8);
122 wiegand_add_parity(pre
+8, wiegand
, sizeof(wiegand
));
125 num_to_bytebits(fc
, 16, wiegand
);
126 num_to_bytebits(cn
, 32, wiegand
+16);
127 wiegand_add_parity(pre
+8, wiegand
, sizeof(wiegand
));
130 // add AWID 4bit parity
131 size_t bitLen
= addParity(pre
, bits
+8, 66, 4, 1);
133 if (bitLen
!= 88) return 0;
137 int CmdAWIDSim(const char *Cmd
) {
138 uint32_t fc
= 0, cn
= 0;
142 size_t size
= sizeof(bits
);
143 memset(bs
, 0x00, size
);
145 uint64_t arg1
= ( 10 << 8 ) + 8; // fcHigh = 10, fcLow = 8
146 uint64_t arg2
= 50; // clk RF/50 invert=0
148 char cmdp
= param_getchar(Cmd
, 0);
149 if (strlen(Cmd
) == 0 || cmdp
== 'h' || cmdp
== 'H') return usage_lf_awid_sim();
151 fmtlen
= param_get8(Cmd
, 0);
152 fc
= param_get32ex(Cmd
, 1, 0, 10);
153 cn
= param_get32ex(Cmd
, 2, 0, 10);
154 if ( !fc
|| !cn
) return usage_lf_awid_sim();
158 if ((fc
& 0xFF) != fc
) {
160 PrintAndLog("Facility-Code Truncated to 8-bits (AWID26): %u", fc
);
163 if ((cn
& 0xFFFF) != cn
) {
165 PrintAndLog("Card Number Truncated to 16-bits (AWID26): %u", cn
);
169 if ((fc
& 0xFFFF) != fc
) {
171 PrintAndLog("Facility-Code Truncated to 16-bits (AWID50): %u", fc
);
177 PrintAndLog("Emulating AWID %u -- FC: %u; CN: %u\n", fmtlen
, fc
, cn
);
178 PrintAndLog("Press pm3-button to abort simulation or run another command");
180 if (!getAWIDBits(fmtlen
, fc
, cn
, bs
)) {
181 PrintAndLog("Error with tag bitstream generation.");
184 // AWID uses: fcHigh: 10, fcLow: 8, clk: 50, invert: 0
185 // arg1 --- fcHigh<<8 + fcLow
186 // arg2 --- Inversion and clk setting
187 // 96 --- Bitstream length: 96-bits == 12 bytes
188 UsbCommand c
= {CMD_FSK_SIM_TAG
, {arg1
, arg2
, size
}};
189 memcpy(c
.d
.asBytes
, bs
, size
);
190 clearCommandBuffer();
195 int CmdAWIDClone(const char *Cmd
) {
196 uint32_t blocks
[4] = {T55x7_MODULATION_FSK2a
| T55x7_BITRATE_RF_50
| 3<<T55x7_MAXBLOCK_SHIFT
, 0, 0, 0};
197 uint32_t fc
= 0, cn
= 0;
201 memset(bs
,0,sizeof(bits
));
203 char cmdp
= param_getchar(Cmd
, 0);
204 if (strlen(Cmd
) == 0 || cmdp
== 'h' || cmdp
== 'H') return usage_lf_awid_clone();
206 fmtlen
= param_get8(Cmd
, 0);
207 fc
= param_get32ex(Cmd
, 1, 0, 10);
208 cn
= param_get32ex(Cmd
, 2, 0, 10);
210 if ( !fc
|| !cn
) return usage_lf_awid_clone();
214 if ((fc
& 0xFFFF) != fc
) {
216 PrintAndLog("Facility-Code Truncated to 16-bits (AWID50): %u", fc
);
221 if ((fc
& 0xFF) != fc
) {
223 PrintAndLog("Facility-Code Truncated to 8-bits (AWID26): %u", fc
);
226 if ((cn
& 0xFFFF) != cn
) {
228 PrintAndLog("Card Number Truncated to 16-bits (AWID26): %u", cn
);
233 if (param_getchar(Cmd
, 4) == 'Q' || param_getchar(Cmd
, 4) == 'q')
234 //t5555 (Q5) BITRATE = (RF-2)/2 (iceman)
235 blocks
[0] = T5555_MODULATION_FSK2
| T5555_INVERT_OUTPUT
| 50<<T5555_BITRATE_SHIFT
| 3<<T5555_MAXBLOCK_SHIFT
;
237 if ( !getAWIDBits(fmtlen
, fc
, cn
, bs
)) {
238 PrintAndLog("Error with tag bitstream generation.");
242 blocks
[1] = bytebits_to_byte(bs
,32);
243 blocks
[2] = bytebits_to_byte(bs
+32,32);
244 blocks
[3] = bytebits_to_byte(bs
+64,32);
246 PrintAndLog("Preparing to clone AWID %u to T55x7 with FC: %u, CN: %u", fmtlen
, fc
, cn
);
247 PrintAndLog("Blk | Data ");
248 PrintAndLog("----+------------");
249 PrintAndLog(" 00 | 0x%08x", blocks
[0]);
250 PrintAndLog(" 01 | 0x%08x", blocks
[1]);
251 PrintAndLog(" 02 | 0x%08x", blocks
[2]);
252 PrintAndLog(" 03 | 0x%08x", blocks
[3]);
255 UsbCommand c
= {CMD_T55XX_WRITE_BLOCK
, {0,0,0}};
257 for (uint8_t i
=0; i
<4; i
++) {
258 c
.arg
[0] = blocks
[i
];
260 clearCommandBuffer();
262 if (!WaitForResponseTimeout(CMD_ACK
, &resp
, 1500)){
263 PrintAndLog("Error occurred, device did not respond during write operation.");
270 int CmdAWIDBrute(const char *Cmd
){
274 uint16_t delay
= 1000;
277 size_t size
= sizeof(bits
);
278 memset(bs
, 0x00, size
);
280 char cmdp
= param_getchar(Cmd
, 0);
281 if (strlen(Cmd
) == 0 || cmdp
== 'h' || cmdp
== 'H') return usage_lf_awid_brute();
283 fmtlen
= param_get8(Cmd
, 0);
284 fc
= param_get32ex(Cmd
, 1, 0, 10);
285 if ( !fc
) return usage_lf_awid_brute();
287 // delay between attemps, defaults to 1000ms.
288 delay
= param_get8(Cmd
, 2);
294 if ((fc
& 0xFFFF) != fc
) {
296 PrintAndLog("Facility-Code Truncated to 16-bits (AWID50): %u", fc
);
300 if ((fc
& 0xFF) != fc
) {
302 PrintAndLog("Facility-Code Truncated to 8-bits (AWID26): %u", fc
);
307 PrintAndLog("Bruteforceing AWID %d Reader", fmtlen
);
308 PrintAndLog("Press pm3-button to abort simulation or press key");
310 uint64_t arg1
= (10<<8) + 8; // fcHigh = 10, fcLow = 8
311 uint64_t arg2
= 50; // clk RF/50 invert=0
312 UsbCommand c
= {CMD_FSK_SIM_TAG
, {arg1
, arg2
, size
}};
314 for ( uint16_t cn
= 1; cn
< 0xFFFF; ++cn
){
317 PrintAndLog("aborted via keyboard!");
318 UsbCommand ping
= {CMD_PING
};
319 clearCommandBuffer();
324 PrintAndLog("Trying FC: %u; CN: %u", fc
, cn
);
325 (void)getAWIDBits(fmtlen
, fc
, cn
, bs
);
326 memcpy(c
.d
.asBytes
, bs
, size
);
327 clearCommandBuffer();
335 static command_t CommandTable
[] = {
336 {"help", CmdHelp
, 1, "This help"},
337 {"fskdemod", CmdAWIDDemodFSK
, 0, "['1'] Realtime AWID FSK demodulator (option '1' for one tag only)"},
338 {"sim", CmdAWIDSim
, 0, "<Facility-Code> <Card Number> -- AWID tag simulator"},
339 {"clone", CmdAWIDClone
, 0, "<Facility-Code> <Card Number> <Q5> -- Clone AWID to T55x7"},
340 {"brute", CmdAWIDBrute
, 0, "<Facility-Code> -- bruteforce card number"},
341 {NULL
, NULL
, 0, NULL
}
344 int CmdLFAWID(const char *Cmd
) {
345 clearCommandBuffer();
346 CmdsParse(CommandTable
, Cmd
);
350 int CmdHelp(const char *Cmd
) {
351 CmdsHelp(CommandTable
);