Back to Proxmark3

Jooki Figurine Notes

doc/jooki_notes.md

4.92376.5 KB
Original Source

Jooki Figurine Notes

<a id="top"></a>

Table of Contents

Jooki proxmark commands

^Top

You can encode, decode a NDEF record, write with clone a record to a card or simulate withsim.

Decoding NDEF URL parameter

^Top

hf jooki decode -d g+t07s57aX1bB6tk

Encoding NDEF record

^Top

You can either use figurine abbreviation arguments:

    --dragon 
    --fox   
    --ghost
    --knight 
    --whale   
    --blackdragon   
    --blackfox     
    --blackknight 
    --blackwhale 
    --whitedragon 
    --whitefox    
    --whiteknight 
    --whitewhale 

Or pass directly the figurine type id --tid and figurine id --fid

Example encoding NDEF record for UID 04010203040506

hf jooki encode --uid 04010203040506 --tid 1 --fid 1

or use --dragon parameter to achieve the same:

hf jooki encode --uid 04010203040506 --dragon

Output:

[=] Encoded URL.. 67 2B 74 30 37 73 35 37 61 58 31 62  ( g+t07s57aX1bB6tk )
[=] Figurine..... 01 00 - Figurine, Dragon
[=] iv........... 80 77 51 
[=] uid.......... 04 01 02 03 04 05 06 
[=] NDEF raw..... 0103A00C340329D101255504732E6A6F6F6B692E726F636B732F732F3F733D672B743037733537615831624236746B0AFE000000

Use -r parameter to read UID directly from tag.

Simulation

^Top

To simulate the above figurine use the encoded URL parameter given in encode output and type following command into your proxmark:

hf jooki sim -b g+t07s57aX1bB6tk

If no parameter is given to the simulation command, last loaded dump is used.

Cloning to a NTAG213 tag

^Top

    hf jooki clone [-h] [-b <base64>] [-d <hex>] [-p <hex>]

options:
    -h, --help                     This help
    -b, --b64 <base64>             base64 url parameter
    -d, --data <hex>               raw NDEF bytes
    -p, --pwd <hex>                password for authentication (EV1/NTAG 4 bytes)

examples/notes:
    hf jooki clone -d <hex bytes>  -> where hex is raw NDEFhf jooki clone --b64 7WzlgEzqLgwTnWNy --> using base64 url parameter

Use either the above NDEF raw output from encode to write a new record to a tag:

hf jooki clone -d 0103A00C340329D101255504732E6A6F6F6B692E726F636B732F732F3F733D672B743037733537615831624236746B0AFE000000

or use the base64 encoded parameter to clone:

`hf jooki clone -b A5wlbrkq6QoKh9w1

Note: Jooki doesn't like more than one NDEF record, so make sure you just have one. Check with hf mfu ndefread

List of known figurine types

^Top

ValueFigurine Type
01Stones
02Generic Flat
03System Commands
04Tests
Figurine TypeFigurine IDFigurine
0100狐狸 Fox
0101龙 Dragon
0102骑士 Knight
0103鬼 Ghost
0104鲸 Whale
0105ThankYou
0106Black.Fox
0107Black.Dragon
0108Black.Whale
0109Black.Knight
010aWhite.Fox
010bWhite.Dragon
010cWhite.Whale
010dWhite.Knight
02Generic Flat
0200圆盘 Generic Flat
0201unknown_0201
03System Commands
0300sys.record
0301sys.factory_mode_on
0302sys.factory_mode_off
0303sys.airplane_mode_on
0304sys.airplane_mode_off
0305sys.toy_safe_on
0306sys.toy_safe_off
0307sys.wifi_on
0308sys.wifi_off
0309sys.bt_on
030asys.bt_off
030bsys.production_finished
04Tests
0400Hello test.0
0401Hello test.1
0402Hello test.2
0403Hello test.3
0404Hello test.4
0405Hello test.5
0406Hello test.6
0407Hello test.7
0408Hello test.8
0409Hello test.9
040aHello unknown_040A
0410Hello test.10
0411Hello test.11
0412Hello test.12
0413Hello test.13
0414Hello test.14
0415Hello test.15
0416Hello test.16
0417Hello test.17
0418Hello test.18
0419Hello test.19