Proxmark - versatile standard tool

Table of Contents

Proxmark, what is that?

The Proxmark3 is an RFID tool that can interact with the vast majority of the world's RFID tags and systems at both high and low frequency.

Originally developed by Jonathan Westhues more than 10 years ago, the device has gradually established itself as the standard tool for RFID analysis.

Proxmark3 RDV2 kit
www.hackmod.de/Cubie-Truck

Due to its versatility, it has been adapted to many industries and uses: from RFID enthusiasts to academic research and product development to law enforcement and penetration testing .

The hardware and software have been developed rapidly in recent years, which has led to mature and miniaturized versions of the hardware. There are versions that are optimized for on-site use, e.g. B. for Red teaming or pen tests, and desktop versions optimized for research in the office or in the lab.

It's hard to imagine everyday life without RFID tags, among other things they are used for access controls or in passports as a digital memory for passport photos and fingerprints, as a chip in cards or mobile phones for contactless payment, to identify lost pets and much more.

You want to see the consequences of a successful hacker attack
Spare your IT system?
Test your IT now with a professional penetration test!
For the penetration test

For whom is the Proxmark interesting?

Penetration Tester: The miniature size of the latest Proxmark3 together with its standalone mode and Android-based tools make it the ideal tool for testing, sniffing, replaying and cloning in red teaming environments.

Development: Access to low-level sniffing, logging, demodulation and replay tools makes the Proxmark an essential tool for anyone developing any product or service in the RFID space.

Research: Proxmark is the tool behind all major breakthroughs in RFID security research: Mifare Classic Crypto Cracking, Mifare PRNG Analysis, VingCard Exploitation & Defeat to name a few.

RFID Enthusiast: The Proxmark is on the desks of thousands of hobbyists, hackers, and manufacturers worldwide. Its comprehensive code base enables easy reading, writing, cloning, cracking and emulating of RFID.

Increase the security of your IT system now!
You will receive detailed advice from us!
Contact us now

How can I use the Proxmark?

This example uses MacOS and the Proxmark3 RDV2

Proxmark3 setup

We will first use Homebrew to install the software for the Proxmark.

Add homebrew tap

				
					brew tap proxmark/proxmark3
				
			

Proxmark 3 installation:

				
					brew install proxmark3


				
			

Hold down the button on the side of the Proxmark3 during the next step and make sure lights A and C flash while you press the button.

				
					Check ls /dev/tty.* for /dev/tty.usbmodemiceman1
				
			

Flash Firmware

				
					sudo proxmark3-flasher /dev/tty.usbmodemiceman1 /usr/local/share/firmware/fullimage.elf
				
			

Connect to Proxmark3

				
					proxmark3 /dev/tty.usbmodem141301
				
			

Read, clone and simulate RFID chips

In the next step, we use the following command to examine what type of RFID chip we have in front of us.

				
					lf search
				
			

In this case we scanned an EM4X chip. This is mostly used as a token for access control.
In the next step we will copy the chip.

				
					lf read
				
			

Now we can use this command to simulate the chip with the Proxmark3

				
					lf sim
				
			

Now we can also clone the chip. As before, we read the chip with the following command.

				
					lf em 410xread 1
				
			

Now we read the blank writable chip that we want to copy our scanned EM ID to.

After that, we can then write the new EM ID on it as shown in the screenshot below.
We will use 12345678 as NEW EM ID.

				
					lf em 410xread 1
lf em 410xwrite 12345678 1
				
			
Newsletter Form

Become a Cyber ​​Security Insider

Get early access and exclusive content!


By signing up, you agree to receive occasional marketing emails from us.
Please accept the cookies at the bottom of this page to be able to submit the form!
OTHER CONTRIBUTIONS

Table of Contents

PSN_KU_Cover
NewsLetter Form Pop Up New

Become a Cyber ​​Security Insider

Subscribe to our knowledge base and get:

Early access to new blog posts
Exclusive content
Regular updates on industry trends and best practices


By signing up, you agree to receive occasional marketing emails from us.
Please accept the cookies at the bottom of this page to be able to submit the form!