pwn 0.4.484 → 0.4.487

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 5989b184df26e4b3dcd842a81245b6d4ab4ef26e3bedbc4a55d7d72c904b14ca
4
- data.tar.gz: 5ac63dfd280e71cddb7b9f85ee40bcef261e580149c3a98296dfabcb97a5f81b
3
+ metadata.gz: a8275849f0580603d4fd9fde6951b86df8b3402f709d932085a334a166b35a37
4
+ data.tar.gz: f70b5b7431255125ebe094d559ac4dae9a206cda3f660df378c7b90bc4180405
5
5
  SHA512:
6
- metadata.gz: b04848073248c82d48cd1f5e2a455e29172f0c5dac3cf50feb23f0bd20cc2e040a869e3feef93a534184b000f21aeaf3e461b1080c5eb693726c4ef5f8bb0545
7
- data.tar.gz: 8fa61cf68953e5bc528512c22b99cf66dd5f1e36b703c483433c45c00ba024cdf612aa7bb0adba4543dd25cf9116923248b28455a08490275a280c31b519f68f
6
+ metadata.gz: 9bc7bfca7e00b4f2848cd3b588861e848eb6a99bd8b336a7967f1d9654513323c8c397f159f510742df2ca4b1ab075683977f092dde381a636753301afa234da
7
+ data.tar.gz: db6cb40d71f2d7050806759627da5431a0a34de6cd7c3656c0079a5a5fb72aa48dc46f755b05a010268ef79ca75e173b1e2f6aea77856283310c79cd677f9222
data/README.md CHANGED
@@ -37,7 +37,7 @@ $ rvm use ruby-3.1.2@pwn
37
37
  $ rvm list gemsets
38
38
  $ gem install --verbose pwn
39
39
  $ pwn
40
- pwn[v0.4.484]:001 >>> PWN.help
40
+ pwn[v0.4.487]:001 >>> PWN.help
41
41
  ```
42
42
 
43
43
  [![Installing the pwn Security Automation Framework](https://raw.githubusercontent.com/0dayInc/pwn/master/documentation/pwn_install.png)](https://youtu.be/G7iLUY4FzsI)
@@ -52,7 +52,7 @@ $ rvm use ruby-3.1.2@pwn
52
52
  $ gem uninstall --all --executables pwn
53
53
  $ gem install --verbose pwn
54
54
  $ pwn
55
- pwn[v0.4.484]:001 >>> PWN.help
55
+ pwn[v0.4.487]:001 >>> PWN.help
56
56
  ```
57
57
 
58
58
 
@@ -67,7 +67,7 @@ begin
67
67
  son_micro_rfid_obj: son_micro_rfid_obj,
68
68
  cmd: :firmware
69
69
  )
70
- puts "Firmware Version: #{exec_resp.inspect}"
70
+ puts "Firmware Version: #{exec_resp.first[:raw_resp].join}"
71
71
 
72
72
  # Main Menu
73
73
  menu_msg = ''
@@ -77,6 +77,7 @@ begin
77
77
  puts '[(B)ackup Card]'
78
78
  puts '[(C)opy Card]'
79
79
  puts '[(L)oad Card from File]'
80
+ puts '[(W)arm Reset]'
80
81
  puts '[(Q)uit]'
81
82
  puts menu_msg
82
83
  print 'MAIN MENU OPTION >>> '
@@ -89,25 +90,27 @@ begin
89
90
  rfid_data = PWN::Plugins::SonMicroRFID.read_card(
90
91
  son_micro_rfid_obj: son_micro_rfid_obj
91
92
  )
92
- puts rfid_data.inspect
93
93
  when :B
94
94
  menu_msg = 'BACKUP CARD TO FILE'
95
95
  rfid_data = PWN::Plugins::SonMicroRFID.backup_card(
96
96
  son_micro_rfid_obj: son_micro_rfid_obj
97
97
  )
98
- puts rfid_data.inspect
99
98
  when :C
100
99
  menu_msg = 'COPY CARD'
101
100
  rfid_data = PWN::Plugins::SonMicroRFID.copy_card(
102
101
  son_micro_rfid_obj: son_micro_rfid_obj
103
102
  )
104
- puts rfid_data.inspect
105
103
  when :L
106
104
  menu_msg = 'LOAD FROM FILE'
107
105
  rfid_data = PWN::Plugins::SonMicroRFID.load_card_from_file(
108
106
  son_micro_rfid_obj: son_micro_rfid_obj
109
107
  )
110
- puts rfid_data.inspect
108
+ when :W
109
+ menu_msg = 'WARM RESET'
110
+ exec_resp = PWN::Plugins::SonMicroRFID.exec(
111
+ son_micro_rfid_obj: son_micro_rfid_obj,
112
+ cmd: :reset
113
+ )
111
114
  when :Q
112
115
  exit
113
116
  else
@@ -136,7 +136,6 @@ module PWN
136
136
  # Parse All Responses and add them to parsed_cmd_resp_arr
137
137
  while keep_parsing_responses
138
138
  until next_response_detected
139
- print '.'
140
139
  all_cmd_responses = PWN::Plugins::Serial.response(
141
140
  serial_obj: son_micro_rfid_obj
142
141
  )
@@ -165,14 +164,14 @@ module PWN
165
164
 
166
165
  cmd_resp = all_cmd_responses.last
167
166
  bytes_in_cmd_resp = cmd_resp.split.length
168
- puts "EXPECTED CMD BYTE LEN: #{expected_cmd_resp_byte_len}"
169
- puts "LAST CMD BYTE LEN: #{bytes_in_cmd_resp} >>>"
170
- puts all_cmd_responses
171
- puts "COMMAND HEX: #{cmd_hex}\n\n\n"
167
+ # puts "EXPECTED CMD BYTE LEN: #{expected_cmd_resp_byte_len}"
168
+ # puts "LAST CMD BYTE LEN: #{bytes_in_cmd_resp} >>>"
169
+ # puts all_cmd_responses
170
+ # puts "COMMAND HEX: #{cmd_hex}\n\n\n"
172
171
  end
173
172
 
174
- puts "\nALL CMD RESPS >>>"
175
- puts "#{all_cmd_responses}\n\n\n"
173
+ # puts "\nALL CMD RESPS >>>"
174
+ # puts "#{all_cmd_responses}\n\n\n"
176
175
 
177
176
  parsed_cmd_resp_hash = {}
178
177
  parsed_cmd_resp_hash[:raw_resp] = PWN::Plugins::Serial.dump_session_data.inspect
@@ -344,10 +343,16 @@ module PWN
344
343
 
345
344
  public_class_method def self.read_card(opts = {})
346
345
  son_micro_rfid_obj = opts[:son_micro_rfid_obj]
347
- exec(
346
+ print 'Ready to Read. Please Scan Card Now:'
347
+ exec_resp = exec(
348
348
  son_micro_rfid_obj: son_micro_rfid_obj,
349
349
  cmd: :seek_for_tag
350
350
  )
351
+
352
+ rfid_data = exec_resp.first
353
+ puts "#{rfid_data[:resp_code_desc]} >>> #{rfid_data[:tag_id]}"
354
+
355
+ rfid_data
351
356
  rescue StandardError => e
352
357
  raise e
353
358
  end
@@ -361,7 +366,7 @@ module PWN
361
366
  son_micro_rfid_obj = opts[:son_micro_rfid_obj]
362
367
  rfid_data = opts[:rfid_data]
363
368
  # TODO: write card
364
- puts 'Coming soon.'
369
+ puts rfid_data.inspect
365
370
 
366
371
  rfid_data
367
372
  rescue StandardError => e
data/lib/pwn/version.rb CHANGED
@@ -1,5 +1,5 @@
1
1
  # frozen_string_literal: true
2
2
 
3
3
  module PWN
4
- VERSION = '0.4.484'
4
+ VERSION = '0.4.487'
5
5
  end
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: pwn
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.4.484
4
+ version: 0.4.487
5
5
  platform: ruby
6
6
  authors:
7
7
  - 0day Inc.