X-Git-Url: http://cvs.zerfleddert.de/cgi-bin/gitweb.cgi/proxmark3-svn/blobdiff_plain/fed1227777c5e15d6c34a4cb127b4f38ecbecfa4..74dde713b14123ed67d563f59f9329f3dbd91384:/client/scripts/mifare_autopwn.lua diff --git a/client/scripts/mifare_autopwn.lua b/client/scripts/mifare_autopwn.lua index 12fd270a..eb93669c 100644 --- a/client/scripts/mifare_autopwn.lua +++ b/client/scripts/mifare_autopwn.lua @@ -4,8 +4,6 @@ local cmds = require('commands') example = "script run mifare_autopwn" author = "Martin Holst Swende" - - desc = [[ This is a which automates cracking and dumping mifare classic cards. It sets itself into @@ -28,6 +26,8 @@ Output files from this operation: -- Some utilities ------------------------------- local DEBUG = false +local MIFARE_AUTH_KEYA = 0x60 +local MIFARE_AUTH_KEYB = 0x61 --- -- A debug printout-function function dbg(args) @@ -66,7 +66,7 @@ end function mfcrack() core.clearCommandBuffer() -- Build the mifare-command - local cmd = Command:new{cmd = cmds.CMD_READER_MIFARE, arg1 = 1, arg2 = 0} + local cmd = Command:new{cmd = cmds.CMD_READER_MIFARE, arg1 = 1, arg2 = 0, arg3 = MIFARE_AUTH_KEYA} local retry = true while retry do @@ -78,7 +78,7 @@ function mfcrack() if errormessage then return nil, errormessage end -- Try again..set arg1 to 0 this time. - cmd = Command:new{cmd = cmds.CMD_READER_MIFARE, arg1 = 0, arg2 = 0} + cmd = Command:new{cmd = cmds.CMD_READER_MIFARE, arg1 = 0, arg2 = 0, arg3 = MIFARE_AUTH_KEYA} end return nil, "Aborted by user" end @@ -219,7 +219,7 @@ function main(args) -- two bytes, then six bytes actual key data -- We can discard first and second return values _,_,key = bin.unpack("H2H6",res) - print("Key ", key) + print("Found valid key: "..key); -- Use nested attack nested(key,sak)