X-Git-Url: http://git.rot13.org/?p=goodfet;a=blobdiff_plain;f=client%2Fgoodfet.glitch;h=6750c8fcbedef6cfc64559b770beaea72fe5e6b6;hp=c1b0ceaf4395204231dc3ab1913268b17120e809;hb=671771f8909b6821de8aef5b90f9390ffb648988;hpb=cac3f7817e7022215ab8fdb91daa70bfeddae089 diff --git a/client/goodfet.glitch b/client/goodfet.glitch index c1b0cea..6750c8f 100755 --- a/client/goodfet.glitch +++ b/client/goodfet.glitch @@ -11,8 +11,6 @@ from intelhex import IntelHex16bit, IntelHex; import sqlite3; -glitcher=GoodFETGlitch(); - if(len(sys.argv)==1): print "Usage: %s chip verb [objects]\n" % sys.argv[0]; print "%s avr learn" % sys.argv[0]; @@ -20,6 +18,7 @@ if(len(sys.argv)==1): print "%s avr graph" % sys.argv[0]; print "%s avr graphx11" % sys.argv[0]; print "%s avr points" % sys.argv[0]; + print "%s avr npoints" % sys.argv[0]; print """ This populates a database, glitch.db, with a record of all attempted glitches. Graphs can then be generated from the results, allowing @@ -29,12 +28,13 @@ sequence for a new chip is as follows. On a sample chip for the same model as the target, 1) Run 'goodfet $chip learn' in order to learn the glitching voltages. 2) Run 'goodfet $chip crunch' in order to precompute glitching ranges. -3) Run 'goodfet $chip explore' to find a time at which to glitch. +3) Run 'goodfet $chip explore [tstart tstop]' to find a time at which to glitch. Then on a chip to be extracted, 3) Run 'goodfet $chip exploit' to exploit a chip and recover its firmware.""" sys.exit(); +glitcher=GoodFETGlitch(); if(sys.argv[2]=="graphx11"): glitcher.graphx11(); @@ -45,6 +45,9 @@ if(sys.argv[2]=="graph"): if(sys.argv[2]=="points"): glitcher.points(); exit(); +if(sys.argv[2]=="rangepoints"): + glitcher.rpoints(); + exit(); if(sys.argv[2]=="crunch"): glitcher.crunch(); @@ -55,7 +58,11 @@ glitcher.setup(sys.argv[1]); if(sys.argv[2]=="learn"): glitcher.learn(); if(sys.argv[2]=="explore"): - glitcher.explore(); + times=None; + if(len(sys.argv)>=4): + times=range(int(sys.argv[3]), + int(sys.argv[4])); + glitcher.explore(times); if(sys.argv[2]=="exploit"): print "Coming soon.";