Research, development and trades concerning the powerful Proxmark3 device.
Remember; sharing is caring. Bring something back to the community.
"Learn the tools of the trade the hard way." +Fravia
You are not logged in.
Time changes and with it the technology
Proxmark3 @ discord
Users of this forum, please be aware that information stored on this site is not private.
Pages: 1
Below is my code for the leading 0 write command.
Since there are many forks, this will need to be turned to suite the fork, but should be enough for someone to run with.
feel free to use and change as needed.
What I did was added a z 'leading Zero' option in the client software. I supplied the opton via the arg flags passed in with the normal write call.
My thought was to use 2 bits in the arg byte, were 00 - normal/default. 01 was leading 0, 10 and 11 reserved for the other two modes.
all this can live in the lfops.c file.
I updated the T55xxWriteBlock function to call the correct writeblockExt.
void T55xxWriteBlock(uint32_t Data, uint32_t Block, uint32_t Pwd, uint8_t arg) {
if ((arg & 0xC0) == 0x00) T55xxWriteBlockExt (Data, Block, Pwd, arg); // Standard
if ((arg & 0xC0) == 0x80) T55xxWriteBlockExt_lz (Data, Block, Pwd, arg); // Leading 0
// T55xxWriteBlockExt(Data, Block, Pwd, arg);
cmd_send(CMD_ACK,0,0,0,0,0);
}
then the following addition for leading zero. This is a cut and paste from the base code, then tuned and adjusted for leading 0 with the timings (based on the data sheet) that I found to work for me.
#define lzSTART_GAP 31*8
#define lzWRITE_GAP 20*8
#define lzWRITE_0 18*8
#define lzWRITE_1 40*8
#define lzREAD_GAP 15*8
void T55xxWriteBitlz(int bit) {
if (!bit)
TurnReadLFOn(lzWRITE_0);
else
TurnReadLFOn(lzWRITE_1);
FpgaWriteConfWord(FPGA_MAJOR_MODE_OFF);
WaitUS(WRITE_GAP);
}
void T55xxWriteBlockExt_lz (uint32_t Data, uint32_t Block, uint32_t Pwd, uint8_t arg) {
LED_A_ON();
bool PwdMode = arg & 0x1;
uint8_t Page = (arg & 0x2)>>1;
bool testMode = arg & 0x4;
uint32_t i = 0;
// Set up FPGA, 125kHz
LFSetupFPGAForADC(95, true);
StartTicks();
// make sure tag is fully powered up...
WaitMS(5);
// Trigger T55x7 in mode.
FpgaWriteConfWord(FPGA_MAJOR_MODE_OFF);
WaitUS(START_GAP);
/* MWalker change 15 May 2019
0 : Leading Zero
11 : Opcode
00 : Fixed 00 if protected write (i.e. have password)
<32 bit Password>
0 : Lock Bit
<32 bit data>
<3 bit addr>
*/
// Leading 0
/*
Standard Write : 0 1p L <32 data bits> <3 bit addr>
0 10 0 00000000000000000000000000000000 001
Protected Write: 0 1p 00 <32 pwd bits> L <32 data bits> <3 bit addr>
0 10 00 00000000000000000000000000000000 0 00000000000000000000000000000000 001
Wake Up 0 10 00 <32 pwd bits>
Protected Read 0 1p 00 <32 pwd bits> 0 <3 bit addr>
Standard Read 0 1p 0 <3 bit addr>
Page 0/1 read 0 1p
Reset 0 00
*/
Dbprintf("Leading Zero MODE");
T55xxWriteBitlz(0); //T55xxWriteBit(0);
if (testMode) Dbprintf("TestMODE");
// Std Opcode 10
T55xxWriteBitlz(testMode ? 0 : 1);
T55xxWriteBitlz(testMode ? 1 : Page); //Page 0
if (PwdMode) {
// Leading zero - insert two fixed 00 between opcode and password
T55xxWriteBitlz (0);
T55xxWriteBitlz (0);
// Send Pwd
for (i = 0x80000000; i != 0; i >>= 1)
T55xxWriteBitlz(Pwd & i);
}
// Send Lock bit
T55xxWriteBitlz(0);
// Send Data
for (i = 0x80000000; i != 0; i >>= 1)
T55xxWriteBitlz(Data & i);
// Send Block number
for (i = 0x04; i != 0; i >>= 1)
T55xxWriteBitlz(Block & i);
// Perform write (nominal is 5.6 ms for T55x7 and 18ms for E5550,
// so wait a little more)
// "there is a clock delay before programming"
// - programming takes ~5.6ms for t5577 ~18ms for E5550 or t5567
// so we should wait 1 clock + 5.6ms then read response?
// but we need to know we are dealing with t5577 vs t5567 vs e5550 (or q5) marshmellow...
if (testMode) {
//TESTMODE TIMING TESTS:
// <566us does nothing
// 566-568 switches between wiping to 0s and doing nothing
// 5184 wipes and allows 1 block to be programmed.
// indefinite power on wipes and then programs all blocks with bitshifted data sent.
TurnReadLFOn(5184);
} else {
TurnReadLFOn(20 * 1000);
//could attempt to do a read to confirm write took
// as the tag should repeat back the new block
// until it is reset, but to confirm it we would
// need to know the current block 0 config mode for
// modulation clock an other details to demod the response...
// response should be (for t55x7) a 0 bit then (ST if on)
// block data written in on repeat until reset.
//DoPartialAcquisition(20, true, 12000);
}
// turn field off
FpgaWriteConfWord(FPGA_MAJOR_MODE_OFF);
LED_A_OFF();
}
Offline
Thanks!. I assume your fork is not based on the pm3 master repo so you couldn't issue a pull request?
Offline
I am really not up-to-speed with the whole git thing, learning as I go. It was based on the official PM3 git.
But, as I think I have heard you comment a few times, the code has morphed a few times with different coders. So until I get up to speed I thought it would be simpler for someone who knows to add it in to keep things inline.
(e.g. I am a curly bracket on the next line coder, so had to fight the urge on that one)
When I had a look to add the same thing for the read, I noticed there was no "arg" to set some flags, then I thought.. should I try to change that... So thought I would not touch atm.
To add to that, on my rdv4 i am using the rrg (as I want the bluetooth when i get the module) and thats different again.
So until i am up to speed, I thought I would pass on.
Offline
Slowly working out the github side.
With this project is there a place to discuss an idea first, or do we make changes and submit the pull request and then the changes get discussed ?
e.g.
In the above code, the write block function passed in the arg, so we could use that to set some flags as i did.
void T55xxWriteBlock(uint32_t Data, uint32_t Block, uint32_t Pwd, uint8_t arg)
but the readblock did not seem to have that, which might be a good idea ?
Not knowing the code as well as others, I dont want to head down the wrong path.
I am happy to learn and work though this and try to do things the way to project would like it.
i.e. My idea for the t55xx was to see if i could get it to support the 4 downlink modes for all reads/writes.
So for the write, the call break out is already there, but to get a readblock (say for leading 0), would then allow you to read data without changing the card data, so I think it will be a good idea.
So, back to the real question.
I am happy to put in the time to learn and make the changes and test, so not asking others to do this for me (no issue if they do).
I have setup a real fork in github to allow the code to flow in that frame work, almost got that bit sorted (and my head around it).
The question now is more about how we decide if a code change is a good or bad idea such that I can head in the direction of success.
thanks
Offline
Well, first adding an arg for you're new options would be the right way to go. ( granted I'm far from as good a coder as pwpiwi or several others here so I'll yield to them if they have other ideas)
Second all code changes are reviewed (and changes may be requested) on the master repo before they get merged. (You issue a pull request to the master repo to include your changes)
That pull request gets reviewed and commented on before being accepted.
Now I will give you a hint that got me in trouble at times with github.
Keep your master branch = to the master repos master branch and do all you're large code testing/ building in a separate branch(s). This makes it easier to continue working on other projects while you're pull request is being reviewed. (Any changes to the branch you're pull request was made on will be included in the pull request automatically.)
Last edited by marshmellow (2019-06-14 02:34:21)
Offline
marshmellow is the Subject Matter Expert when it comes to lf commands, so I will rely on him when it comes to a code review
Offline
Progress
I have now got the standard read and write working for leading 0 (still testing) in a clean git download.
I have added this option for the lf t55 read and write (with the place holder for the other 2 modes).
e <mode> - OPTIONAL downlink encoding '0' fixed-bit-length (default), '1' Leading Zero, '2' 1 of 4, '3' Long Zero Reference
I selected option 'e' (for encoding), Happy to review.
Below is my initial testing.
For this example, I have the t55 in leading zero 0 downlink mode.
Actual Data for Block 0 and 1
blk | hex data | binary
----+----------+---------------------------------
0 | 00148050 | 00000000000101001000000001010000
1 | FF836002 | 11111111100000110110000000000010
Attempt to password read (in default mode) - Data will not be correct as the downlink mode is wrong but it will respond with the "EM4105 tag id (or part of) as expected.
proxmark3> lf t55 read b 0 p 51243648 o
Reading Page 0:
blk | hex data | binary
----+----------+---------------------------------
0 | 7FC1B001 | 01111111110000011011000000000001
proxmark3> lf t55 read b 1 p 51243648 o
Reading Page 0:
blk | hex data | binary
----+----------+---------------------------------
1 | 7FC1B001 | 01111111110000011011000000000001
Next Read with the leading 0 mode (e 1)
proxmark3> lf t55 read b 0 e 1 p 51243648 o
Reading Page 0:
blk | hex data | binary
----+----------+---------------------------------
0 | 00148050 | 00000000000101001000000001010000
proxmark3> lf t55 read b 1 e 1 p 51243648 o
Reading Page 0:
blk | hex data | binary
----+----------+---------------------------------
1 | FF836002 | 11111111100000110110000000000010
As can be seen the correct data is returned.
Remove the Leading 0/Clear Config Block 3 page 1 (via the leading 0 command)
proxmark3> lf t55 write b 3 1 p 51243648 d 00000000 e 1
Writing page 1 block: 03 data: 0x00000000 pwd: 0x51243648
Now we should be able to read again, without leading 0.
proxmark3> lf t55 read b 0 p 51243648 o
Reading Page 0:
blk | hex data | binary
----+----------+---------------------------------
0 | 00148050 | 00000000000101001000000001010000
proxmark3> lf t55 read b 1 p 51243648 o
Reading Page 0:
blk | hex data | binary
----+----------+---------------------------------
Safety Check Overriden - proceeding despite risk
1 | FF836002 | 11111111100000110110000000000010
And now the data looks correct without leading 0 options.
For the coders (and comment)
The read was not as smooth as the write.
I needed to extend the AquireData function, to allow the downlink_mode option to be passed in. So for all calls (that has not been extended to downlink_mode/leading 0), I set the last option to 0 (default), which should mean no change to any of those features.
int AquireData( uint8_t page, uint8_t block, bool pwdmode, uint32_t password,uint8_t downlink_mode );
So now, in theory, I should be able to extend to the other calls like the password checking and dump.
In my review, the arg/arg0 is as follows (this seems to be ok, but confirmation would be good)
00000001 - Password Used
00000010 - Page
00000100 - Write Test Mode
000xx000 - the new downlink options (00 Default, 01 Leading 0, 10 1 or 4 and 11 long zero reference)
Thoughts/Comments/Feedback
Thanks
Offline
lf t55 detect seems to work (and a hard coded lf t55 brute also looks good)
e.g.
Default cant find anything, but password protected.
proxmark3> lf t55 detect
Could not detect modulation automatically. Try setting it manually with 'lf t55xx config'
Supply the password, still nothing (as expected)
proxmark3> lf t55 detect p 51243648
Could not detect modulation automatically. Try setting it manually with 'lf t55xx config'
Now supply password and (e 1) leading 0
proxmark3> lf t55 detect p 51243648 e 1
Chip Type : T55x7
Modulation : ASK
Bit Rate : 5 - RF/64
Inverted : No
Offset : 32
Seq. Term. : No
Block0 : 0x00148050
Offline
Looking at the bruteforce function needed some changes. So rather then change that I cloned that function to support more arguments.
Note the new function name "bruteforcedl" for DownLink support. Again happy to take feedback and comments.
In normal mode no password found as the card is in leading 0 mode.
proxmark3> lf t55 bruteforcedl i d:\pm3\t55_pwd.txt
chk custom pwd[ 0] 51243648
chk custom pwd[ 1] 000D8787
chk custom pwd[ 2] 88661858
.....
chk custom pwd[76] FABADA11
chk custom pwd[77] 65857569
Loaded 78 keys
Testing 51243648
Testing 000D8787
Testing 88661858
.....
Testing FABADA11
Testing 65857569
Password NOT found.
In leading 0 (with card in leading 0 mode), finds password.
proxmark3> lf t55 bruteforcedl e 1 i d:\pm3\t55_pwd.txt
chk custom pwd[ 0] 51243648
chk custom pwd[ 1] 000D8787
chk custom pwd[ 2] 88661858
.....
chk custom pwd[76] FABADA11
chk custom pwd[77] 65857569
Loaded 78 keys
Testing 51243648
Chip Type : T55x7
Modulation : ASK
Bit Rate : 5 - RF/64
Inverted : No
Offset : 32
Seq. Term. : No
Block0 : 0x00148050
Found valid password: [51243648]
Offline
Quick update.
I have got the 1 of 4 downlink protocol roughed in.
Also updated the encoding option (e) index to better match the t5577 tech sheet (so my examples above wont match final result).
i.e. in the options arg/arg0
00000001 - Password Used
00000010 - Page
00000100 - Write Test Mode
000xx000 - the new downlink options : 0 {00} Fixed/Default, 1 {01} long leading reference, 2 {10} leading 0 and 3 {11} 1 of 4.
Last edited by mwalker (2019-06-17 05:41:12)
Offline
I have updated my fork files.
https://github.com/mwalker33/proxmark3
The main additions
Changes :
- Added t55xx downlink protocols (long leading reference, leading 0 and 1 of 4)
- Added function to allow read to call different downlink functions (to match write)
- Update functions to support using different downlink modes.
- Added support for calling downlink modes for lf t55 read, write and detect
- Added new function lf t55 bruteforcedl to support downlink modes as well as try each mode
for each password in password file.
for functions with downlink mode extension.
e <mode> - OPTIONAL downlink encoding '0' fixed-bit-length (default),
'1' Long Zero Reference,
'2' Leading Zero,
'3' 1 of 4
Could I get some one to d/l and test to ensure
a) I have updated correctly
b) I have not broken anything and the new features work.
e.g. Below is an example run that would use the new features.
See what sort of card is on the proxmark.
proxmark3> lf search
NOTE: some demods output possible binary
if it finds something that looks like a tag
False Positives ARE possible
Checking for known tags:
EM410x pattern found:
EM TAG ID : 0D00433C43
Possible de-scramble patterns
Unique TAG ID : B000C23CC2
HoneyWell IdentKey {
DEZ 8 : 04406339
DEZ 10 : 0004406339
DEZ 5.5 : 00067.15427
DEZ 3.5A : 013.15427
DEZ 3.5B : 000.15427
DEZ 3.5C : 067.15427
DEZ 14/IK2 : 00055838981187
DEZ 15/IK3 : 000755926973634
DEZ 20/ZK : 11000000120203121202
}
Other : 15427_067_04406339
Pattern Paxton : 223836739 [0xD577A43]
Pattern 1 : 9065316 [0x8A5364]
Pattern Sebury : 15427 67 4406339 [0x3C43 0x43 0x433C43]
Valid EM410x ID Found!
Now see if its a known t55xx
proxmark3> lf t55 detect
Could not detect modulation automatically. Try setting it manually with 'lf t55xx config'
Nothing found, could be we need a password to read it.
so Lets use e 4 to try all downlink modes with the password file.
proxmark3> lf t55 bruteforcedl e 4 i d:\pm3\t55_pwd.txt
New Downlink Supprt
DL Mode : 0
chk custom pwd[ 0] 51243648
chk custom pwd[ 1] 000D8787
chk custom pwd[ 2] 88661858
chk custom pwd[ 3] 44B44CAE
.....
chk custom pwd[75] 0CB7E7FC
chk custom pwd[76] FABADA11
chk custom pwd[77] 65857569
Loaded 78 keys
Testing 51243648
Chip Type : T55x7
Modulation : ASK
Bit Rate : 5 - RF/64
Inverted : No
Offset : 32
Seq. Term. : No
Block0 : 0x00148050
Found valid password: [51243648]
Downlink : e 2 - Leading Zero Reference
It found the password in leading zero downlink mode, (and also told us to use e 2 - where supported).
Now try again to see if we can detect it.
proxmark3> lf t55 detect e 2
Could not detect modulation automatically. Try setting it manually with 'lf t55xx config'
Did not work as no password supplied, but since we know that, lets try with that
proxmark3> lf t55 detect e 2 p 51243648
Chip Type : T55x7
Modulation : ASK
Bit Rate : 5 - RF/64
Inverted : No
Offset : 32
Seq. Term. : No
Block0 : 0x00148050
Downlink : e 2 - Leading Zero Reference
Found it with the detected password and again told us what downlink mode was used.
Offline
Great work!
Offline
Looking forward to see your first Pull Request. One question upfront: why do you need a new 'bruteforcedl' command? Wouldn't it be sufficient to add the 'e' option (and the automatic trials) to the existing one?
Offline
thanks Piwi.
Almost ready, just in cleanup mode.
I had a few back and forth moments with things e.g. bruteforcedl, hence some public discussion prior to submit.
What I tried to do (as a high priority) was not break any existing commands. So if someone had scripts then they should work 100% as is and only need to change if wanting the new feature.
As such, where an existing command had the nice option extraction, then I could slip in the new option.
But in the case of the bruteforce (and some others), the options don't always use an option id and option value.
The existing code looked at the first byte in the argument
e.g. the Hex of start_pwd, if 'h' show help and exit. if 'i' take to end of line as the filename else assume its the start_pwd.
so if the start range was exxxxxxx, then an issue.
As such, at this point I had three options.
change my 'e' to not be a hex value : OK should have done that:)
rewrite the call and break something - I don't like breaking things, so not an option
have a new function - easy option.
So, I took the easy way (long weekend).
Now still open to suggestions.
On one hand it would be nice if everything was <command> <opt id> <opt values> <opt id> <opt values>
So if that is the direction we can migrate over time by adding the new, then phasing out the old (giving people a chance to update scripts etc). this is a project direction statement and may not be an option, so not for me to say, but I can help.
I was also trying to select an option letter that kind of meant something. d for downlink was good, but taken.
Ok, thought explained... Time for action.
What I will do, is change my 'e' (hex value) to 'r' (for reference i.e. fix length reference, long leading reference, etc)
Then I will update the existing brute force to work as is, plus new feature and remove the new function.
I have a few other ideas, but wanted to get phase 1 completed first.
Any other feed back ?
Offline
Updated the downlink encoding reference option id from 'e' to 'r' so not to be a valid hex character.
Update the original lf t55 bruteforce to run with or without the reference 'r' otpion (and removed the new function)
example
brute force all passwords from feedbee0 to feedbeff and try ALL 4 downlink encoding options
proxmark3> lf t55 brute r 4 feedbee0 feedbeff
Search password range [FEEDBEE0 -> FEEDBEFF]
................Chip Type : T55x7
Modulation : ASK
Bit Rate : 5 - RF/64
Inverted : No
Offset : 33
Seq. Term. : No
Block0 : 0x00148050
Found valid password: [feedbeef]
Downlink : r 3 - 1 of 4 coding reference
Any other comments/thoughts ?
Offline
I'm not opposed to redoing the arguments to the newer standard with letter then data. If there are scripts in the master repo we could update them, if not I wouldn't worry about it.
Offline
@piwi
Being new to all this, whats the procedure.
I submitted the Pull request, people review (I see your comments), then I respond (and others)
Once we agree on the changes, how do we "re-submit" ?
i.e. I make the changes and test, then upload to my fork.
What do i need to do then ?
thanks
Offline
Any changes you push to your fork will be included in the pull request automatically.
Offline
Pages: 1