Difference between revisions of "N2 Elite"
(Created page with "N2 Elite is sold as a game cheating product, called previously '''Amiiqo''', an name probably too close to the original targeted game '''Amiibo'''. <br>I'm not interested at a...") |
m (→UID) |
||
(54 intermediate revisions by the same user not shown) | |||
Line 2: | Line 2: | ||
<br>I'm not interested at all in its gaming aspects but it's primarily a (multiple) NTAG215 emulator and in that respect, I'm very curious about that product :) |
<br>I'm not interested at all in its gaming aspects but it's primarily a (multiple) NTAG215 emulator and in that respect, I'm very curious about that product :) |
||
− | = |
+ | =Intro= |
+ | It's a small round passive device with one button. It can emulate up to 200 NTAG215 and can be programmed via an Android app or, if you buy their additional reader, via a PC application: N2 Manager for Windows or Mac. |
||
+ | |||
+ | '''Credits''': I heard about it by reading a 3-page article of Patrick Gueulle in the French revue [http://www.acbm.com/virus/num_28/ Le Virus Informatique #28]. |
||
+ | In that article, the author revealed how the emulator could be used to emulate any 7-byte UID or even a 4-byte UID (we'll come to that later) and he's providing two programs written in Basic; apparently Patrick remained true to himself ;) |
||
+ | |||
+ | =N2 & NTAG Resources= |
||
* [http://www.n2elite.com/ Official] |
* [http://www.n2elite.com/ Official] |
||
+ | ** Official site has a list of shops. Mine came from Cyprus ([https://www.playmods.co.uk/en/n2-elite-nfc-toy-emulator.html Playmods.co.uk]) and was delivered in 4 days to Belgium. |
||
+ | * [http://www.nxp.com/documents/data_sheet/NTAG213_215_216.pdf NTAG213/215/216 datasheet] |
||
+ | |||
+ | Three versions of the Android app so far: |
||
+ | * ed5fc865e98b33e584860b39cb70ddb6 Amiiqo_1.0.apk |
||
+ | * 44d1ea2fd342c7faa3af81f473eada12 Amiiqo_1.1.apk |
||
+ | * f39a091be603058329b085f1b0382caa Amiiqo_1.2.apk |
||
+ | * d8aa32a1f8b8e62cbd376fc69be47829 com.n2elite.amiiqo_2.0.0.apk |
||
+ | * bf1f6bbdb4692cedf3921026c7e3aa99 com.n2elite.amiiqo_2.0.1.apk |
||
+ | * 506167b77f8860a6a78242022728e82e com.n2elite.amiiqo_2.0.2.apk |
||
+ | |||
+ | Versions 1.1 to 2.0.2 contain the same fw image to update older N2 Elite tags, see below the section about firmware. |
||
+ | |||
+ | =Amiibo Resources= |
||
+ | Nothing really useful for us but for sake of completion: |
||
+ | * Amiibo tags |
||
+ | ** http://3dbrew.org/wiki/Amiibo |
||
+ | ** http://nfc-bank.com/bins.php?categoryid=2&tabid=39 |
||
+ | ** https://www.mediafire.com/folder/f74yt2jfrkl76/Amiibo_Dump |
||
+ | |||
+ | * Unofficial sw |
||
+ | ** Alternate manager: http://www.maxconsole.com/maxcon_forums/threads/291976-Amiiqo-Manager |
||
+ | ** Parsing library: https://github.com/Falco20019/libamiibo |
||
+ | |||
+ | =Hardware= |
||
+ | Device was sold previously under the name Amiiqo, and they insist this is the same hardware as the N2 Elite. |
||
+ | Nevertheless there are apparently two revisions of the product: |
||
+ | * V1, preloaded with 10 amiibo figurines |
||
+ | * V2, empty, and an alien face printed on the PCB |
||
+ | I got a V2. |
||
+ | |||
+ | [[File:N2elite.jpg|800px]] |
||
+ | |||
+ | Patrick Gueulle mentions the QFN24 chip has a mark "SX3" but mine is completely black. Under the microscope he found two references on the die: "G4830H001I" and "DI 503 03". |
||
+ | |||
+ | Pinout: |
||
+ | <pre> |
||
+ | 1 nc |
||
+ | 2 nc |
||
+ | 3 nc |
||
+ | 4 GND |
||
+ | 5 -+---15 |
||
+ | +---(switch 1) |
||
+ | +---(C1 100nF)--- GND |
||
+ | 6 nc |
||
+ | |||
+ | 7 (antenna 1) |
||
+ | 8 nc |
||
+ | 9 nc |
||
+ | 10 nc |
||
+ | 11 nc |
||
+ | 12 (antenna 2) |
||
+ | |||
+ | 13 nc |
||
+ | 14 nc |
||
+ | 15 -+--- 5 |
||
+ | +---(switch 1) |
||
+ | +---(C1 100nF)--- GND |
||
+ | 16 -+---(switch 2) |
||
+ | +---(R1 2k8)----- GND |
||
+ | 17 nc |
||
+ | 18 nc |
||
+ | |||
+ | 19 nc |
||
+ | 20 nc |
||
+ | 21 GND |
||
+ | 22 GND |
||
+ | 23 nc |
||
+ | 24 nc |
||
+ | |||
+ | </pre> |
||
+ | [[File:N2EliteBoard.jpg|800px]] |
||
+ | |||
+ | =Traces= |
||
+ | Let's trace some transactions between the Android app and the device with a Proxmark3. |
||
+ | <br>I've discarded the anticol and HALT/WUPA activities. |
||
+ | ==Discovery== |
||
+ | <pre> |
||
+ | Rdr | 30 02 10 8b | ok | READBLOCK(2) |
||
+ | Tag | ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff | | |
||
+ | | 37 cb | ok | |
||
+ | Rdr | 60 f8 32 | ok | EV1 VERSION |
||
+ | Tag | 00 04 04 02 01 00 11 03 01 9e | ok | |
||
+ | Rdr | 55 d6 54 | ok | ? |
||
+ | Tag | 00 01 00 03 47 3e | ok | |
||
+ | Rdr | 43 61 21 | ok | MAGIC WUPC2 |
||
+ | Tag | 21 4b 87 02 52 3d 0d 10 16 3a 24 ff ff ff ff ff | | |
||
+ | | e4 e7 | ok | |
||
+ | Rdr | 3b 15 16 00 8e a7 | ok | ? |
||
+ | Tag | ff ff ff ff ff ff ff ff 5f d2 | ok | |
||
+ | </pre> |
||
+ | When asking the app to show the tag ID it returns 214b8702523d0d10163a24. |
||
+ | |||
+ | ==Lock== |
||
+ | <pre> |
||
+ | Rdr | 46 cc 76 | ok | ? |
||
+ | Tag | 0a a4 fe | | |
||
+ | </pre> |
||
+ | ==Unlock== |
||
+ | You need to press the button once the app discovers the tag and maintain it pressed. You've 2 seconds. |
||
+ | <pre> |
||
+ | Rdr | 44 de 55 | ok | ? |
||
+ | 2 secs pause. |
||
+ | Rdr | 45 57 44 | ok | ? |
||
+ | Tag | 0a a4 fe | | |
||
+ | </pre> |
||
+ | ==Update number of banks== |
||
+ | When changing the number of available banks from 1 to 2: |
||
+ | <pre> |
||
+ | Rdr | a9 02 55 45 | ok | ? |
||
+ | Tag | 0a a4 fe | | |
||
+ | </pre> |
||
+ | Now the discovery phase has two such commands: |
||
+ | <pre> |
||
+ | Rdr | 3b 15 16 00 8e a7 | ok | ? |
||
+ | Tag | ff ff ff ff ff ff ff ff 5f d2 | ok |. |
||
+ | Rdr | 3b 15 16 01 07 b6 | ok | ? |
||
+ | Tag | ff ff ff ff ff ff ff ff 5f d2 | ok |. |
||
+ | </pre> |
||
+ | ==Read a dump== |
||
+ | <pre> |
||
+ | Rdr | 30 00 02 a8 | ok | READBLOCK(0) |
||
+ | Tag | ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff | |. |
||
+ | | 37 cb | ok |. |
||
+ | Rdr | 30 04 26 ee | ok | READBLOCK(4) |
||
+ | Tag | ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff | |. |
||
+ | | 37 cb | ok |. |
||
+ | Rdr | 30 08 4a 24 | ok | READBLOCK(8) |
||
+ | Tag | ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff | |. |
||
+ | | 37 cb | ok |. |
||
+ | ... |
||
+ | Rdr | 30 80 0a 2c | ok | READBLOCK(128) |
||
+ | Tag | ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff | |. |
||
+ | | 37 cb | ok |. |
||
+ | Rdr | 30 84 2e 6a | ok | READBLOCK(132) |
||
+ | Tag | ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff | |. |
||
+ | | 37 cb | ok |. |
||
+ | </pre> |
||
+ | ==Write a dump== |
||
+ | <pre> |
||
+ | Rdr | 1b ff ff ff ff 63 00 | ok | PWD-AUTH KEY: 0xffffffff |
||
+ | Tag | 80 80 64 16 | |. |
||
+ | Rdr | a5 00 00 04 c5 a8 e1 69 44 | ok | INCR(0) |
||
+ | Tag | 0a a4 fe | |. |
||
+ | Rdr | a5 01 00 da aa 2b 80 d9 8d | ok | INCR(1) |
||
+ | Tag | 0a a4 fe | |. |
||
+ | Rdr | a5 02 00 db 48 00 00 95 62 | ok | INCR(2) |
||
+ | Tag | 0a a4 fe | |. |
||
+ | Rdr | a5 03 00 e1 10 12 00 e2 15 | ok | INCR(3) |
||
+ | Tag | 0a a4 fe | |. |
||
+ | Rdr | a5 04 00 01 03 a0 10 17 ce | ok | INCR(4) |
||
+ | Tag | 0a a4 fe | |. |
||
+ | Rdr | a5 05 00 44 03 00 fe 53 13 | ok | ? |
||
+ | Tag | 0a a4 fe | |. |
||
+ | Rdr | a5 06 00 00 00 00 00 e0 8a | ok | ? |
||
+ | Tag | 0a a4 fe | |. |
||
+ | ... |
||
+ | Rdr | a5 85 00 ff ff ff ff a6 70 | ok | ? |
||
+ | Tag | 0a a4 fe | |. |
||
+ | Rdr | a5 86 00 ff ff ff ff db 7c | ok | ? |
||
+ | Tag | 0a a4 fe | |. |
||
+ | </pre> |
||
+ | |||
+ | =Commands= |
||
+ | We'll present the commands understood so far, exemplified with pn53x-tamashell scripts (to be used with libnfc and a compatible reader) |
||
+ | ==NTAG Commands== |
||
+ | ===0x60: GET_VERSION=== |
||
+ | |||
+ | <pre> |
||
+ | #!/usr/bin/pn53x-tamashell |
||
+ | 4a 01 00; Select tag |
||
+ | 42 60; Get Version |
||
+ | </pre> |
||
+ | ===0x3C: READ_SIG=== |
||
+ | Read ECC signature of NTAG. |
||
+ | |||
+ | <pre> |
||
+ | #!/usr/bin/pn53x-tamashell |
||
+ | 4a 01 00; Select tag |
||
+ | 42 3c; Read ECC signature |
||
+ | </pre> |
||
+ | ===0x30: READ=== |
||
+ | It reads 4 pages (16 bytes) starting from the given page |
||
+ | <pre> |
||
+ | #!/usr/bin/pn53x-tamashell |
||
+ | 4a 01 00; Select tag |
||
+ | 42 30 00 |
||
+ | 42 30 04 |
||
+ | 42 30 08 |
||
+ | 42 30 0c |
||
+ | ... |
||
+ | 42 30 80 |
||
+ | 42 30 84 |
||
+ | </pre> |
||
+ | ===0x3A: FAST_READ=== |
||
+ | Syntax: |
||
+ | <pre>3a <start page> <stop page (included)></pre> |
||
+ | <br>Theoretically a bank could be accessed in one single command but it depends on the reader. With libnfc readers, don't read more than 63 pages (252 bytes) at once. |
||
+ | |||
+ | Reading entirely the tag: |
||
+ | <pre> |
||
+ | #!/usr/bin/pn53x-tamashell |
||
+ | 4a 01 00; Select tag |
||
+ | 42 3a 00 1f |
||
+ | 42 3a 20 3f |
||
+ | 42 3a 40 5f |
||
+ | 42 3a 60 7f |
||
+ | 42 3a 80 86 |
||
+ | </pre> |
||
+ | |||
+ | ===0xA2: WRITE=== |
||
+ | Syntax: |
||
+ | <pre>a2 <page> <data></pre> |
||
+ | |||
+ | <pre> |
||
+ | #!/usr/bin/pn53x-tamashell |
||
+ | 4a 01 00; Select tag |
||
+ | 42 a2 84 01 02 03 04; Write 01020304 page #84 |
||
+ | </pre> |
||
+ | |||
+ | ===0x1B: PWD_AUTH=== |
||
+ | Syntax: |
||
+ | <pre>1b <4-byte pwd></pre> |
||
+ | |||
+ | N2 returns always 8080 |
||
+ | ==N2 special commands== |
||
+ | ===0x55: N2_GET_INFO=== |
||
+ | <pre> |
||
+ | #!/usr/bin/pn53x-tamashell |
||
+ | 4a 01 00; Select tag |
||
+ | 42 55; Get N2 info |
||
+ | </pre> |
||
+ | Answer is 4 bytes as seen in the traces above, e.g.: |
||
+ | <pre> |
||
+ | 00 01 00 03 |
||
+ | </pre> |
||
+ | * byte 1: currently active slot |
||
+ | * byte 2: number of active banks |
||
+ | * byte 3: button pressed? |
||
+ | * byte 4: FW version? |
||
+ | It could be that older N2 return only 2 bytes. |
||
+ | |||
+ | ===0x43: N2_GET_ID=== |
||
+ | <pre> |
||
+ | #!/usr/bin/pn53x-tamashell |
||
+ | 4a 01 00; Select tag |
||
+ | 42 43; Get N2 ID |
||
+ | </pre> |
||
+ | Answer is 16 bytes as seen in the traces above, e.g.: |
||
+ | <pre> |
||
+ | 21 4b 87 02 52 3d 0d 10 16 3a 24 ff ff ff ff ff |
||
+ | </pre> |
||
+ | First 11 bytes constitute what's returned as ID by the Android app. |
||
+ | |||
+ | ===0xA9: N2_SET_BANK_CNT=== |
||
+ | Syntax: |
||
+ | <pre>a9 <nr_of_banks></pre> |
||
+ | |||
+ | <pre> |
||
+ | #!/usr/bin/pn53x-tamashell |
||
+ | 4a 01 00; Select tag |
||
+ | 42 a9 c8; Open the 200 banks |
||
+ | </pre> |
||
+ | |||
+ | ===0x3B: N2_FAST_READ=== |
||
+ | Similar to 0x3A FAST_READ but with one extra parameter to specify the bank number so this command can access directly the 200 banks. |
||
+ | |||
+ | Syntax: |
||
+ | <pre>3b <start page> <stop page (included)> <bank></pre> |
||
+ | Banks don't need to be active to be accessed. |
||
+ | <br>Theoretically a bank could be accessed in one single command but it depends on the reader. With libnfc readers, don't read more than 63 pages (252 bytes) at once. |
||
+ | |||
+ | <pre> |
||
+ | #!/usr/bin/pn53x-tamashell |
||
+ | 4a 01 00; Select tag |
||
+ | 42 3b 00 1f 00; start of bank #0 |
||
+ | 42 3b 20 3f 00 |
||
+ | 42 3b 40 5f 00 |
||
+ | 42 3b 60 7f 00 |
||
+ | 42 3b 80 86 00 |
||
+ | 42 3b 87 8f 00; pages above the 540 bytes of bank #0 NTAG215 |
||
+ | 42 3b 90 af 00; this is actually start of next bank |
||
+ | 42 3b 00 1f 01; start of bank #1 |
||
+ | 42 3b 20 3f 01 |
||
+ | 42 3b 40 5f 01 |
||
+ | 42 3b 60 7f 01 |
||
+ | 42 3b 80 86 01 |
||
+ | 42 3b 87 8f 01; pages above the 540 bytes of bank #0 NTAG215 |
||
+ | 42 3b 00 1f 02; start of bank #2 |
||
+ | 42 3b 20 3f 02 |
||
+ | 42 3b 40 5f 02 |
||
+ | 42 3b 60 7f 02 |
||
+ | 42 3b 80 86 02 |
||
+ | 42 3b 87 8f 02; pages above the 540 bytes of bank #0 NTAG215 |
||
+ | ;etc for remaining 197 banks |
||
+ | </pre> |
||
+ | This is interesting! Original Android app doesn't care about ECC signature which is left = FFFF..FF but the N2 allows the ECC of a bank to be written via the 8 pages 0x87-0x8e. See command READ_SIG above. |
||
+ | <br>I found no use of page 0x8f so far. |
||
+ | |||
+ | ===0xA5: N2_WRITE=== |
||
+ | Similar to 0xA2 WRITE but with one extra parameter to specify the bank number so this command can access directly the 200 banks. |
||
+ | |||
+ | Syntax: |
||
+ | <pre>a5 <page> <bank> <data></pre> |
||
+ | Banks don't need to be active to be accessed. |
||
+ | |||
+ | <pre> |
||
+ | #!/usr/bin/pn53x-tamashell |
||
+ | 4a 01 00; Select tag |
||
+ | 42 a5 84 00 01 02 03 04; Write 01020304 in bank #00 page #84 |
||
+ | </pre> |
||
+ | |||
+ | ===0x46: N2_LOCK=== |
||
+ | <pre> |
||
+ | #!/usr/bin/pn53x-tamashell |
||
+ | 4a 01 00; Select tag |
||
+ | 42 46; Lock |
||
+ | </pre> |
||
+ | Tag should return "0x0a". |
||
+ | From now on, special N2 commands are unresponsive. |
||
+ | |||
+ | ===0x44/0x45: N2_UNLOCK=== |
||
+ | The procedure seems to be the following: initiate a 0x44, press the button, finalize with 0x45. |
||
+ | <pre> |
||
+ | #!/usr/bin/pn53x-tamashell |
||
+ | 4a 01 00; Select tag |
||
+ | 42 44; Prepare unlock |
||
+ | // Press N2 button now and keep it pressed for at least 3s |
||
+ | p 2000; Pause for 2000ms |
||
+ | 4a 01 00; Select tag |
||
+ | 42 45; Unlock |
||
+ | </pre> |
||
+ | The tag will reply with 0x0a if unlock succeeded |
||
+ | |||
+ | ===0xA7: N2_SELECT_BANK=== |
||
+ | Selects which bank is the current bank. |
||
+ | |||
+ | Syntax: |
||
+ | <pre>a7 <bank></pre> |
||
+ | Tag replies 0x0a |
||
+ | |||
+ | Bank doesn't need to be active to be set as current. |
||
+ | |||
+ | Note: this command was found by brute-force, it's not used by the Android app. |
||
+ | |||
+ | ===0xAE: N2_FAST_WRITE=== |
||
+ | |||
+ | Similar to N2_FAST_READ with one parameter to specify the bank number so this command can access directly the 200 banks. |
||
+ | |||
+ | Syntax: |
||
+ | <pre>ae <start page> <bank> <size> <data></pre> |
||
+ | Banks don't need to be active to be accessed. |
||
+ | <br>Theoretically a bank could be accessed in one single command but it depends on the reader. |
||
+ | |||
+ | Note: this command is not used by the Android app. |
||
+ | |||
+ | ==N2 tricks== |
||
+ | ===Swapping banks=== |
||
+ | One needs to press the button to access the next bank. While this is probably not a problem with the targeted reader, it's harder to get it working systematically from our scripts. |
||
+ | |||
+ | The tricky parts are: |
||
+ | * Of course you need more than a single slot active |
||
+ | * You need to press the button when the tag gets powered, then it can be released |
||
+ | * It works *only* if in the previous session some specific commands were executed, e.g. a FAST_READ (3A) |
||
+ | * Contrary to what I read elsewhere, it works both in LOCKED and UNLOCKED modes |
||
+ | |||
+ | See also N2_SELECT_BANK above. |
||
+ | |||
+ | Test: |
||
+ | <pre> |
||
+ | #!/usr/bin/pn53x-tamashell |
||
+ | 4a 01 00; Select tag |
||
+ | 42 a9 10; N2_SET_BANK_CNT activate 16 banks |
||
+ | 42 55; N2_GET_INFO -> second byte (so first byte of tag response shows the current bank |
||
+ | 42 3a 00 00; FAST_READ, just to make sure things will work |
||
+ | // Remove tag now !! |
||
+ | p 2000; Pause 2000ms |
||
+ | // Press button and bring the tag back while keeping it pressed, then release button |
||
+ | 4a 01 00; Select tag |
||
+ | 42 55; N2_GET_INFO -> second byte (so first byte of tag response shows the current bank |
||
+ | 42 3a 00 00; FAST_READ, just to make sure things will work |
||
+ | // Remove tag now !! |
||
+ | p 2000; Pause 2000ms |
||
+ | // Press button and bring the tag back while keeping it pressed, then release button |
||
+ | 4a 01 00; Select tag |
||
+ | // etc. |
||
+ | </pre> |
||
+ | |||
+ | This shows e.g.: |
||
+ | <pre> |
||
+ | ... |
||
+ | Tx: 42 55 |
||
+ | Rx: 00 00 10 00 03 |
||
+ | ... |
||
+ | Tx: 42 55 |
||
+ | Rx: 00 01 10 01 03 |
||
+ | ... |
||
+ | Tx: 42 55 |
||
+ | Rx: 00 02 10 01 03 |
||
+ | </pre> |
||
+ | |||
+ | ===ECC=== |
||
+ | In the N2_FAST_DUMP we saw that it contains additional pages above the 540-byte pages. |
||
+ | <br>Actually some of them are used to store what is returned by the READ_SIG command: |
||
+ | <pre> |
||
+ | 42 3b 87 8e 00; 32-byte ECC signature of bank #0 NTAG215 |
||
+ | 42 3b 8f 8f 00; 4 unused bytes? |
||
+ | 42 3b 87 8e 01; 32-byte ECC signature of bank #0 NTAG215 |
||
+ | 42 3b 8f 8f 01; 4 unused bytes? |
||
+ | </pre> |
||
+ | Example: |
||
+ | <pre> |
||
+ | #!/usr/bin/pn53x-tamashell |
||
+ | // Please put N2 Elite on reader NOW |
||
+ | 4a 01 00; Select tag |
||
+ | 42 a5 87 00 00 01 02 03; Write over bank #0 ECC |
||
+ | 42 a5 88 00 04 05 06 07 |
||
+ | 42 a5 89 00 08 09 0a 0b |
||
+ | 42 a5 8a 00 0c 0d 0e 0f |
||
+ | 42 a5 8b 00 10 11 12 13 |
||
+ | 42 a5 8c 00 14 15 16 17 |
||
+ | 42 a5 8d 00 18 19 1a 1b |
||
+ | 42 a5 8e 00 1c 1d 1e 1f |
||
+ | 42 3c; Read ECC signature |
||
+ | </pre> |
||
+ | ===UID=== |
||
+ | UID can be changed by writing bytes in the first few pages. |
||
+ | <br>Theoretically first pages contain also BCC0, BCC1 which should be respectively set to: |
||
+ | * BCC0=0x88^UID0^UID1^UID2 |
||
+ | * BCC1=UID3^UID4^UID5^UID6 |
||
+ | And that's what the Basic programs of Gueulle are doing. |
||
+ | <br>But actually the N2 will handle the anti-collision properly, no matter how BCC0 and BCC1 are defined, as simply as that! |
||
+ | <pre> |
||
+ | #!/usr/bin/pn53x-tamashell |
||
+ | 4a 01 00; Select tag |
||
+ | // Write UID ffffffffffffff: |
||
+ | 42 a5 00 00 ff ff ff ff; Write in bank #00 page #00 UID0 UID1 UID2 BCC0 |
||
+ | 42 a5 01 00 ff ff ff ff; Write in bank #00 page #01 UID3 UID4 UID5 UID6 |
||
+ | 42 a5 02 00 ff ff ff ff; Write in bank #00 page #02 BCC1 Intl Lck1 Lck2 |
||
+ | // Write UID 01020304050607: |
||
+ | 42 a5 00 00 01 02 03 00; Write in bank #00 page #00 UID0 UID1 UID2 BCC0 |
||
+ | 42 a5 01 00 04 05 06 07; Write in bank #00 page #01 UID3 UID4 UID5 UID6 |
||
+ | 42 a5 02 00 00 00 00 00; Write in bank #00 page #02 BCC1 Intl Lck1 Lck2 |
||
+ | </pre> |
||
+ | |||
+ | Interestingly enough, Gueulle has shown that some readers can be fooled when security is based only on UID (typically readers sending a 10-digit serial to the system), even if they are not using NTAG! E.g.: |
||
+ | |||
+ | * ISO14443A |
||
+ | ** 7-byte Mifare Ultralight |
||
+ | ** 4-byte Mifare Classic |
||
+ | ** 7-byte Mifare Classic |
||
+ | ** 7-byte Desfire EV1 |
||
+ | ** etc |
||
+ | * ISO1443B !! |
||
+ | ** 4-byte TypeB PUPI |
||
+ | * ISO15693 !! |
||
+ | ** 8-byte PicoPass 2K |
||
+ | |||
+ | In the 4-byte cases he simply completes the UID with zeroes and in the 8-byte case, he drops the last one. |
||
+ | |||
+ | ===ShowID=== |
||
+ | When Android app discovers a N2 tag, it issues what I call a N2_INFO to see how many banks are active, then it issues commands such as: |
||
+ | <pre> |
||
+ | 42 3b 15 16 00; Read 8 bytes from address 0x15 to address 0x16 bank #0 |
||
+ | </pre> |
||
+ | to discover the ID of the Amiibo figures that are stored, because actually the ID is stored in 8 bytes from page 0x15, so we can also get it from the currently active bank, or from an original figure, with: |
||
+ | <pre> |
||
+ | 42 30 15; Read 16 bytes from address 0x15 |
||
+ | </pre> |
||
+ | ===Compatibility=== |
||
+ | * N2 doesn't emulate any of the protections (OTP locks, etc) and everything is always fully RW. |
||
+ | * It seems that N2 doesn't support the following legit commands: COMP_WRITE, READ_CNT. |
||
+ | * N2 accepts the command PWD_AUTH with any password, it doesn't matter. It returns 8080. Android app issues a PWD_AUTH using the first 4 bytes of the UID as password before issuing write commands, but as said it doesn't matter, a PWD_AUTH is even not required by N2 before a WRITE. |
||
+ | |||
+ | =Firmware= |
||
+ | '''WARNING''' all the info in this section are unverified and any wrong attempt could probably brick a N2! |
||
+ | |||
+ | Android apps v1.1 to v2.0.2 the same update.apdu file. |
||
+ | <br>I guess it contains apdus supposed to be played by the N2 reader because the app is truncating the apdus before they get sent. |
||
+ | |||
+ | App starts by sending the following commands: (there could be errors here, be very cautious if you want to try anything here...) |
||
+ | <pre> |
||
+ | f4 49 9b 99 c3 da 57 71 0a 64 4a 9e f8 a2 30 d9 |
||
+ | 60; GET_VERSION |
||
+ | </pre> |
||
+ | Then it sends the CAPDUs without the first 5 bytes (I'm not sure if the last byte=0x00 is still part of the CAPDU or not) |
||
+ | <br>And checks the response from the tag, which should be the usual 90 00. |
||
+ | |||
+ | update.apdu is composed of 22 CAPDUs sending 250 bytes of payload each so the firmware image is 5520-byte long unless some bytes are e.g. a CRC. |
||
+ | |||
+ | Truncated CAPDUs sent to the N2: |
||
+ | <pre> |
||
+ | 55 00 00 0C B0 19 01 BD ... 80 29 69 00 |
||
+ | 55 00 F0 28 90 82 58 97 ... 38 3F 6B 00 |
||
+ | 55 01 E0 D5 81 02 C2 76 ... CF 69 7F 00 |
||
+ | 55 02 D0 BC 13 DB 33 D9 ... A0 14 68 00 |
||
+ | ... |
||
+ | F3 55 13 B0 35 0F 84 D0 ... A0 44 8D 00 |
||
+ | 55 14 A0 AA D4 9F 00 ED ... FD A2 13 00 |
||
+ | </pre> |
||
+ | Then a last CAPDU: |
||
+ | <pre> |
||
+ | F0 15 90 95 A2 F4 93 4F 6F D9 77 00 |
||
+ | </pre> |
||
+ | |||
+ | If we isolate what's supposed to be the payload of those CAPDU ([3:-1]), we get 5520 bytes, of which the last 80 repeat themselves as |
||
+ | <pre>05 40 B9 3B DD FD A2 13</pre> |
||
+ | It looks like a XOR encryption, but so far even XORed back to get 00 or ff it doesn't make much sense :( ''to be continued...'' |
Latest revision as of 11:22, 8 February 2018
N2 Elite is sold as a game cheating product, called previously Amiiqo, an name probably too close to the original targeted game Amiibo.
I'm not interested at all in its gaming aspects but it's primarily a (multiple) NTAG215 emulator and in that respect, I'm very curious about that product :)
Intro
It's a small round passive device with one button. It can emulate up to 200 NTAG215 and can be programmed via an Android app or, if you buy their additional reader, via a PC application: N2 Manager for Windows or Mac.
Credits: I heard about it by reading a 3-page article of Patrick Gueulle in the French revue Le Virus Informatique #28. In that article, the author revealed how the emulator could be used to emulate any 7-byte UID or even a 4-byte UID (we'll come to that later) and he's providing two programs written in Basic; apparently Patrick remained true to himself ;)
N2 & NTAG Resources
- Official
- Official site has a list of shops. Mine came from Cyprus (Playmods.co.uk) and was delivered in 4 days to Belgium.
- NTAG213/215/216 datasheet
Three versions of the Android app so far:
- ed5fc865e98b33e584860b39cb70ddb6 Amiiqo_1.0.apk
- 44d1ea2fd342c7faa3af81f473eada12 Amiiqo_1.1.apk
- f39a091be603058329b085f1b0382caa Amiiqo_1.2.apk
- d8aa32a1f8b8e62cbd376fc69be47829 com.n2elite.amiiqo_2.0.0.apk
- bf1f6bbdb4692cedf3921026c7e3aa99 com.n2elite.amiiqo_2.0.1.apk
- 506167b77f8860a6a78242022728e82e com.n2elite.amiiqo_2.0.2.apk
Versions 1.1 to 2.0.2 contain the same fw image to update older N2 Elite tags, see below the section about firmware.
Amiibo Resources
Nothing really useful for us but for sake of completion:
- Amiibo tags
- Unofficial sw
- Alternate manager: http://www.maxconsole.com/maxcon_forums/threads/291976-Amiiqo-Manager
- Parsing library: https://github.com/Falco20019/libamiibo
Hardware
Device was sold previously under the name Amiiqo, and they insist this is the same hardware as the N2 Elite. Nevertheless there are apparently two revisions of the product:
- V1, preloaded with 10 amiibo figurines
- V2, empty, and an alien face printed on the PCB
I got a V2.
Patrick Gueulle mentions the QFN24 chip has a mark "SX3" but mine is completely black. Under the microscope he found two references on the die: "G4830H001I" and "DI 503 03".
Pinout:
1 nc 2 nc 3 nc 4 GND 5 -+---15 +---(switch 1) +---(C1 100nF)--- GND 6 nc 7 (antenna 1) 8 nc 9 nc 10 nc 11 nc 12 (antenna 2) 13 nc 14 nc 15 -+--- 5 +---(switch 1) +---(C1 100nF)--- GND 16 -+---(switch 2) +---(R1 2k8)----- GND 17 nc 18 nc 19 nc 20 nc 21 GND 22 GND 23 nc 24 nc
Traces
Let's trace some transactions between the Android app and the device with a Proxmark3.
I've discarded the anticol and HALT/WUPA activities.
Discovery
Rdr | 30 02 10 8b | ok | READBLOCK(2) Tag | ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff | | | 37 cb | ok | Rdr | 60 f8 32 | ok | EV1 VERSION Tag | 00 04 04 02 01 00 11 03 01 9e | ok | Rdr | 55 d6 54 | ok | ? Tag | 00 01 00 03 47 3e | ok | Rdr | 43 61 21 | ok | MAGIC WUPC2 Tag | 21 4b 87 02 52 3d 0d 10 16 3a 24 ff ff ff ff ff | | | e4 e7 | ok | Rdr | 3b 15 16 00 8e a7 | ok | ? Tag | ff ff ff ff ff ff ff ff 5f d2 | ok |
When asking the app to show the tag ID it returns 214b8702523d0d10163a24.
Lock
Rdr | 46 cc 76 | ok | ? Tag | 0a a4 fe | |
Unlock
You need to press the button once the app discovers the tag and maintain it pressed. You've 2 seconds.
Rdr | 44 de 55 | ok | ? 2 secs pause. Rdr | 45 57 44 | ok | ? Tag | 0a a4 fe | |
Update number of banks
When changing the number of available banks from 1 to 2:
Rdr | a9 02 55 45 | ok | ? Tag | 0a a4 fe | |
Now the discovery phase has two such commands:
Rdr | 3b 15 16 00 8e a7 | ok | ? Tag | ff ff ff ff ff ff ff ff 5f d2 | ok |. Rdr | 3b 15 16 01 07 b6 | ok | ? Tag | ff ff ff ff ff ff ff ff 5f d2 | ok |.
Read a dump
Rdr | 30 00 02 a8 | ok | READBLOCK(0) Tag | ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff | |. | 37 cb | ok |. Rdr | 30 04 26 ee | ok | READBLOCK(4) Tag | ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff | |. | 37 cb | ok |. Rdr | 30 08 4a 24 | ok | READBLOCK(8) Tag | ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff | |. | 37 cb | ok |. ... Rdr | 30 80 0a 2c | ok | READBLOCK(128) Tag | ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff | |. | 37 cb | ok |. Rdr | 30 84 2e 6a | ok | READBLOCK(132) Tag | ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff | |. | 37 cb | ok |.
Write a dump
Rdr | 1b ff ff ff ff 63 00 | ok | PWD-AUTH KEY: 0xffffffff Tag | 80 80 64 16 | |. Rdr | a5 00 00 04 c5 a8 e1 69 44 | ok | INCR(0) Tag | 0a a4 fe | |. Rdr | a5 01 00 da aa 2b 80 d9 8d | ok | INCR(1) Tag | 0a a4 fe | |. Rdr | a5 02 00 db 48 00 00 95 62 | ok | INCR(2) Tag | 0a a4 fe | |. Rdr | a5 03 00 e1 10 12 00 e2 15 | ok | INCR(3) Tag | 0a a4 fe | |. Rdr | a5 04 00 01 03 a0 10 17 ce | ok | INCR(4) Tag | 0a a4 fe | |. Rdr | a5 05 00 44 03 00 fe 53 13 | ok | ? Tag | 0a a4 fe | |. Rdr | a5 06 00 00 00 00 00 e0 8a | ok | ? Tag | 0a a4 fe | |. ... Rdr | a5 85 00 ff ff ff ff a6 70 | ok | ? Tag | 0a a4 fe | |. Rdr | a5 86 00 ff ff ff ff db 7c | ok | ? Tag | 0a a4 fe | |.
Commands
We'll present the commands understood so far, exemplified with pn53x-tamashell scripts (to be used with libnfc and a compatible reader)
NTAG Commands
0x60: GET_VERSION
#!/usr/bin/pn53x-tamashell 4a 01 00; Select tag 42 60; Get Version
0x3C: READ_SIG
Read ECC signature of NTAG.
#!/usr/bin/pn53x-tamashell 4a 01 00; Select tag 42 3c; Read ECC signature
0x30: READ
It reads 4 pages (16 bytes) starting from the given page
#!/usr/bin/pn53x-tamashell 4a 01 00; Select tag 42 30 00 42 30 04 42 30 08 42 30 0c ... 42 30 80 42 30 84
0x3A: FAST_READ
Syntax:
3a <start page> <stop page (included)>
Theoretically a bank could be accessed in one single command but it depends on the reader. With libnfc readers, don't read more than 63 pages (252 bytes) at once.
Reading entirely the tag:
#!/usr/bin/pn53x-tamashell 4a 01 00; Select tag 42 3a 00 1f 42 3a 20 3f 42 3a 40 5f 42 3a 60 7f 42 3a 80 86
0xA2: WRITE
Syntax:
a2 <page> <data>
#!/usr/bin/pn53x-tamashell 4a 01 00; Select tag 42 a2 84 01 02 03 04; Write 01020304 page #84
0x1B: PWD_AUTH
Syntax:
1b <4-byte pwd>
N2 returns always 8080
N2 special commands
0x55: N2_GET_INFO
#!/usr/bin/pn53x-tamashell 4a 01 00; Select tag 42 55; Get N2 info
Answer is 4 bytes as seen in the traces above, e.g.:
00 01 00 03
- byte 1: currently active slot
- byte 2: number of active banks
- byte 3: button pressed?
- byte 4: FW version?
It could be that older N2 return only 2 bytes.
0x43: N2_GET_ID
#!/usr/bin/pn53x-tamashell 4a 01 00; Select tag 42 43; Get N2 ID
Answer is 16 bytes as seen in the traces above, e.g.:
21 4b 87 02 52 3d 0d 10 16 3a 24 ff ff ff ff ff
First 11 bytes constitute what's returned as ID by the Android app.
0xA9: N2_SET_BANK_CNT
Syntax:
a9 <nr_of_banks>
#!/usr/bin/pn53x-tamashell 4a 01 00; Select tag 42 a9 c8; Open the 200 banks
0x3B: N2_FAST_READ
Similar to 0x3A FAST_READ but with one extra parameter to specify the bank number so this command can access directly the 200 banks.
Syntax:
3b <start page> <stop page (included)> <bank>
Banks don't need to be active to be accessed.
Theoretically a bank could be accessed in one single command but it depends on the reader. With libnfc readers, don't read more than 63 pages (252 bytes) at once.
#!/usr/bin/pn53x-tamashell 4a 01 00; Select tag 42 3b 00 1f 00; start of bank #0 42 3b 20 3f 00 42 3b 40 5f 00 42 3b 60 7f 00 42 3b 80 86 00 42 3b 87 8f 00; pages above the 540 bytes of bank #0 NTAG215 42 3b 90 af 00; this is actually start of next bank 42 3b 00 1f 01; start of bank #1 42 3b 20 3f 01 42 3b 40 5f 01 42 3b 60 7f 01 42 3b 80 86 01 42 3b 87 8f 01; pages above the 540 bytes of bank #0 NTAG215 42 3b 00 1f 02; start of bank #2 42 3b 20 3f 02 42 3b 40 5f 02 42 3b 60 7f 02 42 3b 80 86 02 42 3b 87 8f 02; pages above the 540 bytes of bank #0 NTAG215 ;etc for remaining 197 banks
This is interesting! Original Android app doesn't care about ECC signature which is left = FFFF..FF but the N2 allows the ECC of a bank to be written via the 8 pages 0x87-0x8e. See command READ_SIG above.
I found no use of page 0x8f so far.
0xA5: N2_WRITE
Similar to 0xA2 WRITE but with one extra parameter to specify the bank number so this command can access directly the 200 banks.
Syntax:
a5 <page> <bank> <data>
Banks don't need to be active to be accessed.
#!/usr/bin/pn53x-tamashell 4a 01 00; Select tag 42 a5 84 00 01 02 03 04; Write 01020304 in bank #00 page #84
0x46: N2_LOCK
#!/usr/bin/pn53x-tamashell 4a 01 00; Select tag 42 46; Lock
Tag should return "0x0a". From now on, special N2 commands are unresponsive.
0x44/0x45: N2_UNLOCK
The procedure seems to be the following: initiate a 0x44, press the button, finalize with 0x45.
#!/usr/bin/pn53x-tamashell 4a 01 00; Select tag 42 44; Prepare unlock // Press N2 button now and keep it pressed for at least 3s p 2000; Pause for 2000ms 4a 01 00; Select tag 42 45; Unlock
The tag will reply with 0x0a if unlock succeeded
0xA7: N2_SELECT_BANK
Selects which bank is the current bank.
Syntax:
a7 <bank>
Tag replies 0x0a
Bank doesn't need to be active to be set as current.
Note: this command was found by brute-force, it's not used by the Android app.
0xAE: N2_FAST_WRITE
Similar to N2_FAST_READ with one parameter to specify the bank number so this command can access directly the 200 banks.
Syntax:
ae <start page> <bank> <size> <data>
Banks don't need to be active to be accessed.
Theoretically a bank could be accessed in one single command but it depends on the reader.
Note: this command is not used by the Android app.
N2 tricks
Swapping banks
One needs to press the button to access the next bank. While this is probably not a problem with the targeted reader, it's harder to get it working systematically from our scripts.
The tricky parts are:
- Of course you need more than a single slot active
- You need to press the button when the tag gets powered, then it can be released
- It works *only* if in the previous session some specific commands were executed, e.g. a FAST_READ (3A)
- Contrary to what I read elsewhere, it works both in LOCKED and UNLOCKED modes
See also N2_SELECT_BANK above.
Test:
#!/usr/bin/pn53x-tamashell 4a 01 00; Select tag 42 a9 10; N2_SET_BANK_CNT activate 16 banks 42 55; N2_GET_INFO -> second byte (so first byte of tag response shows the current bank 42 3a 00 00; FAST_READ, just to make sure things will work // Remove tag now !! p 2000; Pause 2000ms // Press button and bring the tag back while keeping it pressed, then release button 4a 01 00; Select tag 42 55; N2_GET_INFO -> second byte (so first byte of tag response shows the current bank 42 3a 00 00; FAST_READ, just to make sure things will work // Remove tag now !! p 2000; Pause 2000ms // Press button and bring the tag back while keeping it pressed, then release button 4a 01 00; Select tag // etc.
This shows e.g.:
... Tx: 42 55 Rx: 00 00 10 00 03 ... Tx: 42 55 Rx: 00 01 10 01 03 ... Tx: 42 55 Rx: 00 02 10 01 03
ECC
In the N2_FAST_DUMP we saw that it contains additional pages above the 540-byte pages.
Actually some of them are used to store what is returned by the READ_SIG command:
42 3b 87 8e 00; 32-byte ECC signature of bank #0 NTAG215 42 3b 8f 8f 00; 4 unused bytes? 42 3b 87 8e 01; 32-byte ECC signature of bank #0 NTAG215 42 3b 8f 8f 01; 4 unused bytes?
Example:
#!/usr/bin/pn53x-tamashell // Please put N2 Elite on reader NOW 4a 01 00; Select tag 42 a5 87 00 00 01 02 03; Write over bank #0 ECC 42 a5 88 00 04 05 06 07 42 a5 89 00 08 09 0a 0b 42 a5 8a 00 0c 0d 0e 0f 42 a5 8b 00 10 11 12 13 42 a5 8c 00 14 15 16 17 42 a5 8d 00 18 19 1a 1b 42 a5 8e 00 1c 1d 1e 1f 42 3c; Read ECC signature
UID
UID can be changed by writing bytes in the first few pages.
Theoretically first pages contain also BCC0, BCC1 which should be respectively set to:
- BCC0=0x88^UID0^UID1^UID2
- BCC1=UID3^UID4^UID5^UID6
And that's what the Basic programs of Gueulle are doing.
But actually the N2 will handle the anti-collision properly, no matter how BCC0 and BCC1 are defined, as simply as that!
#!/usr/bin/pn53x-tamashell 4a 01 00; Select tag // Write UID ffffffffffffff: 42 a5 00 00 ff ff ff ff; Write in bank #00 page #00 UID0 UID1 UID2 BCC0 42 a5 01 00 ff ff ff ff; Write in bank #00 page #01 UID3 UID4 UID5 UID6 42 a5 02 00 ff ff ff ff; Write in bank #00 page #02 BCC1 Intl Lck1 Lck2 // Write UID 01020304050607: 42 a5 00 00 01 02 03 00; Write in bank #00 page #00 UID0 UID1 UID2 BCC0 42 a5 01 00 04 05 06 07; Write in bank #00 page #01 UID3 UID4 UID5 UID6 42 a5 02 00 00 00 00 00; Write in bank #00 page #02 BCC1 Intl Lck1 Lck2
Interestingly enough, Gueulle has shown that some readers can be fooled when security is based only on UID (typically readers sending a 10-digit serial to the system), even if they are not using NTAG! E.g.:
- ISO14443A
- 7-byte Mifare Ultralight
- 4-byte Mifare Classic
- 7-byte Mifare Classic
- 7-byte Desfire EV1
- etc
- ISO1443B !!
- 4-byte TypeB PUPI
- ISO15693 !!
- 8-byte PicoPass 2K
In the 4-byte cases he simply completes the UID with zeroes and in the 8-byte case, he drops the last one.
ShowID
When Android app discovers a N2 tag, it issues what I call a N2_INFO to see how many banks are active, then it issues commands such as:
42 3b 15 16 00; Read 8 bytes from address 0x15 to address 0x16 bank #0
to discover the ID of the Amiibo figures that are stored, because actually the ID is stored in 8 bytes from page 0x15, so we can also get it from the currently active bank, or from an original figure, with:
42 30 15; Read 16 bytes from address 0x15
Compatibility
- N2 doesn't emulate any of the protections (OTP locks, etc) and everything is always fully RW.
- It seems that N2 doesn't support the following legit commands: COMP_WRITE, READ_CNT.
- N2 accepts the command PWD_AUTH with any password, it doesn't matter. It returns 8080. Android app issues a PWD_AUTH using the first 4 bytes of the UID as password before issuing write commands, but as said it doesn't matter, a PWD_AUTH is even not required by N2 before a WRITE.
Firmware
WARNING all the info in this section are unverified and any wrong attempt could probably brick a N2!
Android apps v1.1 to v2.0.2 the same update.apdu file.
I guess it contains apdus supposed to be played by the N2 reader because the app is truncating the apdus before they get sent.
App starts by sending the following commands: (there could be errors here, be very cautious if you want to try anything here...)
f4 49 9b 99 c3 da 57 71 0a 64 4a 9e f8 a2 30 d9 60; GET_VERSION
Then it sends the CAPDUs without the first 5 bytes (I'm not sure if the last byte=0x00 is still part of the CAPDU or not)
And checks the response from the tag, which should be the usual 90 00.
update.apdu is composed of 22 CAPDUs sending 250 bytes of payload each so the firmware image is 5520-byte long unless some bytes are e.g. a CRC.
Truncated CAPDUs sent to the N2:
55 00 00 0C B0 19 01 BD ... 80 29 69 00 55 00 F0 28 90 82 58 97 ... 38 3F 6B 00 55 01 E0 D5 81 02 C2 76 ... CF 69 7F 00 55 02 D0 BC 13 DB 33 D9 ... A0 14 68 00 ... F3 55 13 B0 35 0F 84 D0 ... A0 44 8D 00 55 14 A0 AA D4 9F 00 ED ... FD A2 13 00
Then a last CAPDU:
F0 15 90 95 A2 F4 93 4F 6F D9 77 00
If we isolate what's supposed to be the payload of those CAPDU ([3:-1]), we get 5520 bytes, of which the last 80 repeat themselves as
05 40 B9 3B DD FD A2 13
It looks like a XOR encryption, but so far even XORed back to get 00 or ff it doesn't make much sense :( to be continued...