Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Auto load "mf_user_keys.dic" from spiffs [idea] #2405

Open
ghiki opened this issue Jun 16, 2024 · 5 comments
Open

Auto load "mf_user_keys.dic" from spiffs [idea] #2405

ghiki opened this issue Jun 16, 2024 · 5 comments
Labels
enhancement New feature or request Request

Comments

@ghiki
Copy link
Contributor

ghiki commented Jun 16, 2024

Is your feature request related to a problem? Please describe.

When you do some attack, to load the keys file (whe you know, for testing for example) is very repetitive to do "-d xxx.dic" or "mem load -f xxxx" before doing

Describe the solution you'd like

Dictionary file (or files) in spiffs that loads when starting any type of attack (obviously, this will do only when "ifdef WITH_FLASH")

Describe alternatives you've considered

Load manually before with

mem load -f mfc_default_keys -m         -> upload MFC keys
mem load -f t55xx_default_pwds -t       -> upload T55XX passwords
mem load -f iclass_default_keys -i      -> upload iCLASS keys

or passing to the attack command manually

Additional context

@ghiki ghiki added enhancement New feature or request Request labels Jun 16, 2024
@ghiki ghiki changed the title [idea] Auto load "mf_user_keys.dic" from spiffs Auto load "mf_user_keys.dic" from spiffs Jun 16, 2024
@ghiki ghiki changed the title Auto load "mf_user_keys.dic" from spiffs Auto load "mf_user_keys.dic" from spiffs [idea] Jun 16, 2024
@iceman1001
Copy link
Collaborator

you only need to upload the default dictionaries once on a RDV4 / spifffs based device. Its stored in eeprom and read from eeprom when called in a function that takes advantage of that functionality.

@ghiki
Copy link
Contributor Author

ghiki commented Jun 21, 2024

Yep, but for example, a "hf mf autopwn" or any other, doesn't use any dic file although this file exists in the spiffs (only uses the hardcoded ones), the main idea is to use if the device has flash memory and a file with user Keys exist on It (now, if you want to use It, you need to load previously with "mem/data" command)

@iceman1001
Copy link
Collaborator

In that case are you thinking about updating hf mf autopwn to take advantage of the stored dictionary.

Uploading before to spiffs shouldn't affect autopwn to use it. Like I said you only need to upload once.
Well, if the default dictionary file gets some additions you will of course re-upload it. Doesn't happen that often.

@jgoggan
Copy link

jgoggan commented Jul 12, 2024

I really like this idea and thought the same thing the first time I started working with the PM3 hardware. On the previous hardware that I used, it automatically saved any previously cracked information so that if you ran a crack again on the same card, it would immediately complete because it already had the key handy. For the PM3, it always seemed funny to me that if I ran "hf mf autopwn" and it took a while and then cracked it -- and then I immediately ran "hf mf autopwn" again, it would do the entire crack again. I would love it if every time it was successfully at cracking a key, it stored it to a local mf_user_keys.dic that was auto-loaded for any new crack attempt. I mean, once it has the key, use it next time! :)

@iceman1001
Copy link
Collaborator

running attacks means running attacks, if you store found keys which autopwn does, you don't need to re-run attacks.
You would use the already saved key file.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request Request
Projects
None yet
Development

No branches or pull requests

3 participants