Преглед изворни кода

Merge pull request #4 from SkeletonMan03/dev

Added IoProxXSF, Paradox, Indala26, Viking, Pyramid, Keri, and Jablotron to RFID Fuzzer
MMX пре 2 година
родитељ
комит
da3b4a9c8d
4 измењених фајлова са 223 додато и 3 уклоњено
  1. 8 1
      README.md
  2. 8 1
      catalog/docs/rfid/Changelog.md
  3. 8 1
      catalog/docs/rfid/README.md
  4. 199 0
      lib/worker/protocol.c

+ 8 - 1
README.md

@@ -21,6 +21,13 @@ This is a completely remade app, visual style inspired by [iButton fuzzer](https
 - HIDProx
 - PAC/Stanley
 - H10301
+- IoProxXSF
+- Paradox
+- Indala26
+- Viking
+- Pyramid
+- Keri
+- Jablotron
 
 ## Application Features
 ### Main screen
@@ -37,4 +44,4 @@ This is a completely remade app, visual style inspired by [iButton fuzzer](https
     - **Time delay (TD)** - idle time between UID submissions
     - **Emulation time (EmT)** - transmission time of one UID
 - **3rd line** - Prtocol name
-- **4th line** - Current UID
+- **4th line** - Current UID

+ 8 - 1
catalog/docs/rfid/Changelog.md

@@ -13,9 +13,16 @@
 - HIDProx
 - PAC/Stanley
 - H10301
+- IoProxXSF
+- Paradox
+- Indala26
+- Viking
+- Pyramid
+- Keri
+- Jablotron
 
 **Suported attack**
 - Default Values
 - Load key file
 - Load UIDs from file
-- BFCustomer ID
+- BFCustomer ID

+ 8 - 1
catalog/docs/rfid/README.md

@@ -12,6 +12,13 @@ The application will also help to identify the "denial of service" vulnerability
 - HIDProx
 - PAC/Stanley
 - H10301
+- IoProxXSF
+- Paradox
+- Indala26
+- Viking
+- Pyramid
+- Keri
+- Jablotron
 
 # Application Features
 ## Main screen
@@ -28,4 +35,4 @@ The application will also help to identify the "denial of service" vulnerability
     - **Time delay (TD)** - idle time between UID submissions
     - **Emulation time (EmT)** - transmission time of one UID
 - **3rd line** - Prtocol name
-- **4th line** - Current UID
+- **4th line** - Current UID

+ 199 - 0
lib/worker/protocol.c

@@ -75,6 +75,13 @@ const uint8_t uid_list_cyfral[][Cyfral_DATA_SIZE] = {
 #define HIDProx_DATA_SIZE (6)
 #define PAC_DATA_SIZE (4)
 #define H10301_DATA_SIZE (3)
+#define IOPROXXSF_DATA_SIZE (4)
+#define PARADOX_DATA_SIZE (6)
+#define INDALA26_DATA_SIZE (4)
+#define VIKING_DATA_SIZE (4)
+#define PYRAMID_DATA_SIZE (4)
+#define KERI_DATA_SIZE (4)
+#define JABLOTRON_DATA_SIZE (5)
 
 const uint8_t uid_list_em4100[][EM4100_DATA_SIZE] = {
     {0x00, 0x00, 0x00, 0x00, 0x00}, // Null bytes
@@ -150,6 +157,128 @@ const uint8_t uid_list_h10301[][H10301_DATA_SIZE] = {
     {0xCA, 0xCA, 0xCA}, // From arha
 };
 
+const uint8_t uid_list_ioproxxsf[][IOPROXXSF_DATA_SIZE] = {
+    {0x00, 0x00, 0x00, 0x00}, // Null bytes
+    {0xFF, 0xFF, 0xFF, 0xFF}, // Only FF
+    {0x11, 0x11, 0x11, 0x11}, // Only 11
+    {0x22, 0x22, 0x22, 0x22}, // Only 22
+    {0x33, 0x33, 0x33, 0x33}, // Only 33
+    {0x44, 0x44, 0x44, 0x44}, // Only 44
+    {0x55, 0x55, 0x55, 0x55}, // Only 55
+    {0x66, 0x66, 0x66, 0x66}, // Only 66
+    {0x77, 0x77, 0x77, 0x77}, // Only 77
+    {0x88, 0x88, 0x88, 0x88}, // Only 88
+    {0x99, 0x99, 0x99, 0x99}, // Only 99
+    {0x12, 0x34, 0x56, 0x78}, // Incremental UID
+    {0x9A, 0x78, 0x56, 0x34}, // Decremental UID
+    {0x04, 0xd0, 0x9b, 0x0d}, // From arha
+    {0x34, 0x00, 0x29, 0x3d}, // From arha
+    {0x04, 0xdf, 0x00, 0x00}, // From arha
+    {0xCA, 0xCA, 0xCA, 0xCA}, // From arha
+};
+
+const uint8_t uid_list_paradox[][PARADOX_DATA_SIZE] = {
+    {0x00, 0x00, 0x00, 0x00, 0x00, 0x00}, // Null bytes
+    {0xFF, 0xFF, 0xFF, 0xFF, 0xFF, 0xFF}, // Only FF
+    {0x11, 0x11, 0x11, 0x11, 0x11, 0x11}, // Only 11
+    {0x22, 0x22, 0x22, 0x22, 0x22, 0x22}, // Only 22
+    {0x33, 0x33, 0x33, 0x33, 0x33, 0x33}, // Only 33
+    {0x44, 0x44, 0x44, 0x44, 0x44, 0x44}, // Only 44
+    {0x55, 0x55, 0x55, 0x55, 0x55, 0x55}, // Only 55
+    {0x66, 0x66, 0x66, 0x66, 0x66, 0x66}, // Only 66
+    {0x77, 0x77, 0x77, 0x77, 0x77, 0x77}, // Only 77
+    {0x88, 0x88, 0x88, 0x88, 0x88, 0x88}, // Only 88
+    {0x99, 0x99, 0x99, 0x99, 0x99, 0x99}, // Only 99
+    {0x12, 0x34, 0x56, 0x78, 0x9A, 0xBC}, // Incremental UID
+    {0xFF, 0xDE, 0xBC, 0x9A, 0x78, 0x56}, // Decremental UID
+    {0xCA, 0xCA, 0xCA, 0xCA, 0xCA, 0xCA}, // From arha
+};
+
+const uint8_t uid_list_indala26[][INDALA26_DATA_SIZE] = {
+    {0x00, 0x00, 0x00, 0x00}, // Null bytes
+    {0xFF, 0xFF, 0xFF, 0xFF}, // Only FF
+    {0x11, 0x11, 0x11, 0x11}, // Only 11
+    {0x22, 0x22, 0x22, 0x22}, // Only 22
+    {0x33, 0x33, 0x33, 0x33}, // Only 33
+    {0x44, 0x44, 0x44, 0x44}, // Only 44
+    {0x55, 0x55, 0x55, 0x55}, // Only 55
+    {0x66, 0x66, 0x66, 0x66}, // Only 66
+    {0x77, 0x77, 0x77, 0x77}, // Only 77
+    {0x88, 0x88, 0x88, 0x88}, // Only 88
+    {0x99, 0x99, 0x99, 0x99}, // Only 99
+    {0x12, 0x34, 0x56, 0x78}, // Incremental UID
+    {0xFF, 0xDE, 0xBC, 0x9A}, // Decremental UID
+    {0xCA, 0xCA, 0xCA, 0xCA}, // From arha
+};
+
+const uint8_t uid_list_viking[][VIKING_DATA_SIZE] = {
+    {0x00, 0x00, 0x00, 0x00}, // Null bytes
+    {0xFF, 0xFF, 0xFF, 0xFF}, // Only FF
+    {0x11, 0x11, 0x11, 0x11}, // Only 11
+    {0x22, 0x22, 0x22, 0x22}, // Only 22
+    {0x33, 0x33, 0x33, 0x33}, // Only 33
+    {0x44, 0x44, 0x44, 0x44}, // Only 44
+    {0x55, 0x55, 0x55, 0x55}, // Only 55
+    {0x66, 0x66, 0x66, 0x66}, // Only 66
+    {0x77, 0x77, 0x77, 0x77}, // Only 77
+    {0x88, 0x88, 0x88, 0x88}, // Only 88
+    {0x99, 0x99, 0x99, 0x99}, // Only 99
+    {0x12, 0x34, 0x56, 0x78}, // Incremental UID
+    {0xFF, 0xDE, 0xBC, 0x9A}, // Decremental UID
+    {0xCA, 0xCA, 0xCA, 0xCA}, // From arha
+};
+
+const uint8_t uid_list_pyramid[][PYRAMID_DATA_SIZE] = {
+    {0x00, 0x00, 0x00, 0x00}, // Null bytes
+    {0xFF, 0xFF, 0xFF, 0xFF}, // Only FF
+    {0x11, 0x11, 0x11, 0x11}, // Only 11
+    {0x22, 0x22, 0x22, 0x22}, // Only 22
+    {0x33, 0x33, 0x33, 0x33}, // Only 33
+    {0x44, 0x44, 0x44, 0x44}, // Only 44
+    {0x55, 0x55, 0x55, 0x55}, // Only 55
+    {0x66, 0x66, 0x66, 0x66}, // Only 66
+    {0x77, 0x77, 0x77, 0x77}, // Only 77
+    {0x88, 0x88, 0x88, 0x88}, // Only 88
+    {0x99, 0x99, 0x99, 0x99}, // Only 99
+    {0x12, 0x34, 0x56, 0x78}, // Incremental UID
+    {0xFF, 0xDE, 0xBC, 0x9A}, // Decremental UID
+    {0xCA, 0xCA, 0xCA, 0xCA}, // From arha
+};
+
+const uint8_t uid_list_keri[][KERI_DATA_SIZE] = {
+    {0x00, 0x00, 0x00, 0x00}, // Null bytes
+    {0xFF, 0xFF, 0xFF, 0xFF}, // Only FF
+    {0x11, 0x11, 0x11, 0x11}, // Only 11
+    {0x22, 0x22, 0x22, 0x22}, // Only 22
+    {0x33, 0x33, 0x33, 0x33}, // Only 33
+    {0x44, 0x44, 0x44, 0x44}, // Only 44
+    {0x55, 0x55, 0x55, 0x55}, // Only 55
+    {0x66, 0x66, 0x66, 0x66}, // Only 66
+    {0x77, 0x77, 0x77, 0x77}, // Only 77
+    {0x88, 0x88, 0x88, 0x88}, // Only 88
+    {0x99, 0x99, 0x99, 0x99}, // Only 99
+    {0x12, 0x34, 0x56, 0x78}, // Incremental UID
+    {0xFF, 0xDE, 0xBC, 0x9A}, // Decremental UID
+    {0xCA, 0xCA, 0xCA, 0xCA}, // From arha
+};
+
+const uint8_t uid_list_jablotron[][JABLOTRON_DATA_SIZE] = {
+    {0x00, 0x00, 0x00, 0x00, 0x00}, // Null bytes
+    {0xFF, 0xFF, 0xFF, 0xFF, 0xFF}, // Only FF
+    {0x11, 0x11, 0x11, 0x11, 0x11}, // Only 11
+    {0x22, 0x22, 0x22, 0x22, 0x22}, // Only 22
+    {0x33, 0x33, 0x33, 0x33, 0x33}, // Only 33
+    {0x44, 0x44, 0x44, 0x44, 0x44}, // Only 44
+    {0x55, 0x55, 0x55, 0x55, 0x55}, // Only 55
+    {0x66, 0x66, 0x66, 0x66, 0x66}, // Only 66
+    {0x77, 0x77, 0x77, 0x77, 0x77}, // Only 77
+    {0x88, 0x88, 0x88, 0x88, 0x88}, // Only 88
+    {0x99, 0x99, 0x99, 0x99, 0x99}, // Only 99
+    {0x12, 0x34, 0x56, 0x78, 0x9A}, // Incremental UID
+    {0xFF, 0xDE, 0xBC, 0x9A, 0x78}, // Decremental UID
+    {0xCA, 0xCA, 0xCA, 0xCA, 0xCA}, // From arha
+};
+
 #if defined(RFID_125_PROTOCOL)
 const FuzzerProtocol fuzzer_proto_items[] = {
     // EM4100
@@ -192,6 +321,76 @@ const FuzzerProtocol fuzzer_proto_items[] = {
                 .len = COUNT_OF(uid_list_h10301),
             },
     },
+    // IoProxXSF
+    {
+        .name = "IoProxXSF",
+        .data_size = IOPROXXSF_DATA_SIZE,
+        .dict =
+            {
+                .val = (const uint8_t*)&uid_list_ioproxxsf,
+                .len = COUNT_OF(uid_list_ioproxxsf),
+            },
+    },
+    // Paradox
+    {
+        .name = "Paradox",
+        .data_size = PARADOX_DATA_SIZE,
+        .dict =
+            {
+                .val = (const uint8_t*)&uid_list_paradox,
+                .len = COUNT_OF(uid_list_paradox),
+            },
+    },
+    // Indala26
+    {
+        .name = "Indala26",
+        .data_size = INDALA26_DATA_SIZE,
+        .dict =
+            {
+                .val = (const uint8_t*)&uid_list_indala26,
+                .len = COUNT_OF(uid_list_indala26),
+            },
+    },
+    // Viking
+    {
+        .name = "Viking",
+        .data_size = VIKING_DATA_SIZE,
+        .dict =
+            {
+                .val = (const uint8_t*)&uid_list_viking,
+                .len = COUNT_OF(uid_list_viking),
+            },
+    },
+   // Pyramid
+    {
+        .name = "Pyramid",
+        .data_size = PYRAMID_DATA_SIZE,
+        .dict =
+            {
+                .val = (const uint8_t*)&uid_list_pyramid,
+                .len = COUNT_OF(uid_list_pyramid),
+            },
+    },
+   // Keri
+    {
+        .name = "Keri",
+        .data_size = KERI_DATA_SIZE,
+        .dict =
+            {
+                .val = (const uint8_t*)&uid_list_keri,
+                .len = COUNT_OF(uid_list_keri),
+            },
+    },
+   // Jablotron
+    {
+        .name = "Jablotron",
+        .data_size = JABLOTRON_DATA_SIZE,
+        .dict =
+            {
+                .val = (const uint8_t*)&uid_list_jablotron,
+                .len = COUNT_OF(uid_list_jablotron),
+            },
+    },
 };
 #else
 const FuzzerProtocol fuzzer_proto_items[] = {