Proxmark 3

Support HackTricks

Try Hard Security Group


Kuashiria Mifumo ya RFID kwa Proxmark3

Jambo la kwanza unahitaji kufanya ni kuwa na Proxmark3 na kufunga programu na utegemezi wakes.

Kuashiria MIFARE Classic 1KB

Ina sehemu 16, kila moja ina blocks 4 na kila block ina 16B. UID iko katika sehemu 0 block 0 (na haiwezi kubadilishwa). Ili kufikia kila sehemu unahitaji funguo 2 (A na B) ambazo zimehifadhiwa katika block 3 ya kila sehemu (sehemu trailer). Sehemu trailer pia inahifadhi bit za ufikiaji ambazo zinatoa ruhusa za kusoma na kuandika kwenye kila block kwa kutumia funguo 2. Funguo 2 ni muhimu kutoa ruhusa za kusoma ikiwa unajua ya kwanza na kuandika ikiwa unajua ya pili (kwa mfano).

Mashambulizi kadhaa yanaweza kufanywa

proxmark3> hf mf #List attacks

proxmark3> hf mf chk *1 ? t ./client/default_keys.dic #Keys bruteforce
proxmark3> hf mf fchk 1 t # Improved keys BF

proxmark3> hf mf rdbl 0 A FFFFFFFFFFFF # Read block 0 with the key
proxmark3> hf mf rdsc 0 A FFFFFFFFFFFF # Read sector 0 with the key

proxmark3> hf mf dump 1 # Dump the information of the card (using creds inside dumpkeys.bin)
proxmark3> hf mf restore # Copy data to a new card
proxmark3> hf mf eload hf-mf-B46F6F79-data # Simulate card using dump
proxmark3> hf mf sim *1 u 8c61b5b4 # Simulate card using memory

proxmark3> hf mf eset 01 000102030405060708090a0b0c0d0e0f # Write those bytes to block 1
proxmark3> hf mf eget 01 # Read block 1
proxmark3> hf mf wrbl 01 B FFFFFFFFFFFF 000102030405060708090a0b0c0d0e0f # Write to the card

The Proxmark3 allows to perform other actions like eavesdropping a Tag to Reader communication to try to find sensitive data. In this card you could just sniff the communication with and calculate the used key because the cryptographic operations used are weak and knowing the plain and cipher text you can calculate it (mfkey64 tool).

Raw Commands

Mifumo ya IoT wakati mwingine hutumia nonbranded or noncommercial tags. Katika kesi hii, unaweza kutumia Proxmark3 kutuma raw commands to the tags.

proxmark3> hf search UID : 80 55 4b 6c ATQA : 00 04
SAK : 08 [2]
TYPE : NXP MIFARE CLASSIC 1k | Plus 2k SL1
proprietary non iso14443-4 card found, RATS not supported
No chinese magic backdoor command detected
Prng detection: WEAK
Valid ISO14443A Tag Found - Quiting Search

Kwa habari hii unaweza kujaribu kutafuta taarifa kuhusu kadi na kuhusu njia ya kuwasiliana nayo. Proxmark3 inaruhusu kutuma amri za moja kwa moja kama: hf 14a raw -p -b 7 26

Scripts

Programu ya Proxmark3 inakuja na orodha iliyopakiwa awali ya scripts za automatisering ambazo unaweza kutumia kufanya kazi rahisi. Ili kupata orodha kamili, tumia amri ya script list. Kisha, tumia amri ya script run, ikifuatiwa na jina la script:

proxmark3> script run mfkeys

You can create a script to fuzz tag readers, so copying the data of a valid card just write a Lua script that randomize one or more random bytes and check if the reader crashes with any iteration.

Jaribu Hard Security Group

Support HackTricks

Last updated