From 3b2b569f0ddfa93ed7e141136e8d8ca7918d73c7 Mon Sep 17 00:00:00 2001 From: Romuald Conty Date: Wed, 18 May 2011 15:01:44 +0000 Subject: [PATCH] add manpage (Thanks to Thomas Hood) --- src/Makefile.am | 2 +- src/mfoc.1 | 41 +++++++++++++++++++++++++++++++++++++++++ 2 files changed, 42 insertions(+), 1 deletion(-) create mode 100644 src/mfoc.1 diff --git a/src/Makefile.am b/src/Makefile.am index 142cd16..dc0772a 100644 --- a/src/Makefile.am +++ b/src/Makefile.am @@ -6,4 +6,4 @@ bin_PROGRAMS = mfoc noinst_HEADERS = crapto1.h mfoc.h mifare.h nfc-utils.h mfoc_SOURCES = crapto1.c crypto1.c mfoc.c mifare.c nfc-utils.c -# dist_man_MANS = mfoc.1 +dist_man_MANS = mfoc.1 diff --git a/src/mfoc.1 b/src/mfoc.1 new file mode 100644 index 0000000..f59d0eb --- /dev/null +++ b/src/mfoc.1 @@ -0,0 +1,41 @@ +.\" Hey, EMACS: -*- nroff -*- +.TH MFOC 1 "May 13, 2011" +.SH NAME +mfoc \- MIFARE Classic offline cracker +.SH SYNOPSIS +.B mfoc +[ \fB\-h\fP ] +[ \fB\-k\fP \fIKEY\fR ]... +[ \fB\-O\fP \fIFILE\fR ] +[ \fB\-P\fP \fINUM\fR ] +[ \fB\-T\fP \fINUM\fR ] +.SH DESCRIPTION +This manual page documents briefly the +.B mfoc +command. +.PP +\fBmfoc\fP is a program that cracks the encryption of a MIFARE Classic chip and dumps the chip's keys and decrypted memory contents to a file. +To run it you need to have access to an NFC reader and, of course, a card equipped with a MIFARE Classic chip. +.SH OPTIONS +A summary of options is included below. +.TP +\fB\-h\fP +Show summary of options. +.TP +\fB\-k\fP \fIKEY\fR +Initially try KEY in addition to the default keys. +.TP +\fB\-O\fP \fIFILE\fR +Dump card contents to FILE. +.TP +\fB\-P\fP \fINUM\fR +Probe each sector up to NUM times. Default is 20. +.TP +\fB\-T\fP \fINUM\fR +Set half the range for a possible distance tolerance to NUM. Default is 20 (for a total range of 40). +.SH AUTHOR +.B mfoc +was written by Norbert Szetei and Pavol Luptak with contributions by others. +.PP +This manual page was written by Thomas Hood . +MIFARE is a trade mark of NXP bv, Netherlands.