2019-08-18 17:53:20 +08:00
|
|
|
<a id="Top"></a>
|
2020-05-19 16:17:46 +08:00
|
|
|
# Command Cheat Sheet
|
2019-08-18 17:53:20 +08:00
|
|
|
|
2020-10-23 07:24:54 +08:00
|
|
|
|Generic|Low Frequency 125 kHz|High Frequency 13.56 MHz|
|
2019-08-16 17:20:06 +08:00
|
|
|
|---|---|---|
|
2020-07-23 17:47:16 +08:00
|
|
|
|[Generic](#Generic)|[T55XX](#T55XX)|[MIFARE](#MIFARE)|
|
|
|
|
|[Data](#Data)|[HID Prox](#HID-Prox)|[iCLASS](#iCLASS)|
|
2019-08-16 17:22:47 +08:00
|
|
|
|[Memory](#Memory)|[Indala](#Indala)||
|
|
|
|
|[Sim Module](#Sim-Module)|[Hitag](#Hitag)||
|
|
|
|
|[Lua Scripts](#Lua-Scripts)|||
|
|
|
|
|[Smart Card](#Smart-Card)|||
|
2019-09-20 19:19:19 +08:00
|
|
|
|[Wiegand convertion](#Wiegand-manipulation)|||
|
2019-08-16 07:20:57 +08:00
|
|
|
|
2019-08-13 04:24:33 +08:00
|
|
|
## Generic
|
2019-08-18 17:53:20 +08:00
|
|
|
^[Top](#top)
|
2019-08-13 04:24:33 +08:00
|
|
|
|
|
|
|
Identify High Frequency cards
|
|
|
|
```
|
|
|
|
pm3 --> hf search
|
|
|
|
```
|
|
|
|
|
|
|
|
Identify Low Frequency cards
|
|
|
|
```
|
|
|
|
pm3 --> lf search
|
|
|
|
```
|
|
|
|
|
|
|
|
Measure antenna characteristics, LF/HF voltage should be around 20-45+ V
|
|
|
|
```
|
|
|
|
pm3 --> hw tune
|
|
|
|
```
|
|
|
|
|
|
|
|
Check versioning
|
|
|
|
```
|
|
|
|
pm3 --> hw version
|
|
|
|
```
|
|
|
|
|
2019-08-16 07:20:57 +08:00
|
|
|
Check overall status
|
|
|
|
```
|
|
|
|
pm3 --> hw status
|
|
|
|
```
|
|
|
|
|
2020-07-23 17:47:16 +08:00
|
|
|
## iCLASS
|
2019-08-18 17:53:20 +08:00
|
|
|
^[Top](#top)
|
2019-08-13 04:24:33 +08:00
|
|
|
|
2020-07-23 17:47:16 +08:00
|
|
|
Reverse permute iCLASS master key
|
2019-08-13 04:24:33 +08:00
|
|
|
```
|
|
|
|
Options
|
|
|
|
---
|
2020-10-06 21:03:24 +08:00
|
|
|
-r --reverse : reverse permuted key
|
|
|
|
--key <bytes> : input key
|
2019-08-13 04:24:33 +08:00
|
|
|
|
2020-10-06 21:03:24 +08:00
|
|
|
pm3 --> hf iclass permute --reverse --key 3F90EBF0910F7B6F
|
2019-08-13 04:24:33 +08:00
|
|
|
```
|
|
|
|
|
2020-07-23 17:47:16 +08:00
|
|
|
iCLASS Reader
|
|
|
|
|
2019-08-13 04:24:33 +08:00
|
|
|
```
|
|
|
|
pm3 --> hf iclass reader
|
|
|
|
```
|
|
|
|
|
2020-07-23 17:47:16 +08:00
|
|
|
Dump iCLASS card contents
|
2019-08-13 04:24:33 +08:00
|
|
|
```
|
|
|
|
Options
|
|
|
|
---
|
2020-11-26 03:02:52 +08:00
|
|
|
-f, --file <filename> filename to save dump to
|
2020-11-26 13:34:30 +08:00
|
|
|
-k, --key <hex> debit key as 16 hex symbols OR NR/MAC for replay
|
|
|
|
--ki <dec> debit key index to select key from memory 'hf iclass managekeys'
|
|
|
|
--credit <hex> credit key as 16 hex symbols
|
|
|
|
--ci <dec> credit key index to select key from memory 'hf iclass managekeys'
|
2020-11-26 03:02:52 +08:00
|
|
|
--elite elite computations applied to key
|
|
|
|
--raw raw, the key is interpreted as raw block 3/4
|
|
|
|
--nr replay of NR/MAC
|
2019-08-13 04:24:33 +08:00
|
|
|
|
2020-11-26 03:02:52 +08:00
|
|
|
pm3 --> hf iclass dump --ki 0
|
2019-08-13 04:24:33 +08:00
|
|
|
```
|
|
|
|
|
2020-07-23 17:47:16 +08:00
|
|
|
Read iCLASS Block
|
2019-08-13 04:24:33 +08:00
|
|
|
```
|
|
|
|
Options
|
|
|
|
---
|
2020-11-26 13:34:30 +08:00
|
|
|
-k, --key <hex> Access key as 16 hex symbols
|
|
|
|
-b, --block <dec> The block number to read as an integer
|
|
|
|
--ki <dec> Key index to select key from memory 'hf iclass managekeys'
|
2020-11-26 10:16:08 +08:00
|
|
|
--credit key is assumed to be the credit key
|
|
|
|
--elite elite computations applied to key
|
|
|
|
--raw no computations applied to key (raw)
|
|
|
|
--nr replay of NR/MAC
|
2019-08-13 04:24:33 +08:00
|
|
|
|
2020-11-26 10:16:08 +08:00
|
|
|
pm3 --> hf iclass rdbl -b 7 --ki 0
|
2019-08-13 04:24:33 +08:00
|
|
|
```
|
|
|
|
|
2020-07-23 17:47:16 +08:00
|
|
|
Write to iCLASS Block
|
2019-08-13 04:24:33 +08:00
|
|
|
```
|
|
|
|
Options
|
|
|
|
---
|
2020-11-26 13:34:30 +08:00
|
|
|
-k, --key <hex> Access key as 16 hex symbols
|
|
|
|
-b, --block <dec> The block number to read as an integer
|
|
|
|
-d, --data <hex> data to write as 16 hex symbols
|
|
|
|
--ki <dec> Key index to select key from memory 'hf iclass managekeys'
|
|
|
|
--credit key is assumed to be the credit key
|
|
|
|
--elite elite computations applied to key
|
|
|
|
--raw no computations applied to key (raw)
|
|
|
|
--nr replay of NR/MAC
|
2019-08-13 04:24:33 +08:00
|
|
|
|
2020-11-26 13:11:54 +08:00
|
|
|
pm3 --> hf iclass wrbl -b 7 -d 6ce099fe7e614fd0 --ki 0
|
2019-08-13 04:24:33 +08:00
|
|
|
```
|
|
|
|
|
|
|
|
Print keystore
|
|
|
|
```
|
|
|
|
Options
|
|
|
|
---
|
2020-11-28 07:27:02 +08:00
|
|
|
-p, --print Print keys loaded into memory
|
2019-08-13 04:24:33 +08:00
|
|
|
|
2020-11-28 07:27:02 +08:00
|
|
|
|
|
|
|
pm3 --> hf iclass managekeys -p
|
2019-08-13 04:24:33 +08:00
|
|
|
```
|
|
|
|
|
|
|
|
Add key to keystore [0-7]
|
|
|
|
```
|
|
|
|
Options
|
|
|
|
---
|
2020-11-28 07:27:02 +08:00
|
|
|
-f, --file <filename> Specify a filename to use with load or save operations
|
|
|
|
--ki <dec> Specify key index to set key in memory
|
2019-08-13 04:24:33 +08:00
|
|
|
|
2020-11-28 07:27:02 +08:00
|
|
|
pm3 --> hf iclass managekeys --ki 3 -k AFA785A7DAB33378
|
2019-08-13 04:24:33 +08:00
|
|
|
```
|
|
|
|
|
2020-07-23 17:47:16 +08:00
|
|
|
Encrypt iCLASS Block
|
|
|
|
```
|
|
|
|
Options
|
|
|
|
---
|
2020-11-26 13:34:30 +08:00
|
|
|
-d, --data <hex> data to encrypt
|
|
|
|
-k, --key <hex> 3DES transport key
|
2020-11-24 04:42:32 +08:00
|
|
|
-v, --verbose verbose output
|
2020-07-23 17:47:16 +08:00
|
|
|
|
2020-11-24 04:42:32 +08:00
|
|
|
pm3 --> hf iclass encrypt -d 0000000f2aa3dba8
|
2020-07-23 17:47:16 +08:00
|
|
|
```
|
|
|
|
|
|
|
|
Decrypt iCLASS Block / file
|
2019-08-13 04:24:33 +08:00
|
|
|
```
|
2020-07-23 17:47:16 +08:00
|
|
|
Options
|
|
|
|
---
|
2020-11-24 03:46:07 +08:00
|
|
|
-f, --file <filename> filename of dumpfile
|
2020-11-26 13:34:30 +08:00
|
|
|
-d, --data <hex> 3DES encrypted data
|
|
|
|
-k, --key <hex> 3DES transport key
|
2020-11-24 03:46:07 +08:00
|
|
|
-v, --verbose verbose output
|
2020-07-23 17:47:16 +08:00
|
|
|
|
2020-11-24 03:46:07 +08:00
|
|
|
pm3 --> hf iclass decrypt -d 2AD4C8211F996871
|
|
|
|
pm3 --> hf iclass decrypt -f hf-iclass-db883702f8ff12e0.bin
|
2019-08-13 04:24:33 +08:00
|
|
|
```
|
|
|
|
|
2020-07-23 17:47:16 +08:00
|
|
|
Load iCLASS dump into memory for simulation
|
2019-08-13 04:24:33 +08:00
|
|
|
```
|
|
|
|
Options
|
|
|
|
---
|
2021-01-05 05:22:32 +08:00
|
|
|
-f, --file <filename> filename of dump
|
|
|
|
--json load JSON type dump
|
|
|
|
--eml load EML type dump
|
2019-08-13 04:24:33 +08:00
|
|
|
|
2020-11-02 09:10:13 +08:00
|
|
|
pm3 --> hf iclass eload -f hf-iclass-db883702f8ff12e0.bin
|
2019-08-13 04:24:33 +08:00
|
|
|
```
|
|
|
|
|
2020-07-23 17:47:16 +08:00
|
|
|
Clone iCLASS Legacy Sequence
|
|
|
|
```
|
2020-11-26 10:16:08 +08:00
|
|
|
pm3 --> hf iclass rdbl -b 7 --ki 0
|
2020-11-26 13:11:54 +08:00
|
|
|
pm3 --> hf iclass wrbl -b 7 -d 6ce099fe7e614fd0 --ki 0
|
2020-07-23 17:47:16 +08:00
|
|
|
```
|
|
|
|
|
|
|
|
Simulate iCLASS
|
2019-08-13 04:24:33 +08:00
|
|
|
```
|
|
|
|
Options
|
|
|
|
---
|
2020-11-28 10:22:23 +08:00
|
|
|
-t, --type <int> Simulation type to use
|
|
|
|
--csn <hex> Specify CSN as 8 bytes (16 hex symbols) to use with sim type 0
|
|
|
|
Types:
|
|
|
|
0 simulate the given CSN
|
2019-08-13 04:24:33 +08:00
|
|
|
1 simulate default CSN
|
2020-03-28 22:05:52 +08:00
|
|
|
2 Runs online part of LOCLASS attack
|
2019-08-13 04:24:33 +08:00
|
|
|
3 Full simulation using emulator memory (see 'hf iclass eload')
|
2020-03-28 22:05:52 +08:00
|
|
|
4 Runs online part of LOCLASS attack against reader in keyroll mode
|
2019-08-13 04:24:33 +08:00
|
|
|
|
2020-11-28 10:22:23 +08:00
|
|
|
pm3 --> hf iclass sim -t 3
|
2019-08-13 04:24:33 +08:00
|
|
|
```
|
|
|
|
|
2020-07-23 17:47:16 +08:00
|
|
|
Simulate iCLASS Sequence
|
2019-08-13 04:24:33 +08:00
|
|
|
```
|
2020-11-26 03:02:52 +08:00
|
|
|
pm3 --> hf iclass dump --ki 0
|
2020-11-02 09:10:13 +08:00
|
|
|
pm3 --> hf iclass eload -f hf-iclass-db883702f8ff12e0.bin
|
2020-11-28 10:22:23 +08:00
|
|
|
pm3 --> hf iclass sim -t 3
|
2019-08-13 04:24:33 +08:00
|
|
|
```
|
|
|
|
|
2020-07-23 17:47:16 +08:00
|
|
|
Extract custom iCLASS key (loclass attack)
|
2019-08-13 04:24:33 +08:00
|
|
|
```
|
|
|
|
Options
|
|
|
|
---
|
2021-01-05 05:14:58 +08:00
|
|
|
-f <filename> specify a filename to clone from
|
|
|
|
-k <key> Access Key as 16 hex symbols or 1 hex to select key from memory
|
|
|
|
--elite Elite computations applied to key
|
2019-08-13 04:24:33 +08:00
|
|
|
|
2020-11-28 10:22:23 +08:00
|
|
|
pm3 --> hf iclass sim -t 2
|
2020-11-02 10:02:51 +08:00
|
|
|
pm3 --> hf iclass loclass -f iclass_mac_attack.bin
|
2020-11-28 10:22:23 +08:00
|
|
|
pm3 --> hf iclass managekeys --ki 7 -k <Kcus>
|
2020-11-26 03:02:52 +08:00
|
|
|
pm3 --> hf iclass dump --ki 7 --elite
|
2019-08-13 04:24:33 +08:00
|
|
|
```
|
|
|
|
|
2020-07-23 17:47:16 +08:00
|
|
|
Verify custom iCLASS key
|
2019-08-13 16:48:56 +08:00
|
|
|
```
|
|
|
|
Options
|
|
|
|
---
|
2020-11-28 09:28:23 +08:00
|
|
|
-f, --file <filename> Dictionary file with default iclass keys
|
|
|
|
--csn <hex> Specify CSN as 8 bytes (16 hex symbols)
|
|
|
|
--epurse <hex> Specify ePurse as 8 bytes (16 hex symbols)
|
|
|
|
--macs <hex> MACs
|
|
|
|
--raw no computations applied to key (raw)
|
|
|
|
--elite Elite computations applied to key
|
2019-08-13 16:48:56 +08:00
|
|
|
|
2020-11-28 09:28:23 +08:00
|
|
|
pm3 --> hf iclass lookup --csn 010a0ffff7ff12e0 --epurse feffffffffffffff --macs 66348979153c41b9 -f iclass_default_keys --elite
|
2019-08-13 16:48:56 +08:00
|
|
|
```
|
|
|
|
|
2020-07-23 17:47:16 +08:00
|
|
|
## MIFARE
|
2019-08-18 17:53:20 +08:00
|
|
|
^[Top](#top)
|
2019-08-13 04:24:33 +08:00
|
|
|
|
|
|
|
Check for default keys
|
|
|
|
```
|
|
|
|
Options
|
|
|
|
---
|
2021-02-14 03:37:47 +08:00
|
|
|
-k, --key <hex> Key specified as 12 hex symbols
|
|
|
|
--blk <dec> Input block number
|
2021-02-14 10:03:57 +08:00
|
|
|
-a Target Key A, if found also check Key B for duplicate
|
|
|
|
-b Target Key B
|
|
|
|
-*, --all Target both key A & B (default)
|
2021-02-14 03:37:47 +08:00
|
|
|
--mini MIFARE Classic Mini / S20
|
2021-02-14 10:03:57 +08:00
|
|
|
--1k MIFARE Classic 1k / S50 (default)
|
2021-02-14 03:37:47 +08:00
|
|
|
--2k MIFARE Classic/Plus 2k
|
|
|
|
--4k MIFARE Classic 4k / S70
|
|
|
|
--emu Fill simulator keys from found keys
|
2021-02-14 10:03:57 +08:00
|
|
|
--dump Dump found keys to binary file
|
2021-02-14 03:37:47 +08:00
|
|
|
-f, --file <filename> filename of dictionary
|
|
|
|
|
2021-02-14 10:03:57 +08:00
|
|
|
pm3 --> hf mf chk --1k -f mfc_default_keys
|
2019-08-13 04:24:33 +08:00
|
|
|
```
|
|
|
|
|
2019-08-16 07:20:57 +08:00
|
|
|
Check for default keys from local memory
|
|
|
|
```
|
|
|
|
Options
|
|
|
|
---
|
2021-02-14 10:03:57 +08:00
|
|
|
-k, --key <hex> Key specified as 12 hex symbols
|
|
|
|
--mini MIFARE Classic Mini / S20
|
|
|
|
--1k MIFARE Classic 1k / S50 (default)
|
|
|
|
--2k MIFARE Classic/Plus 2k
|
|
|
|
--4k MIFARE Classic 4k / S70
|
|
|
|
--emu Fill simulator keys from found keys
|
|
|
|
--dump Dump found keys to binary file
|
|
|
|
--mem Use dictionary from flashmemory
|
|
|
|
-f, --file <filename> filename of dictionary
|
2019-08-16 07:20:57 +08:00
|
|
|
|
2021-02-14 10:03:57 +08:00
|
|
|
pm3 --> hf mf fchk --1k --mem
|
2019-08-16 07:20:57 +08:00
|
|
|
```
|
|
|
|
|
2020-07-23 17:47:16 +08:00
|
|
|
Dump MIFARE card contents
|
2019-08-13 04:24:33 +08:00
|
|
|
```
|
2021-02-08 04:06:10 +08:00
|
|
|
options:
|
|
|
|
-f, --file <filename> filename of dump
|
|
|
|
-k, --keys <filename> filename of keys
|
2021-02-14 10:03:57 +08:00
|
|
|
--mini MIFARE Classic Mini / S20
|
|
|
|
--1k MIFARE Classic 1k / S50 (default)
|
|
|
|
--2k MIFARE Classic/Plus 2k
|
|
|
|
--4k MIFARE Classic 4k / S70
|
2021-02-08 04:06:10 +08:00
|
|
|
|
|
|
|
examples/notes:
|
2021-02-14 10:03:57 +08:00
|
|
|
hf mf dump --mini -> MIFARE Mini
|
|
|
|
hf mf dump --1k -> MIFARE Classic 1k
|
|
|
|
hf mf dump --2k -> MIFARE 2k
|
|
|
|
hf mf dump --4k -> MIFARE 4k
|
|
|
|
hf mf dump -f hf-mf-066C8B78-key-5.bin -> MIFARE 1k with keys from specified file
|
|
|
|
|
|
|
|
pm3 --> hf mf dump
|
|
|
|
pm3 --> hf mf dump --1k -k hf-mf-A29558E4-key.bin -f hf-mf-A29558E4-dump.bin
|
2019-08-13 04:24:33 +08:00
|
|
|
```
|
|
|
|
|
|
|
|
Convert .bin to .eml
|
|
|
|
```
|
|
|
|
Options
|
|
|
|
---
|
2019-08-16 07:20:57 +08:00
|
|
|
i <file> : Specifies the dump-file (input). If omitted, 'dumpdata.bin' is used
|
2019-08-13 04:24:33 +08:00
|
|
|
|
2020-09-23 07:00:05 +08:00
|
|
|
pm3 --> script run data_mf_bin2eml -i dumpdata.bin
|
2019-08-13 04:24:33 +08:00
|
|
|
```
|
|
|
|
|
2020-07-23 17:47:16 +08:00
|
|
|
Write to MIFARE block
|
2019-08-13 04:24:33 +08:00
|
|
|
```
|
|
|
|
Options
|
|
|
|
---
|
|
|
|
<block number> <key A/B> <key (12 hex symbols)> <block data (32 hex symbols)>
|
|
|
|
|
|
|
|
pm3 --> hf mf wrbl 0 A FFFFFFFFFFFF d3a2859f6b880400c801002000000016
|
|
|
|
```
|
|
|
|
|
2020-07-23 17:47:16 +08:00
|
|
|
Run autopwn, to backup a MIFARE tag
|
2019-09-20 19:19:19 +08:00
|
|
|
```
|
|
|
|
Options
|
|
|
|
---
|
|
|
|
|
|
|
|
pm3 --> hf mf autopwn
|
|
|
|
```
|
|
|
|
|
2020-07-23 17:47:16 +08:00
|
|
|
Run hardnested attack
|
2019-08-13 04:24:33 +08:00
|
|
|
```
|
|
|
|
Options
|
|
|
|
---
|
|
|
|
<block number> <key A|B> <key (12 hex symbols)> <target block number> <target key A|B> [known target key (12 hex symbols)] [w] [s]
|
|
|
|
w : Acquire nonces and write them to binary file nonces.bin
|
|
|
|
|
|
|
|
pm3 --> hf mf hardnested 0 A 8829da9daf76 0 A w
|
|
|
|
```
|
|
|
|
|
2020-07-23 17:47:16 +08:00
|
|
|
Load MIFARE emul dump file into memory for simulation
|
2019-08-13 04:24:33 +08:00
|
|
|
```
|
|
|
|
Options
|
|
|
|
---
|
|
|
|
<card memory> <file name w/o `.eml`>
|
2020-07-23 17:47:16 +08:00
|
|
|
[card memory]: 0 = 320 bytes (MIFARE Mini), 1 = 1K (default), 2 = 2K, 4 = 4K, u = UL
|
2019-08-13 04:24:33 +08:00
|
|
|
|
2019-09-20 19:19:19 +08:00
|
|
|
pm3 --> hf mf eload hf-mf-353C2AA6
|
|
|
|
pm3 --> hf mf eload 1 hf-mf-353C2AA6
|
2019-08-13 04:24:33 +08:00
|
|
|
```
|
|
|
|
|
2020-07-23 17:47:16 +08:00
|
|
|
Simulate MIFARE
|
2019-08-13 04:24:33 +08:00
|
|
|
```
|
|
|
|
u : (Optional) UID 4,7 or 10 bytes. If not specified, the UID 4B from emulator memory will be used
|
|
|
|
|
2021-02-08 05:15:22 +08:00
|
|
|
pm3 --> hf mf sim -u 353c2aa6
|
2019-08-13 04:24:33 +08:00
|
|
|
```
|
|
|
|
|
2020-07-23 17:47:16 +08:00
|
|
|
Simulate MIFARE Sequence
|
2019-08-13 04:24:33 +08:00
|
|
|
```
|
2021-02-14 03:37:47 +08:00
|
|
|
pm3 --> hf mf chk -* --1k --all -f mfc_default_keys
|
2019-08-13 04:24:33 +08:00
|
|
|
pm3 --> hf mf dump 1
|
2020-09-23 07:00:05 +08:00
|
|
|
pm3 --> script run data_mf_bin2eml -i dumpdata.bin
|
2019-08-13 04:24:33 +08:00
|
|
|
pm3 --> hf mf eload 353C2AA6
|
2021-02-08 05:15:22 +08:00
|
|
|
pm3 --> hf mf sim -u 353c2aa6
|
2019-08-13 04:24:33 +08:00
|
|
|
```
|
|
|
|
|
2020-07-23 17:47:16 +08:00
|
|
|
Clone MIFARE 1K Sequence
|
2019-08-13 04:24:33 +08:00
|
|
|
```
|
2021-02-14 03:37:47 +08:00
|
|
|
pm3 --> hf mf chk -* --1k --all -f mfc_default_keys
|
2019-08-13 04:24:33 +08:00
|
|
|
pm3 --> hf mf dump
|
2020-06-27 06:06:03 +08:00
|
|
|
pm3 --> hf mf restore 1 u 4A6CE843 k hf-mf-A29558E4-key.bin f hf-mf-A29558E4-dump.bin
|
2019-08-13 04:24:33 +08:00
|
|
|
```
|
2019-08-13 16:48:56 +08:00
|
|
|
|
2020-07-23 17:47:16 +08:00
|
|
|
Read MIFARE Ultralight EV1
|
2020-03-07 23:03:24 +08:00
|
|
|
```
|
|
|
|
pm3 --> hf mfu info
|
|
|
|
```
|
|
|
|
|
2020-07-23 17:47:16 +08:00
|
|
|
Clone MIFARE Ultralight EV1 Sequence
|
2020-03-07 23:03:24 +08:00
|
|
|
```
|
2021-01-05 05:14:58 +08:00
|
|
|
pm3 --> hf mfu dump -k FFFFFFFF
|
2021-02-12 16:10:55 +08:00
|
|
|
pm3 --> script run data_mfu_bin2eml -i hf-mfu-XXXX-dump.bin -o hf-mfu-XXXX-dump.eml
|
2021-01-05 05:14:58 +08:00
|
|
|
pm3 --> hf mfu eload -u -f hf-mfu-XXXX-dump.eml
|
2021-02-12 16:10:55 +08:00
|
|
|
pm3 --> hf mfu sim -t 7
|
2020-03-07 23:03:24 +08:00
|
|
|
```
|
|
|
|
|
2020-07-23 17:47:16 +08:00
|
|
|
Bruteforce MIFARE Classic card numbers from 11223344 to 11223346
|
2020-03-11 15:23:37 +08:00
|
|
|
```
|
2020-09-23 06:37:38 +08:00
|
|
|
pm3 --> script run hf_mf_uidbruteforce -s 0x11223344 -e 0x11223346 -t 1000 -x mfc
|
2020-03-11 15:23:37 +08:00
|
|
|
```
|
|
|
|
|
2020-07-23 17:47:16 +08:00
|
|
|
Bruteforce MIFARE Ultralight EV1 card numbers from 11223344556677 to 11223344556679
|
2020-03-11 15:23:37 +08:00
|
|
|
```
|
2020-09-23 06:37:38 +08:00
|
|
|
pm3 --> script run hf_mf_uidbruteforce -s 0x11223344556677 -e 0x11223344556679 -t 1000 -x mfu
|
2020-03-11 15:23:37 +08:00
|
|
|
```
|
|
|
|
|
2019-09-20 19:19:19 +08:00
|
|
|
## Wiegand manipulation
|
2019-08-18 17:53:20 +08:00
|
|
|
^[Top](#top)
|
2019-08-13 16:48:56 +08:00
|
|
|
|
2020-10-23 07:24:54 +08:00
|
|
|
List all available wiegand formats in client
|
2019-08-13 16:48:56 +08:00
|
|
|
```
|
2019-09-20 19:19:19 +08:00
|
|
|
pm3 --> wiegand list
|
2019-08-13 16:48:56 +08:00
|
|
|
```
|
|
|
|
|
2019-09-20 19:19:19 +08:00
|
|
|
Convert Site & Facility code to Wiegand raw hex
|
2019-08-13 16:48:56 +08:00
|
|
|
```
|
2019-09-20 19:19:19 +08:00
|
|
|
Options
|
|
|
|
---
|
2020-10-04 17:07:26 +08:00
|
|
|
-w <format> --oem <OEM> --fc <FC> --cn <CN> --issue <issuelevel>
|
2019-09-20 19:19:19 +08:00
|
|
|
|
2021-01-05 05:14:58 +08:00
|
|
|
-w wiegand format to use
|
|
|
|
--oem OEM number / site code
|
|
|
|
--fc facility code
|
|
|
|
--cn card number
|
|
|
|
--issue issue level
|
2020-10-04 17:07:26 +08:00
|
|
|
|
|
|
|
pm3 --> wiegand encode -w H10301 --oem 0 --fc 56 --cn 150
|
2019-08-13 16:48:56 +08:00
|
|
|
```
|
|
|
|
|
2019-09-20 19:19:19 +08:00
|
|
|
Convert Site & Facility code from Wiegand raw hex to numbers
|
2019-08-13 16:48:56 +08:00
|
|
|
```
|
|
|
|
Options
|
|
|
|
---
|
2021-01-05 05:14:58 +08:00
|
|
|
-p ignore parity errors
|
|
|
|
--raw raw hex to be decoded
|
2019-09-20 19:19:19 +08:00
|
|
|
|
2020-10-04 17:07:26 +08:00
|
|
|
pm3 --> wiegand decode --raw 2006f623ae
|
2019-09-20 19:19:19 +08:00
|
|
|
```
|
|
|
|
|
|
|
|
## HID Prox
|
|
|
|
^[Top](#top)
|
|
|
|
|
|
|
|
Read HID Prox card
|
|
|
|
```
|
|
|
|
pm3 --> lf hid read
|
|
|
|
```
|
2019-08-13 16:48:56 +08:00
|
|
|
|
2019-09-20 19:19:19 +08:00
|
|
|
Demodulate HID Prox card
|
|
|
|
```
|
|
|
|
pm3 --> lf hid demod
|
2019-08-13 16:48:56 +08:00
|
|
|
```
|
|
|
|
|
|
|
|
Simulate Prox card
|
|
|
|
```
|
|
|
|
|
2020-10-09 03:46:53 +08:00
|
|
|
pm3 --> lf hid sim -r 200670012d
|
|
|
|
pm3 --> lf hid sim -w H10301 --fc 10 --cn 1337
|
2019-08-13 16:48:56 +08:00
|
|
|
```
|
|
|
|
|
|
|
|
Clone Prox to T5577 card
|
|
|
|
```
|
2020-10-09 03:46:53 +08:00
|
|
|
pm3 --> lf hid clone -r 200670012d
|
|
|
|
pm3 --> lf hid clone -w H10301 --fc 10 --cn 1337
|
2019-08-13 16:48:56 +08:00
|
|
|
```
|
|
|
|
|
|
|
|
Brute force HID reader
|
|
|
|
```
|
|
|
|
Options
|
|
|
|
---
|
2021-01-05 05:14:58 +08:00
|
|
|
-v, --verbose verbose logging, show all tries
|
|
|
|
-w, --wiegand format see `wiegand list` for available formats
|
|
|
|
-f, --fn dec facility code
|
|
|
|
-c, --cn dec card number to start with
|
|
|
|
-i dec issue level
|
|
|
|
-o, --oem dec OEM code
|
|
|
|
-d, --delay dec delay betweens attempts in ms. Default 1000ms
|
|
|
|
--up direction to increment card number. (default is both directions)
|
|
|
|
--down direction to decrement card number. (default is both directions)
|
2020-10-04 03:40:03 +08:00
|
|
|
|
|
|
|
pm3 --> lf hid brute -w H10301 -f 224
|
|
|
|
pm3 --> lf hid brute -v -w H10301 -f 21 -c 200 -d 2000
|
2019-08-13 16:48:56 +08:00
|
|
|
```
|
|
|
|
|
|
|
|
## Indala
|
2019-08-18 17:53:20 +08:00
|
|
|
^[Top](#top)
|
2019-08-13 16:48:56 +08:00
|
|
|
|
|
|
|
Read Indala card
|
|
|
|
```
|
|
|
|
pm3 --> lf indala read
|
|
|
|
```
|
|
|
|
|
|
|
|
Demodulate Indala card
|
|
|
|
```
|
|
|
|
pm3 --> lf indala demod
|
|
|
|
```
|
|
|
|
|
|
|
|
Simulate Indala card
|
|
|
|
```
|
|
|
|
Options
|
|
|
|
---
|
2021-01-05 05:14:58 +08:00
|
|
|
-r, --raw <hex> raw bytes
|
|
|
|
--heden <decimal> Cardnumber for Heden 2L format
|
2019-08-13 16:48:56 +08:00
|
|
|
|
2021-01-05 05:14:58 +08:00
|
|
|
pm3 --> lf indala sim -r a0000000c2c436c1
|
2019-08-13 16:48:56 +08:00
|
|
|
```
|
|
|
|
|
|
|
|
Clone to T55x7 card
|
|
|
|
```
|
|
|
|
Options
|
|
|
|
---
|
2021-01-05 05:14:58 +08:00
|
|
|
-r, --raw <hex> raw bytes
|
|
|
|
--heden <decimal> Cardnumber for Heden 2L format
|
|
|
|
--fc <decimal> Facility Code (26 bit H10301 format)
|
|
|
|
--cn <decimal> Cardnumber (26 bit H10301 format)
|
|
|
|
--q5 specify writing to Q5/T5555 tag
|
|
|
|
--em specify writing to EM4305/4469 tag
|
2019-08-13 16:48:56 +08:00
|
|
|
|
2021-01-05 05:14:58 +08:00
|
|
|
pm3 --> lf indala clone -r a0000000c2c436c1
|
2019-08-13 16:48:56 +08:00
|
|
|
```
|
|
|
|
|
|
|
|
## Hitag
|
2019-08-18 17:53:20 +08:00
|
|
|
^[Top](#top)
|
2019-08-13 16:48:56 +08:00
|
|
|
|
|
|
|
Read Hitag information
|
|
|
|
```
|
|
|
|
pm3 --> lf hitag info
|
|
|
|
```
|
|
|
|
|
|
|
|
Act as Hitag reader
|
|
|
|
```
|
|
|
|
Options
|
|
|
|
---
|
|
|
|
HitagS:
|
|
|
|
01 <nr> <ar> : Read all pages, challenge mode
|
|
|
|
02 <key> : Read all pages, crypto mode. Set key=0 for no auth
|
|
|
|
|
|
|
|
Hitag2:
|
2019-08-16 07:20:57 +08:00
|
|
|
21 <password> : Read all pages, password mode. Default: 4D494B52 ("MIKR")
|
2019-08-13 16:48:56 +08:00
|
|
|
22 <nr> <ar> : Read all pages, challenge mode
|
|
|
|
23 <key> : Read all pages, crypto mode. Key format: ISK high + ISK low. Default: 4F4E4D494B52 ("ONMIKR")
|
|
|
|
25 : Test recorded authentications
|
|
|
|
26 : Just read UID
|
|
|
|
|
|
|
|
pm3 --> lf hitag 26
|
|
|
|
pm3 --> lf hitag 21 4D494B52
|
|
|
|
```
|
|
|
|
|
2019-08-26 19:36:37 +08:00
|
|
|
Sniff Hitag traffic
|
2019-08-13 16:48:56 +08:00
|
|
|
```
|
|
|
|
pm3 --> lf hitag sniff
|
|
|
|
pm3 --> lf hitag list
|
|
|
|
```
|
|
|
|
|
|
|
|
Simulate Hitag
|
|
|
|
```
|
2019-08-26 19:36:37 +08:00
|
|
|
pm3 --> lf hitag sim c378181c_a8f7.ht2
|
2019-08-13 16:48:56 +08:00
|
|
|
```
|
|
|
|
|
|
|
|
Write to Hitag block
|
|
|
|
```
|
|
|
|
Options
|
|
|
|
---
|
|
|
|
HitagS:
|
|
|
|
03 <nr,ar> <page> <byte0...byte3> : Write page, challenge mode
|
|
|
|
04 <key> <page> <byte0...byte3> : Write page, crypto mode. Set key=0 for no auth
|
|
|
|
|
|
|
|
Hitag2:
|
|
|
|
24 <key> <page> <byte0...byte3> : Write page, crypto mode. Key format: ISK high + ISK low.
|
|
|
|
27 <password> <page> <byte0...byte3> : Write page, password mode. Default: 4D494B52 ("MIKR")
|
|
|
|
|
|
|
|
pm3 --> lf hitag writer 24 499602D2 1 00000000
|
|
|
|
```
|
|
|
|
|
|
|
|
Simulate Hitag2 sequence
|
|
|
|
```
|
|
|
|
pm3 --> lf hitag reader 21 56713368
|
2019-08-26 19:36:37 +08:00
|
|
|
pm3 --> lf hitag sim c378181c_a8f7.ht2
|
2019-08-13 16:48:56 +08:00
|
|
|
```
|
|
|
|
|
|
|
|
## T55XX
|
2019-08-18 17:53:20 +08:00
|
|
|
^[Top](#top)
|
2019-08-13 16:48:56 +08:00
|
|
|
|
|
|
|
Detect T55XX card
|
|
|
|
```
|
|
|
|
pm3 --> lf t55xx detect
|
|
|
|
```
|
|
|
|
|
2019-08-16 07:20:57 +08:00
|
|
|
Configure modulation
|
2019-08-13 16:48:56 +08:00
|
|
|
```
|
|
|
|
Options
|
|
|
|
---
|
2019-08-16 07:20:57 +08:00
|
|
|
<FSK|FSK1|FSK1a|FSK2|FSK2a|ASK|PSK1|PSK2|NRZ|BI|BIa> : Set modulation
|
2019-08-13 16:48:56 +08:00
|
|
|
EM is ASK
|
|
|
|
HID Prox is FSK
|
|
|
|
Indala is PSK
|
|
|
|
|
|
|
|
pm3 --> lf t55xx config FSK
|
|
|
|
```
|
|
|
|
|
2019-08-16 07:20:57 +08:00
|
|
|
Set timings to default
|
|
|
|
```
|
|
|
|
Options
|
|
|
|
---
|
2021-01-20 18:58:43 +08:00
|
|
|
-p : persist to flash memory (RDV4)
|
|
|
|
-z : Set default t55x7 timings (use `-p` to save if required)
|
2019-08-16 07:20:57 +08:00
|
|
|
|
2021-01-20 18:58:43 +08:00
|
|
|
pm3 --> lf t55xx deviceconfig -z -p
|
2019-08-16 07:20:57 +08:00
|
|
|
```
|
|
|
|
|
2019-08-13 16:48:56 +08:00
|
|
|
Write to T55xx block
|
|
|
|
```
|
2019-08-26 19:36:37 +08:00
|
|
|
b <block> : block number to write. Between 0-7
|
|
|
|
d <data> : 4 bytes of data to write (8 hex characters)
|
2019-08-13 16:48:56 +08:00
|
|
|
|
|
|
|
pm3 --> lf t55xx wr b 0 d 00081040
|
|
|
|
```
|
|
|
|
|
|
|
|
Wipe a T55xx tag and set defaults
|
|
|
|
```
|
2019-08-16 07:20:57 +08:00
|
|
|
pm3 --> lf t55xx wipe
|
2019-08-13 16:48:56 +08:00
|
|
|
```
|
|
|
|
|
|
|
|
## Data
|
2019-08-18 17:53:20 +08:00
|
|
|
^[Top](#top)
|
2019-08-13 16:48:56 +08:00
|
|
|
|
|
|
|
Get raw samples [512-40000]
|
|
|
|
```
|
2019-08-16 07:20:57 +08:00
|
|
|
pm3 --> data samples <size>
|
2019-08-13 16:48:56 +08:00
|
|
|
```
|
|
|
|
|
|
|
|
Save samples to file
|
|
|
|
```
|
2020-10-10 04:25:33 +08:00
|
|
|
pm3 --> data save -f <filename>
|
2019-08-13 16:48:56 +08:00
|
|
|
```
|
|
|
|
|
|
|
|
Load samples from file
|
|
|
|
```
|
2020-10-10 04:25:33 +08:00
|
|
|
pm3 --> data load -f <filename>
|
2019-08-13 16:48:56 +08:00
|
|
|
```
|
|
|
|
|
|
|
|
## Lua Scripts
|
2019-08-18 17:53:20 +08:00
|
|
|
^[Top](#top)
|
2019-08-13 16:48:56 +08:00
|
|
|
|
2020-07-23 17:47:16 +08:00
|
|
|
List lua Scripts
|
2019-08-13 16:48:56 +08:00
|
|
|
|
|
|
|
```
|
2019-08-16 07:20:57 +08:00
|
|
|
pm3 --> script list
|
2019-08-13 16:48:56 +08:00
|
|
|
```
|
|
|
|
|
2020-07-23 17:47:16 +08:00
|
|
|
View lua helptext
|
|
|
|
|
|
|
|
```
|
2020-10-04 17:07:26 +08:00
|
|
|
pm3 --> script run <nameofscript> -h
|
2020-07-23 17:47:16 +08:00
|
|
|
```
|
|
|
|
|
|
|
|
|
2019-08-13 16:48:56 +08:00
|
|
|
Convert .bin to .eml
|
|
|
|
```
|
|
|
|
Options
|
|
|
|
---
|
2020-07-23 17:47:16 +08:00
|
|
|
-i <file> Specifies the dump-file (input). If omitted, 'dumpdata.bin' is used
|
|
|
|
-o <filename> Specifies the output file. If omitted, <uid>.eml is used
|
2019-08-13 16:48:56 +08:00
|
|
|
|
2020-09-23 07:00:05 +08:00
|
|
|
pm3 --> script run data_mf_bin2eml -i xxxxxxxxxxxxxx.bin
|
2019-08-13 16:48:56 +08:00
|
|
|
```
|
|
|
|
|
2020-07-23 17:47:16 +08:00
|
|
|
Convert .eml to .bin
|
|
|
|
```
|
|
|
|
Options
|
|
|
|
---
|
|
|
|
-i <filename> Specifies the dump-file (input). If omitted, 'dumpdata.eml' is used
|
|
|
|
-o <filename> Specifies the output file. If omitted, <currdate>.bin is used
|
|
|
|
|
2020-09-23 07:00:05 +08:00
|
|
|
pm3 --> script run data_mf_eml2bin -i myfile.eml -o myfile.bin
|
2020-07-23 17:47:16 +08:00
|
|
|
```
|
|
|
|
|
2019-08-13 16:48:56 +08:00
|
|
|
Format Mifare card
|
|
|
|
```
|
|
|
|
Options
|
|
|
|
---
|
2020-07-23 17:47:16 +08:00
|
|
|
-k <key> The current six byte key with write access
|
|
|
|
-n <key> The new key that will be written to the card
|
|
|
|
-a <access> The new access bytes that will be written to the card
|
2020-10-23 07:24:54 +08:00
|
|
|
-x Execute the commands as well
|
2019-08-13 16:48:56 +08:00
|
|
|
|
2020-09-23 06:11:11 +08:00
|
|
|
pm3 --> script run hf_mf_format -k FFFFFFFFFFFF -n FFFFFFFFFFFF -x
|
2019-08-16 07:20:57 +08:00
|
|
|
```
|
|
|
|
|
|
|
|
## Memory
|
2019-08-18 17:53:20 +08:00
|
|
|
^[Top](#top)
|
2019-08-16 07:20:57 +08:00
|
|
|
|
2020-07-23 17:47:16 +08:00
|
|
|
Load default keys into flash memory (RDV4 only)
|
2019-08-16 07:20:57 +08:00
|
|
|
```
|
|
|
|
Options
|
|
|
|
---
|
2021-01-05 05:14:58 +08:00
|
|
|
-o <offset> offset in memory
|
|
|
|
-f <filename> file name
|
|
|
|
--mfc upload 6 bytes keys (mifare key dictionary)
|
|
|
|
--iclass upload 8 bytes keys (iClass key dictionary)
|
|
|
|
--t55xx upload 4 bytes keys (pwd dictionary)
|
2019-08-16 07:20:57 +08:00
|
|
|
|
2020-10-04 17:07:26 +08:00
|
|
|
pm3 --> mem load -f mfc_default_keys --mfc
|
|
|
|
pm3 --> mem load -f t55xx_default_pwds --t5xx
|
|
|
|
pm3 --> mem load -f iclass_default_keys --iclass
|
2019-08-16 07:20:57 +08:00
|
|
|
```
|
|
|
|
|
|
|
|
## Sim Module
|
2019-08-18 17:53:20 +08:00
|
|
|
^[Top](#top)
|
2019-08-16 07:20:57 +08:00
|
|
|
|
|
|
|
Upgrade Sim Module firmware
|
|
|
|
```
|
2021-01-07 20:04:52 +08:00
|
|
|
pm3 --> smart upgrade -f sim011.bin
|
2019-08-16 07:20:57 +08:00
|
|
|
```
|
|
|
|
|
|
|
|
## Smart Card
|
2019-08-18 17:53:20 +08:00
|
|
|
^[Top](#top)
|
2019-08-16 07:20:57 +08:00
|
|
|
|
|
|
|
Get Smart Card Information
|
|
|
|
```
|
2020-07-23 16:24:17 +08:00
|
|
|
pm3 --> smart info
|
2019-08-16 07:20:57 +08:00
|
|
|
```
|
|
|
|
|
|
|
|
Act like an IS07816 reader
|
|
|
|
```
|
2020-07-23 16:24:17 +08:00
|
|
|
pm3 --> smart reader
|
2019-08-16 07:20:57 +08:00
|
|
|
```
|
|
|
|
|
2021-01-07 20:04:52 +08:00
|
|
|
Set clock speed for smart card interface
|
2019-08-16 07:20:57 +08:00
|
|
|
```
|
|
|
|
Options
|
|
|
|
---
|
2021-01-07 20:04:52 +08:00
|
|
|
--16mhz 16 MHz clock speed
|
|
|
|
--8mhz 8 MHz clock speed
|
|
|
|
--4mhz 4 MHz clock speed
|
2019-08-26 19:36:37 +08:00
|
|
|
|
2021-01-07 20:04:52 +08:00
|
|
|
|
|
|
|
pm3 --> smart setclock --8mhz
|
2019-08-16 07:20:57 +08:00
|
|
|
```
|
|
|
|
|
|
|
|
Send raw hex data
|
|
|
|
```
|
|
|
|
Options
|
2019-08-26 19:36:37 +08:00
|
|
|
---
|
2021-01-07 20:04:52 +08:00
|
|
|
-r do not read response
|
|
|
|
-a active smartcard without select (reset sc module)
|
|
|
|
-s active smartcard with select (get ATR)
|
|
|
|
-t, --tlv executes TLV decoder if it possible
|
|
|
|
-0 use protocol T=0
|
|
|
|
-d, --data <hex> bytes to send
|
2019-08-26 19:36:37 +08:00
|
|
|
|
2021-01-07 20:04:52 +08:00
|
|
|
pm3 --> smart raw -s -0 -d 00a404000e315041592e5359532e4444463031
|
|
|
|
pm3 --> smart raw -0 -d 00a404000e325041592e5359532e4444463031
|
|
|
|
pm3 --> smart raw -0 -t -d 00a4040007a0000000041010
|
|
|
|
pm3 --> smart raw -0 -t -d 00a4040007a0000000031010
|
2019-08-16 07:20:57 +08:00
|
|
|
````
|
|
|
|
|
|
|
|
Bruteforce SPI
|
|
|
|
```
|
|
|
|
Options
|
|
|
|
---
|
2021-01-07 20:04:52 +08:00
|
|
|
-t, --tlv executes TLV decoder if it possible
|
2019-08-16 07:20:57 +08:00
|
|
|
|
2020-07-23 16:24:17 +08:00
|
|
|
pm3 --> smart brute
|
2021-01-07 20:04:52 +08:00
|
|
|
pm3 --> smart brute --tlv
|
2019-08-13 16:48:56 +08:00
|
|
|
```
|