pwn 0.4.485 → 0.4.486
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/README.md +2 -2
- data/bin/pwn_serial_son_micro_sm132_rfid +7 -0
- data/lib/pwn/plugins/son_micro_rfid.rb +8 -7
- data/lib/pwn/version.rb +1 -1
- metadata +1 -1
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: e94d61e2dd6c49a629782bffdc15c3df8572ddfd53164bcef2d161b5c0bee91d
|
4
|
+
data.tar.gz: d0de28e574989e25944c9ec65b25bc725359edb2b1a91f700619c873daa69c29
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 57a28ac3bac176f638161f07bd7f1fd5267b616085b95f68d25942a321f3c77eb570eef689c166d530734680013404ea21a61219c916c4e437c9584e189a9f6d
|
7
|
+
data.tar.gz: 2af9a19d427468d017758d571175d402e63826ba4fb202d97432bdc4bf841759a8cd15eceba2e05d6c4de8a12f4c63ed36df587e9b59a3877b5a7a80c085f434
|
data/README.md
CHANGED
@@ -37,7 +37,7 @@ $ rvm use ruby-3.1.2@pwn
|
|
37
37
|
$ rvm list gemsets
|
38
38
|
$ gem install --verbose pwn
|
39
39
|
$ pwn
|
40
|
-
pwn[v0.4.
|
40
|
+
pwn[v0.4.486]:001 >>> PWN.help
|
41
41
|
```
|
42
42
|
|
43
43
|
[![Installing the pwn Security Automation Framework](https://raw.githubusercontent.com/0dayInc/pwn/master/documentation/pwn_install.png)](https://youtu.be/G7iLUY4FzsI)
|
@@ -52,7 +52,7 @@ $ rvm use ruby-3.1.2@pwn
|
|
52
52
|
$ gem uninstall --all --executables pwn
|
53
53
|
$ gem install --verbose pwn
|
54
54
|
$ pwn
|
55
|
-
pwn[v0.4.
|
55
|
+
pwn[v0.4.486]:001 >>> PWN.help
|
56
56
|
```
|
57
57
|
|
58
58
|
|
@@ -77,6 +77,7 @@ begin
|
|
77
77
|
puts '[(B)ackup Card]'
|
78
78
|
puts '[(C)opy Card]'
|
79
79
|
puts '[(L)oad Card from File]'
|
80
|
+
puts '[(W)arm Reset]'
|
80
81
|
puts '[(Q)uit]'
|
81
82
|
puts menu_msg
|
82
83
|
print 'MAIN MENU OPTION >>> '
|
@@ -104,6 +105,12 @@ begin
|
|
104
105
|
rfid_data = PWN::Plugins::SonMicroRFID.load_card_from_file(
|
105
106
|
son_micro_rfid_obj: son_micro_rfid_obj
|
106
107
|
)
|
108
|
+
when :W
|
109
|
+
menu_msg = 'WARM RESET'
|
110
|
+
exec_resp = PWN::Plugins::SonMicroRFID.exec(
|
111
|
+
son_micro_rfid_obj: son_micro_rfid_obj,
|
112
|
+
cmd: :reset
|
113
|
+
)
|
107
114
|
when :Q
|
108
115
|
exit
|
109
116
|
else
|
@@ -164,14 +164,14 @@ module PWN
|
|
164
164
|
|
165
165
|
cmd_resp = all_cmd_responses.last
|
166
166
|
bytes_in_cmd_resp = cmd_resp.split.length
|
167
|
-
puts "EXPECTED CMD BYTE LEN: #{expected_cmd_resp_byte_len}"
|
168
|
-
puts "LAST CMD BYTE LEN: #{bytes_in_cmd_resp} >>>"
|
169
|
-
puts all_cmd_responses
|
170
|
-
puts "COMMAND HEX: #{cmd_hex}\n\n\n"
|
167
|
+
# puts "EXPECTED CMD BYTE LEN: #{expected_cmd_resp_byte_len}"
|
168
|
+
# puts "LAST CMD BYTE LEN: #{bytes_in_cmd_resp} >>>"
|
169
|
+
# puts all_cmd_responses
|
170
|
+
# puts "COMMAND HEX: #{cmd_hex}\n\n\n"
|
171
171
|
end
|
172
172
|
|
173
|
-
puts "\nALL CMD RESPS >>>"
|
174
|
-
puts "#{all_cmd_responses}\n\n\n"
|
173
|
+
# puts "\nALL CMD RESPS >>>"
|
174
|
+
# puts "#{all_cmd_responses}\n\n\n"
|
175
175
|
|
176
176
|
parsed_cmd_resp_hash = {}
|
177
177
|
parsed_cmd_resp_hash[:raw_resp] = PWN::Plugins::Serial.dump_session_data.inspect
|
@@ -343,11 +343,12 @@ module PWN
|
|
343
343
|
|
344
344
|
public_class_method def self.read_card(opts = {})
|
345
345
|
son_micro_rfid_obj = opts[:son_micro_rfid_obj]
|
346
|
+
print 'Ready to Read. Please Scan Card Now:'
|
346
347
|
rfid_data = exec(
|
347
348
|
son_micro_rfid_obj: son_micro_rfid_obj,
|
348
349
|
cmd: :seek_for_tag
|
349
350
|
)
|
350
|
-
puts rfid_data
|
351
|
+
puts "#{rfid_data[:resp_code_desc]} >>> #{rfid_data[:tag_id]}"
|
351
352
|
|
352
353
|
rfid_data
|
353
354
|
rescue StandardError => e
|
data/lib/pwn/version.rb
CHANGED