-
Notifications
You must be signed in to change notification settings - Fork 3.1k
[NFC] Ultralight C. Attempt of authentication with default key + use default UL/UL-C pwd/key as default value for key input #4208
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: dev
Are you sure you want to change the base?
Conversation
Please let me know if I should keep API version bumped or should I revert it. Thanks! |
Please also build |
Before this is merged, I have a complete UL-C dictionary attack I'm planning on upstreaming. I've also included multiple fixes for the firmware in my changes to support it, and additional NFC app features that bring parity with MIFARE Classic. For context there are multiple key recovery attacks we'll make available on the FZ and PM3 alongside the dictionary attack. We've just been working through disclosure. |
|
Update: Tomorrow the UL-C dictionary recovery method, Flipper-based UL-C key manager, UI etc will be complete. I will aim to upstream after that. I reviewed this PR, and we should be able to close it after I open the next PR as I believe it captures everything in this PR |
Done. PR #4271 should supersede this PR. |
What's new
That PR brings some refactoring and improvement:
instance->mfu_event.data->auth_context.tdes_key.data
instead ofinstance->auth_context.tdes_key.data
Verification
Attempt of authentication with default key for Ultralight C
New feature:
Regression
Pre-populating default keys
New feature:
Regression validation:
Checklist (For Reviewer)