#include <inttypes.h>
#include "proxmark3.h"
#include "ui.h"
+#include "util.h"
#include "graph.h"
-#include "cmdmain.h"
#include "cmdparser.h"
#include "cmddata.h"
#include "cmdlf.h"
#include "cmdlfem4x.h"
-#include "util.h"
-#include "data.h"
-#define LF_TRACE_BUFF_SIZE 16000
-
char *global_em410xId;
static int CmdHelp(const char *Cmd);
+int CmdEMdemodASK(const char *Cmd)
+{
+ char cmdp = param_getchar(Cmd, 0);
+ int findone = (cmdp == '1') ? 1 : 0;
+ UsbCommand c={CMD_EM410X_DEMOD};
+ c.arg[0]=findone;
+ SendCommand(&c);
+ return 0;
+}
+
/* Read the ID of an EM410x tag.
* Format:
* 1111 1111 1 <-- standard non-repeatable header
*/
int CmdEM410xRead(const char *Cmd)
{
- int i, j, clock, header, rows, bit, hithigh, hitlow, first, bit2idx, high, low;
- int parity[4];
- char id[11];
- char id2[11];
- int retested = 0;
- uint8_t BitStream[MAX_GRAPH_TRACE_LEN];
- high = low = 0;
-
- /* Detect high and lows and clock */
- for (i = 0; i < GraphTraceLen; i++)
- {
- if (GraphBuffer[i] > high)
- high = GraphBuffer[i];
- else if (GraphBuffer[i] < low)
- low = GraphBuffer[i];
- }
-
- /* get clock */
- clock = GetClock(Cmd, high, 0);
-
- /* parity for our 4 columns */
- parity[0] = parity[1] = parity[2] = parity[3] = 0;
- header = rows = 0;
-
- /* manchester demodulate */
- bit = bit2idx = 0;
- for (i = 0; i < (int)(GraphTraceLen / clock); i++)
- {
- hithigh = 0;
- hitlow = 0;
- first = 1;
-
- /* Find out if we hit both high and low peaks */
- for (j = 0; j < clock; j++)
- {
- if (GraphBuffer[(i * clock) + j] == high)
- hithigh = 1;
- else if (GraphBuffer[(i * clock) + j] == low)
- hitlow = 1;
-
- /* it doesn't count if it's the first part of our read
- because it's really just trailing from the last sequence */
- if (first && (hithigh || hitlow))
- hithigh = hitlow = 0;
- else
- first = 0;
-
- if (hithigh && hitlow)
- break;
- }
-
- /* If we didn't hit both high and low peaks, we had a bit transition */
- if (!hithigh || !hitlow)
- bit ^= 1;
-
- BitStream[bit2idx++] = bit;
+ uint32_t hi=0;
+ uint64_t lo=0;
+
+ if(!AskEm410xDemod("", &hi, &lo)) return 0;
+ PrintAndLog("EM410x pattern found: ");
+ printEM410x(hi, lo);
+ if (hi){
+ PrintAndLog ("EM410x XL pattern found");
+ return 0;
}
+ char id[12] = {0x00};
+ sprintf(id, "%010llx",lo);
+
+ global_em410xId = id;
+ return 1;
+}
-retest:
- /* We go till 5 before the graph ends because we'll get that far below */
- for (i = 1; i < bit2idx - 5; i++)
- {
- /* Step 2: We have our header but need our tag ID */
- if (header == 9 && rows < 10)
- {
- /* Confirm parity is correct */
- if ((BitStream[i] ^ BitStream[i+1] ^ BitStream[i+2] ^ BitStream[i+3]) == BitStream[i+4])
- {
- /* Read another byte! */
- sprintf(id+rows, "%x", (8 * BitStream[i]) + (4 * BitStream[i+1]) + (2 * BitStream[i+2]) + (1 * BitStream[i+3]));
- sprintf(id2+rows, "%x", (8 * BitStream[i+3]) + (4 * BitStream[i+2]) + (2 * BitStream[i+1]) + (1 * BitStream[i]));
- rows++;
-
- /* Keep parity info */
- parity[0] ^= BitStream[i];
- parity[1] ^= BitStream[i+1];
- parity[2] ^= BitStream[i+2];
- parity[3] ^= BitStream[i+3];
-
- /* Move 4 bits ahead */
- i += 4;
- }
-
- /* Damn, something wrong! reset */
- else
- {
- PrintAndLog("Thought we had a valid tag but failed at word %d (i=%d)", rows + 1, i);
-
- /* Start back rows * 5 + 9 header bits, -1 to not start at same place */
- i -= 9 + (5 * rows) - 5;
-
- rows = header = 0;
- }
- }
-
- /* Step 3: Got our 40 bits! confirm column parity */
- else if (rows == 10)
- {
- /* We need to make sure our 4 bits of parity are correct and we have a stop bit */
- if (BitStream[i] == parity[0] && BitStream[i+1] == parity[1] &&
- BitStream[i+2] == parity[2] && BitStream[i+3] == parity[3] &&
- BitStream[i+4] == 0)
- {
- /* Sweet! */
- PrintAndLog("EM410x Tag ID: %s", id);
- PrintAndLog("Unique Tag ID: %s", id2);
-
- global_em410xId = id;
-
- /* Stop any loops */
- return 1;
- }
-
- /* Crap! Incorrect parity or no stop bit, start all over */
- else
- {
- rows = header = 0;
-
- /* Go back 59 bits (9 header bits + 10 rows at 4+1 parity) */
- i -= 59;
- }
- }
-
- /* Step 1: get our header */
- else if (header < 9)
- {
- /* Need 9 consecutive 1's */
- if (BitStream[i] == 1)
- header++;
+// emulate an EM410X tag
+int CmdEM410xSim(const char *Cmd)
+{
+ int i, n, j, binary[4], parity[4];
- /* We don't have a header, not enough consecutive 1 bits */
- else
- header = 0;
- }
- }
+ char cmdp = param_getchar(Cmd, 0);
+ uint8_t uid[5] = {0x00};
- /* if we've already retested after flipping bits, return */
- if (retested++){
- return 0;
+ if (cmdp == 'h' || cmdp == 'H') {
+ PrintAndLog("Usage: lf em4x em410xsim <UID>");
+ PrintAndLog("");
+ PrintAndLog(" sample: lf em4x em410xsim 0F0368568B");
+ return 0;
}
- /* if this didn't work, try flipping bits */
- for (i = 0; i < bit2idx; i++)
- BitStream[i] ^= 1;
-
- goto retest;
-}
-
-/* emulate an EM410X tag
- * Format:
- * 1111 1111 1 <-- standard non-repeatable header
- * XXXX [row parity bit] <-- 10 rows of 5 bits for our 40 bit tag ID
- * ....
- * CCCC <-- each bit here is parity for the 10 bits above in corresponding column
- * 0 <-- stop bit, end of tag
- */
-int CmdEM410xSim(const char *Cmd)
-{
- int i, n, j, h, binary[4], parity[4];
+ if (param_gethex(Cmd, 0, uid, 10)) {
+ PrintAndLog("UID must include 10 HEX symbols");
+ return 0;
+ }
+
+ PrintAndLog("Starting simulating UID %02X%02X%02X%02X%02X", uid[0],uid[1],uid[2],uid[3],uid[4]);
+ PrintAndLog("Press pm3-button to about simulation");
/* clock is 64 in EM410x tags */
int clock = 64;
/* clear our graph */
ClearGraph(0);
- /* write it out a few times */
- for (h = 0; h < 4; h++)
- {
/* write 9 start bits */
for (i = 0; i < 9; i++)
AppendGraph(0, clock, 1);
AppendGraph(0, clock, parity[3]);
/* stop bit */
- AppendGraph(0, clock, 0);
- }
-
- /* modulate that biatch */
- CmdManchesterMod("");
-
- /* booyah! */
- RepaintGraphWindow();
-
- CmdLFSim("");
+ AppendGraph(1, clock, 0);
+
+ CmdLFSim("0"); //240 start_gap.
return 0;
}
-/* Function is equivalent of loread + losamples + em410xread
- * looped until an EM410x tag is detected */
+/* Function is equivalent of lf read + data samples + em410xread
+ * looped until an EM410x tag is detected
+ *
+ * Why is CmdSamples("16000")?
+ * TBD: Auto-grow sample size based on detected sample rate. IE: If the
+ * rate gets lower, then grow the number of samples
+ * Changed by martin, 4000 x 4 = 16000,
+ * see http://www.proxmark.org/forum/viewtopic.php?pid=7235#p7235
+
+*/
int CmdEM410xWatch(const char *Cmd)
{
- int read_h = (*Cmd == 'h');
- //char k;
- do
- {
- CmdLFRead(read_h ? "h" : "");
- // 2000 samples is OK for clock=64, but not clock=32. Probably want
- // 8000 for clock=16. Don't want to go too high since old HID driver
- // is very slow
- // TBD: Auto-grow sample size based on detected sample rate. IE: If the
- // rate gets lower, then grow the number of samples
-
- // Changed by martin, 4000 x 4 = 16000,
- // see http://www.proxmark.org/forum/viewtopic.php?pid=7235#p7235
- CmdSamples("16000");
- } while (
- !CmdEM410xRead("")
- );
- return 0;
+ do {
+ if (ukbhit()) {
+ printf("\naborted via keyboard!\n");
+ break;
+ }
+
+ CmdLFRead("s");
+ getSamples("8192",true); //capture enough to get 2 full messages
+ } while (!CmdEM410xRead(""));
+
+ return 0;
}
int CmdEM410xWatchnSpoof(const char *Cmd)
{
- int read_h = (*Cmd == 'h');
- do
- {
- CmdLFRead(read_h ? "h" : "");
- CmdSamples("16000");
- } while ( ! CmdEM410xRead(""));
- PrintAndLog("# Replaying : %s",global_em410xId);
- CmdEM410xSim(global_em410xId);
- return 0;
+ CmdEM410xWatch(Cmd);
+ PrintAndLog("# Replaying captured ID: %s",global_em410xId);
+ CmdLFaskSim("");
+ return 0;
}
/* Read the transmitted data of an EM4x50 tag
++i;
while ((GraphBuffer[i] > low) && (i<GraphTraceLen))
++i;
- if (j>(MAX_GRAPH_TRACE_LEN/64)) {
+ if (j>=(MAX_GRAPH_TRACE_LEN/64)) {
break;
}
tmpbuff[j++]= i - start;
int CmdReadWord(const char *Cmd)
{
int Word = -1; //default to invalid word
- UsbCommand c;
+ UsbCommand c;
- sscanf(Cmd, "%d", &Word);
+ sscanf(Cmd, "%d", &Word);
if ( (Word > 15) | (Word < 0) ) {
- PrintAndLog("Word must be between 0 and 15");
- return 1;
- }
+ PrintAndLog("Word must be between 0 and 15");
+ return 1;
+ }
- PrintAndLog("Reading word %d", Word);
+ PrintAndLog("Reading word %d", Word);
- c.cmd = CMD_EM4X_READ_WORD;
- c.d.asBytes[0] = 0x0; //Normal mode
- c.arg[0] = 0;
- c.arg[1] = Word;
- c.arg[2] = 0;
- SendCommand(&c);
- WaitForResponse(CMD_ACK, NULL);
-
- uint8_t data[LF_TRACE_BUFF_SIZE];
- memset(data, 0x00, LF_TRACE_BUFF_SIZE);
-
- GetFromBigBuf(data,LF_TRACE_BUFF_SIZE,3560); //3560 -- should be offset..
- WaitForResponseTimeout(CMD_ACK,NULL, 1500);
-
- for (int j = 0; j < LF_TRACE_BUFF_SIZE; j++) {
- GraphBuffer[j] = ((int)data[j]) - 128;
- }
- GraphTraceLen = LF_TRACE_BUFF_SIZE;
-
- // BiDirectional
- //CmdDirectionalThreshold("70 -60");
-
- // Askdemod
- //Cmdaskdemod("1");
-
- uint8_t bits[1000];
- uint8_t * bitstream = bits;
- memset(bitstream, 0x00, sizeof(bits));
-
- manchester_decode(GraphBuffer, LF_TRACE_BUFF_SIZE, bitstream);
-
+ c.cmd = CMD_EM4X_READ_WORD;
+ c.d.asBytes[0] = 0x0; //Normal mode
+ c.arg[0] = 0;
+ c.arg[1] = Word;
+ c.arg[2] = 0;
+ SendCommand(&c);
return 0;
}
int CmdReadWordPWD(const char *Cmd)
{
int Word = -1; //default to invalid word
- int Password = 0xFFFFFFFF; //default to blank password
- UsbCommand c;
-
- sscanf(Cmd, "%d %x", &Word, &Password);
-
+ int Password = 0xFFFFFFFF; //default to blank password
+ UsbCommand c;
+
+ sscanf(Cmd, "%d %x", &Word, &Password);
+
if ( (Word > 15) | (Word < 0) ) {
- PrintAndLog("Word must be between 0 and 15");
- return 1;
- }
+ PrintAndLog("Word must be between 0 and 15");
+ return 1;
+ }
- PrintAndLog("Reading word %d with password %08X", Word, Password);
-
- c.cmd = CMD_EM4X_READ_WORD;
- c.d.asBytes[0] = 0x1; //Password mode
- c.arg[0] = 0;
- c.arg[1] = Word;
- c.arg[2] = Password;
- SendCommand(&c);
- WaitForResponse(CMD_ACK, NULL);
-
- uint8_t data[LF_TRACE_BUFF_SIZE];
- memset(data, 0x00, LF_TRACE_BUFF_SIZE);
-
- GetFromBigBuf(data,LF_TRACE_BUFF_SIZE,3560); //3560 -- should be offset..
- WaitForResponseTimeout(CMD_ACK,NULL, 1500);
-
- for (int j = 0; j < LF_TRACE_BUFF_SIZE; j++) {
- GraphBuffer[j] = ((int)data[j]) - 128;
- }
- GraphTraceLen = LF_TRACE_BUFF_SIZE;
-
- // BiDirectional
- //CmdDirectionalThreshold("70 -60");
-
- // Askdemod
- //Cmdaskdemod("1");
-
- uint8_t bits[1000];
- uint8_t * bitstream = bits;
- memset(bitstream, 0x00, sizeof(bits));
-
- manchester_decode(GraphBuffer, LF_TRACE_BUFF_SIZE, bitstream);
+ PrintAndLog("Reading word %d with password %08X", Word, Password);
+
+ c.cmd = CMD_EM4X_READ_WORD;
+ c.d.asBytes[0] = 0x1; //Password mode
+ c.arg[0] = 0;
+ c.arg[1] = Word;
+ c.arg[2] = Password;
+ SendCommand(&c);
return 0;
}
return 1;
}
- PrintAndLog("Writting word %d with data %08X", Word, Data);
+ PrintAndLog("Writing word %d with data %08X", Word, Data);
c.cmd = CMD_EM4X_WRITE_WORD;
c.d.asBytes[0] = 0x0; //Normal mode
int CmdWriteWordPWD(const char *Cmd)
{
- int Word = 8; //default to invalid word
+ int Word = 16; //default to invalid word
int Data = 0xFFFFFFFF; //default to blank data
int Password = 0xFFFFFFFF; //default to blank password
UsbCommand c;
return 1;
}
- PrintAndLog("Writting word %d with data %08X and password %08X", Word, Data, Password);
+ PrintAndLog("Writing word %d with data %08X and password %08X", Word, Data, Password);
c.cmd = CMD_EM4X_WRITE_WORD;
c.d.asBytes[0] = 0x1; //Password mode
static command_t CommandTable[] =
{
{"help", CmdHelp, 1, "This help"},
- {"410read", CmdEM410xRead, 1, "[clock rate] -- Extract ID from EM410x tag"},
- {"410sim", CmdEM410xSim, 0, "<UID> -- Simulate EM410x tag"},
- {"410watch", CmdEM410xWatch, 0, "['h'] -- Watches for EM410x 125/134 kHz tags (option 'h' for 134)"},
- {"410spoof", CmdEM410xWatchnSpoof, 0, "['h'] --- Watches for EM410x 125/134 kHz tags, and replays them. (option 'h' for 134)" },
- {"410write", CmdEM410xWrite, 1, "<UID> <'0' T5555> <'1' T55x7> [clock rate] -- Write EM410x UID to T5555(Q5) or T55x7 tag, optionally setting clock rate"},
- {"4xread", CmdEM4x50Read, 1, "Extract data from EM4x50 tag"},
- {"rd", CmdReadWord, 1, "<Word 1-15> -- Read EM4xxx word data"},
- {"rdpwd", CmdReadWordPWD, 1, "<Word 1-15> <Password> -- Read EM4xxx word data in password mode "},
- {"wr", CmdWriteWord, 1, "<Data> <Word 1-15> -- Write EM4xxx word data"},
- {"wrpwd", CmdWriteWordPWD, 1, "<Data> <Word 1-15> <Password> -- Write EM4xxx word data in password mode"},
+ {"em410xdemod", CmdEMdemodASK, 0, "[findone] -- Extract ID from EM410x tag (option 0 for continuous loop, 1 for only 1 tag)"},
+ {"em410xread", CmdEM410xRead, 1, "[clock rate] -- Extract ID from EM410x tag"},
+ {"em410xsim", CmdEM410xSim, 0, "<UID> -- Simulate EM410x tag"},
+ {"em410xwatch", CmdEM410xWatch, 0, "['h'] -- Watches for EM410x 125/134 kHz tags (option 'h' for 134)"},
+ {"em410xspoof", CmdEM410xWatchnSpoof, 0, "['h'] --- Watches for EM410x 125/134 kHz tags, and replays them. (option 'h' for 134)" },
+ {"em410xwrite", CmdEM410xWrite, 1, "<UID> <'0' T5555> <'1' T55x7> [clock rate] -- Write EM410x UID to T5555(Q5) or T55x7 tag, optionally setting clock rate"},
+ {"em4x50read", CmdEM4x50Read, 1, "Extract data from EM4x50 tag"},
+ {"readword", CmdReadWord, 1, "<Word> -- Read EM4xxx word data"},
+ {"readwordPWD", CmdReadWordPWD, 1, "<Word> <Password> -- Read EM4xxx word data in password mode"},
+ {"writeword", CmdWriteWord, 1, "<Data> <Word> -- Write EM4xxx word data"},
+ {"writewordPWD", CmdWriteWordPWD, 1, "<Data> <Word> <Password> -- Write EM4xxx word data in password mode"},
{NULL, NULL, 0, NULL}
};