Просмотр исходного кода

1.1.0 - Text changes, nothing new

AloneLiberty 2 лет назад
Родитель
Сommit
f7f453f883
4 измененных файлов с 10 добавлено и 5 удалено
  1. 2 2
      FAQ.md
  2. 2 2
      README.md
  3. 1 1
      TODO.md
  4. 5 0
      application.fam

+ 2 - 2
FAQ.md

@@ -54,6 +54,6 @@ A: Check TODO.md.
 
 Q: When darkside/hardnested attacks?
 
-A: Hardnested attack requires active connection to PC so I'm not going to do it. 
+A: Hardnested attack is planned, I recovered keys successfully. I can't tell exact time when it will be finished, probably end of April.
 
-Darkside is easier but I don't have time for that (nested took me extra ~~month~~ two months). I would be happy to accept PR if you implement it.
+Darkside requires accurate PRNG prediction that we can't implement yet (Nested way probably won't work). Maybe I missed something...

+ 2 - 2
README.md

@@ -6,10 +6,10 @@ Ported nested attacks from proxmark3 (Iceman fork)
 
 [![FAP Factory](https://flipc.org/api/v1/AloneLiberty/FlipperNested/badge)](https://flipc.org/AloneLiberty/FlipperNested)
 
-## Currently supported attacks:
+## Currently supported attacks
 
- - static nested attack
  - nested attack
+ - static nested attack
 
 ## Warning
 

+ 1 - 1
TODO.md

@@ -2,8 +2,8 @@
 
 1. Better (faster) detection of delay in a nested attack
 2. Fix infinite calibration on static encrypted nonce tags
+3. HardNested attack
 
 ## Thinking about:
 
 1. Files (.nonces and .keys) in Flipper file format (why?)
-2. Collect nonces without turning off the tag (no idea how PRNG will react to this and what speed increase will it give?) HALT=0x50

+ 5 - 0
application.fam

@@ -6,6 +6,7 @@ App(
     requires=[
         "storage",
         "gui",
+        "nfc"
     ],
     stack_size=4 * 1024,
     order=30,
@@ -23,4 +24,8 @@ App(
         )
     ],
     fap_icon_assets="assets",
+    fap_author="AloneLiberty",
+    fap_description="Recover Mifare Classic keys",
+    fap_weburl="https://github.com/AloneLiberty/FlipperNested",
+    fap_version=(1,1)
 )