Using Proxmark3 RDV4.01
Installation: Installing proxmark3 RDV4.01 in Kali
Basic commands
| # The prompt will have this appearance
[usb] pm3 -->
# Display help and commands
help
# Close the client
quit
|
To get an overview of the available commands for LF RFID and HF RFID:
| [usb] pm3 --> lf
[usb] pm3 --> hf
|
To search quickly for known LF or HF tags:
| [usb] pm3 --> lf search
[usb] pm3 --> hf search
|
To get info on a ISO14443-A tag:
| [usb] pm3 --> hf 14a info
|
Read and write:
| # Read sector 1 with key FFFFFFFFFFFF
hf mf rdsc -s 1 -k FFFFFFFFFFFF
# Read block 13 with key FFFFFFFFFFFF
hf mf rdbl --blk 13 -k FFFFFFFFFFFF
# Write block 8 with key a FFFFFFFFFFFF
hf mf wrbl --blk 8 -a -k FFFFFFFFFFFF -d FFFFFFFFFFFF7F078800FFFFFFFFFFFF
|
Getting keys
| # Check all sectors, all keys, 1K, and write to file
hf mf chk --1k --dump
# Check for default keys:
hf mf chk --1k -f mfc_default_keys
# Check dictionary against block 0, key A
hf mf chk -a --tblk 0 -f mfc_default_keys.dic
# Run autopwn, to extract all keys and backup a MIFARE Classic tag
hf mf autopwn
hf mf nested --1k --blk 0 -a -k FFFFFFFFFFFF --dump
# Dump MIFARE Classic card contents:
hf mf dump
hf mf dump --1k -k hf-mf-A29558E4-key.bin -f hf-mf-A29558E4-dump.bin
# Write to MIFARE Classic block:
hf mf wrbl --blk 0 -k FFFFFFFFFFFF -d d3a2859f6b880400c801002000000016
# Bruteforce MIFARE Classic card numbers from 11223344 to 11223346:
script run hf_mf_uidbruteforce -s 0x11223344 -e 0x11223346 -t 1000 -x mfc
# Bruteforce MIFARE Ultralight EV1 card numbers from 11223344556677 to 11223344556679
script run hf_mf_uidbruteforce -s 0x11223344556677 -e 0x11223344556679 -t 1000 -x mfu
|
Next steps
Last update: 2024-04-07
Created: April 7, 2024 18:53:53