Configuring NFC implants (Dangerous Things - NeXT)

Lua script for use with the Proxmark3 to modify configuration pages of the NeXT (NTAG216) implant

Usage

  1. Download hf_mfu_next.lua
  2. cp hf_mfu_next.lua ~/.proxmark3/luascripts/
  3. pm3
  4. script run hf_mfu_next -h


Reference Datasheet: NTAG213/215/216

Update 17/11 : This script is now included in the RFID Research Group (RRG) - Iceman Fork. To use just do git pull followed by script run hf_ntag_dt -h.


hf_mfu_next.lua

local getopt = require('getopt')
local ansicolors  = require('ansicolors')

copyright = ''
author = 'Shain Lakin (v0yager)'
version = 'v1.0.0'
desc =[[

┣--▇▇▇▇▇▇═─--- 

This script modifies the DT NeXT implant (NTAG216) configuration pages.

https://www.x90x90.net/assets/files/datasheets/NTAG213_215_216.pdf

~ NeXT Defaults ~

Default hf mfu info:
----------------------------------------------------------------------
[=] --- Tag Configuration
[=]   cfg0 [227/0xE3]: 04 00 00 E3
[=]                     - strong modulation mode disabled
[=]                     - page 227 and above need authentication
[=]   cfg1 [228/0xE4]: 00 05 00 00
[=]                     - Unlimited password attempts
[=]                     - NFC counter disabled
[=]                     - NFC counter not protected
[=]                     - user configuration writeable
[=]                     - write access is protected with password
[=]                     - 05, Virtual Card Type Identifier is default
[=]   PWD  [229/0xE5]: 00 00 00 00 - (cannot be read)
[=]   PACK [230/0xE6]: 00 00       - (cannot be read)
[=]   RFU  [230/0xE6]:       00 00 - (cannot be read)
----------------------------------------------------------------------
  
Default blocks 0xE0 to 0xE6:
-------------------------------------
[=] 224/0xE0 | 00 00 00 00 | 0 | ....
[=] 225/0xE1 | 4E 45 78 54 | 0 | NExT
[=] 226/0xE2 | 00 00 7F BD | 0 | ....
[=] 227/0xE3 | 04 00 00 E3 | 0 | ....
[=] 228/0xE4 | 00 05 00 00 | 0 | ....
[=] 229/0xE5 | 44 4E 47 52 | 0 | DNGR
[=] 230/0xE6 | 00 00 00 00 | 0 | ....
-------------------------------------
]]

example =[[

Set a new password of SUDO using the default password of DNGR:

    script run hf_mfu_next -x pass -p DNGR -n SUDO

Enable password protection from hex block 04 onwards (User memory):

    script run hf_mfu_next -x protect -p DNGR -a 04 

Enable password protection from hex block E3 onwards (Configuration Pages):

    script run hf_mfu_next -x protect -p DNGR -a E3

Disable password protection:

    script run hf_mfu_next -x protect -p DNGR -a FF

Enable the counter and enable read + write password protection on password protected pages (protected block start specified using -x protect mode):

    script run hf_mfu_next -x conf -p DNGR -c enable -m rw

Disable the counter and enable write only password protection on password protected pages (protected block start specified using -x protect mode):

    script run hf_mfu_next -x conf -p DNGR -c disable -m w

]]
usage = [[

    script run hf_mfu_next -x pass -p <password> -n <new_password>
    script run hf_mfu_next -x protect -p <password> -a <auth0_block>
    script run hf_mfu_next -x conf -p <password> -c <enable/disable> -m <r/rw>

]]
arguments = [[
    -h      this help
    -x      mode (pass, protect, conf)
    -p      password (ascii)
    -n      new password (ascii)
    -a      auth0 block (hex)
    -c      counter (enable/disable)
    -m      protection mode (r/rw)
]]
---
--- Usage help
local function help()
    print(copyright)
    print(author)
    print(version)
    print(desc)
    print(ansicolors.cyan..'Usage'..ansicolors.reset)
    print(usage)
    print(ansicolors.cyan..'Arguments'..ansicolors.reset)
    print(arguments)
    print(ansicolors.cyan..'Example usage'..ansicolors.reset)
    print(example)
end
---
--- Print user message
local function msg(msg)
 print( string.rep('--',20) )
 print('')
 print(msg)
 print('')
 print( string.rep('--',20) )
end
---
--- String to hex function
local function strhex(str)
    return (str:gsub(".", function(char) return string.format("%2x", char:byte()) end))
 end
---
-- Main
local function main(args)

    for o, a in getopt.getopt(args, 'b:m:c:a:p:x:n:h') do
        if o == 'm' then prot_mode = a end
        if o == 'c' then counter = a end
        if o == 'a' then auth0_block = a end
        if o == 'p' then passwd = strhex(a) end
        if o == 'x' then mode = a end
        if o == 'n' then new_pass = strhex(a) end
        if o == 'h' then return help() end
    end

    if mode == 'pass' then
        command = 'hf mfu wrbl -b 229 -d '..new_pass..' -k '..passwd
        msg('Writing '..new_pass..' to PASSWD block (229/0xE5) : \n\n'..command)
        core.console(command)
        command = 'hf mfu rdbl -b 0 -k '..new_pass..''
        msg('Verifying password is correctly set : \n\n'..command)
        core.console(command)
    elseif mode == 'conf' then
        if counter == 'enable' then
            if prot_mode == 'r' then
                command = 'hf mfu wrbl -b 228 -d 10050000 -k '..passwd
                msg('Enabling counter and setting write access to protected pages as password protected : \n\n'..command)
                core.console(command)
            elseif prot_mode == 'rw' then
                command = 'hf mfu wrbl -b 228 -d 90050000 -k '..passwd
                msg('Enabling counter and setting read/write access to protected pages as password protected : \n\n'..command)
                core.console(command)
            end
        elseif counter == 'disable' then
            if prot_mode == 'w' then
                command = 'hf mfu wrbl -b 228 -d 00050000 -k '..passwd
                msg('Disabling counter and setting write password protection on protected pages : \n\n'..command)
                core.console(command)
            elseif prot_mode == 'rw' then
                command = 'hf mfu wrbl -b 228 -d 80050000 -k '..passwd
                msg('Disabling counter and setting read/write password protection on protected pages : \n\n'..command)
                core.console(command)
            end        
        end
    elseif mode == 'protect' then
        command = 'hf mfu wrbl -k '..passwd..' -b 227 -d 040000'..auth0_block
        msg('Enabling password protection from block '..auth0_block..' onwards : \n\n'..command)
        core.console(command)
    else
        return print(usage)
    end

    if command == '' then return print(usage) end


end
main(args)
******
Written by Shain Lakin on 11 November 2022