EM
# Cloning EM410x proxmark3>lf readproxmark3>data samples 30000proxmark3>lf em4x em410xreadproxmark3> lf em4x em410xsim 0DEADBEEF0 proxmark3>lf em4x em410xwrite 0DEADBEEF0 1# Bruteforcing UID - https://github.com/mtongsang/pm3Bruter $./proxmark3 /dev/cu.usbmodem1411 -b -m 3 -c 256 -t 1122334455
Mifare classic 1k
# Key A for sector 0 proxmark3>hf mf mifare# Keys A/B for all sectors proxmark3>hf mf nested 1 0 A a0a1a2a3a4a5 d# Dumping and reading stored data proxmark3>hf mf dumpproxmark3>script run htmldump$xxd dumpkeys.bin$xxd dumpdata.bin# Reading and writing blocks and sectors proxmark3>hf mf rdbl 0 A a0a1a2a3a4a5proxmark3>hf mf rdsc 0 A a0a1a2a3a4a5proxmark3>hf mf wrbl 0 A a0a1a2a3a4a50300e5c81c0eec00000000004d494300# Cloning a dumped tag (dumpdata.bin) using a magic chinnese card proxmark3>hf mf csetuid 86bcfe41proxmark3>hf mf restore# Simulating a tag proxmark3>hf 14a readerproxmark3>hf 14a sim 1 11223344
Pyramid
# Cloning: read raw data proxmark3>lf search# Cloning: write raw data proxmark3>lf t55xx write b 0 d 00107080proxmark3>lf t55xx write b 1 d 11111111proxmark3>lf t55xx write b 2 d 22222222proxmark3>lf t55xx write b 3 d 33333333proxmark3>lf t55xx write b 4 d 44444444
No comments:
Post a Comment