RRG-Proxmark3/tools/mfd_aes_brute
Cryolitia PukNgae 79540b1d33 feat(mfd_aes_brute): detect march and mcpu
fix build on riscv64
2024-10-17 15:14:41 +08:00
..
aes-ni.h fix compilation 2022-02-16 22:56:38 +01:00
brute_key.c correct string formatter in sscanf 2023-02-21 16:20:34 +01:00
detectaes.h missed a file. MIT license 2022-02-16 21:58:01 +01:00
Makefile feat(mfd_aes_brute): detect march and mcpu 2024-10-17 15:14:41 +08:00
mfd_aes_brute.c fix: missing includes when building with "gcc (GCC) 11.2.1 20220127 (Red Hat 11.2.1-9)" 2023-06-22 22:34:49 +02:00
mfd_multi_brute.c array init 2024-05-14 11:26:16 +02:00
randoms.c reduce variable scopes 2023-01-15 02:23:19 +01:00
randoms.h mfd_multi_brute, a new tool that targets all crypto modes and six different LCG 2022-02-16 21:44:06 +01:00
readme.txt Whitespace 2023-08-09 14:30:07 +02:00
util_posix.c add new bruteforce tools for teleno's compasX software 2022-01-26 19:57:10 +01:00
util_posix.h add new bruteforce tools for teleno's compasX software 2022-01-26 19:57:10 +01:00

# AUTH AES
#
#  blog:  https://x41-dsec.de/lab/blog/telenot-complex-insecure-keygen/
#
# Recover the AES key for Telenot Access system's desfire cards.
# CVE-2021-34600
#
# Finds the UNIX timestamp an AES key created with compasX version older than 32.0 has been generated.
# Will not work on access tokens afterwards.
#


# Unix time stamp 2006-01-01
1136073600

# reader challenge
3fda933e2953ca5e6cfbbf95d1b51ddf

# tag resp, challenge
97fe4b5de24188458d102959b888938c988e96fb98469ce7426f50f108eaa583


#
# Original source code by authors
#

# simple
./brute_key 1605394800 bb6aea729414a5b1eff7b16328ce37fd 82f5f498dbc29f7570102397a2e5ef2b6dc14a864f665b3c54d11765af81e95c

# complex
./brute_key 1136073600 3fda933e2953ca5e6cfbbf95d1b51ddf 97fe4b5de24188458d102959b888938c988e96fb98469ce7426f50f108eaa583


#
# Multi threaded version (Iceman)
#

# simple
./mfd_aes_brute 1605394800 bb6aea729414a5b1eff7b16328ce37fd 82f5f498dbc29f7570102397a2e5ef2b6dc14a864f665b3c54d11765af81e95c

expected result:
261c07a23f2bc8262f69f10a5bdf3764


Bruteforce using 8 threads
Found timestamp........ 1631100305  ( '2021-09-08 13:25:05' )
key.................... 261c07a23f2bc8262f69f10a5bdf3764
execution time 1.00 sec

#
# complex
./mfd_aes_brute 1136073600 3fda933e2953ca5e6cfbbf95d1b51ddf 97fe4b5de24188458d102959b888938c988e96fb98469ce7426f50f108eaa583

expected result:
e757178e13516a4f3171bc6ea85e165a


Bruteforce using 8 threads
Found timestamp........ 1606834416  ( '2020-12-01 15:53:36' )
key.................... e757178e13516a4f3171bc6ea85e165a
execution time 18.54 sec