2019-08-18 05:01:31 +08:00
|
|
|
# Command Cheat Sheet
|
2019-08-18 17:53:20 +08:00
|
|
|
<a id="Top"></a>
|
|
|
|
|
2019-08-18 05:01:31 +08:00
|
|
|
|Generic|Low Frequence 125 kHz|High Frequence 13.56 MHz|
|
2019-08-16 17:20:06 +08:00
|
|
|
|---|---|---|
|
2019-08-16 17:22:47 +08:00
|
|
|
|[Generic](#Generic)|[T55XX](#T55XX)|[Mifare](#Mifare)|
|
|
|
|
|[Data](#Data)|[HID Prox](#HID-Prox)|[iClass](#iClass)|
|
|
|
|
|[Memory](#Memory)|[Indala](#Indala)||
|
|
|
|
|[Sim Module](#Sim-Module)|[Hitag](#Hitag)||
|
|
|
|
|[Lua Scripts](#Lua-Scripts)|||
|
|
|
|
|[Smart Card](#Smart-Card)|||
|
2019-09-20 19:19:19 +08:00
|
|
|
|[Wiegand convertion](#Wiegand-manipulation)|||
|
2019-08-16 07:20:57 +08:00
|
|
|
|
2019-08-13 04:24:33 +08:00
|
|
|
## Generic
|
2019-08-18 17:53:20 +08:00
|
|
|
^[Top](#top)
|
2019-08-13 04:24:33 +08:00
|
|
|
|
|
|
|
Identify High Frequency cards
|
|
|
|
```
|
|
|
|
pm3 --> hf search
|
|
|
|
```
|
|
|
|
|
|
|
|
Identify Low Frequency cards
|
|
|
|
```
|
|
|
|
pm3 --> lf search
|
|
|
|
```
|
|
|
|
|
|
|
|
Measure antenna characteristics, LF/HF voltage should be around 20-45+ V
|
|
|
|
```
|
|
|
|
pm3 --> hw tune
|
|
|
|
```
|
|
|
|
|
|
|
|
Check versioning
|
|
|
|
```
|
|
|
|
pm3 --> hw version
|
|
|
|
```
|
|
|
|
|
2019-08-16 07:20:57 +08:00
|
|
|
Check overall status
|
|
|
|
```
|
|
|
|
pm3 --> hw status
|
|
|
|
```
|
|
|
|
|
2019-08-13 04:24:33 +08:00
|
|
|
## iClass
|
2019-08-18 17:53:20 +08:00
|
|
|
^[Top](#top)
|
2019-08-13 04:24:33 +08:00
|
|
|
|
|
|
|
Reverse permute iClass master key
|
|
|
|
```
|
|
|
|
Options
|
|
|
|
---
|
2019-08-26 19:36:37 +08:00
|
|
|
r reverse permuted key
|
2019-08-13 04:24:33 +08:00
|
|
|
|
|
|
|
pm3 --> hf iclass permute r 3F90EBF0910F7B6F
|
|
|
|
```
|
|
|
|
|
|
|
|
iClass Reader
|
|
|
|
```
|
|
|
|
pm3 --> hf iclass reader
|
|
|
|
```
|
|
|
|
|
|
|
|
Dump iClass card contents
|
|
|
|
```
|
|
|
|
Options
|
|
|
|
---
|
|
|
|
k <Key> : *Access Key as 16 hex symbols or 1 hex to select key from memory
|
|
|
|
|
2019-09-20 19:19:19 +08:00
|
|
|
m3 --> hf iclass dump k 0
|
2019-08-13 04:24:33 +08:00
|
|
|
```
|
|
|
|
|
|
|
|
Read iClass Block
|
|
|
|
```
|
|
|
|
Options
|
|
|
|
---
|
|
|
|
b <Block> : The block number as 2 hex symbols
|
|
|
|
k <Key> : Access Key as 16 hex symbols or 1 hex to select key from memory
|
|
|
|
|
2019-09-20 19:19:19 +08:00
|
|
|
pm3 --> hf iclass rdbl b 7 k 0
|
2019-08-13 04:24:33 +08:00
|
|
|
```
|
|
|
|
|
|
|
|
Write to iClass Block
|
|
|
|
```
|
|
|
|
Options
|
|
|
|
---
|
|
|
|
b <Block> : The block number as 2 hex symbols
|
|
|
|
d <data> : Set the Data to write as 16 hex symbols
|
|
|
|
k <Key> : Access Key as 16 hex symbols or 1 hex to select key from memory
|
|
|
|
|
2019-09-20 19:19:19 +08:00
|
|
|
pm3 --> hf iclass wrbl b 07 d 6ce099fe7e614fd0 k 0
|
2019-08-13 04:24:33 +08:00
|
|
|
```
|
|
|
|
|
|
|
|
Print keystore
|
|
|
|
```
|
|
|
|
Options
|
|
|
|
---
|
|
|
|
p : print keys loaded into memory
|
|
|
|
|
|
|
|
pm3 --> hf iclass managekeys p
|
|
|
|
```
|
|
|
|
|
|
|
|
Add key to keystore [0-7]
|
|
|
|
```
|
|
|
|
Options
|
|
|
|
---
|
|
|
|
n <keynbr> : specify the keyNbr to set in memory
|
|
|
|
k <key> : set a key in memory
|
|
|
|
|
|
|
|
pm3 --> hf iclass managekeys n 0 k AFA785A7DAB33378
|
|
|
|
```
|
|
|
|
|
|
|
|
Encrypt iClass Block
|
|
|
|
```
|
2019-09-20 19:19:19 +08:00
|
|
|
pm3 --> hf iclass encrypt 0000000f2aa3dba8
|
2019-08-13 04:24:33 +08:00
|
|
|
```
|
|
|
|
|
|
|
|
Load iClass dump into memory for simulation
|
|
|
|
```
|
|
|
|
Options
|
|
|
|
---
|
|
|
|
f <filename> : load iclass tag-dump filename
|
|
|
|
|
2019-09-20 19:19:19 +08:00
|
|
|
pm3 --> hf iclass eload f hf-iclass-db883702f8ff12e0.bin
|
2019-08-13 04:24:33 +08:00
|
|
|
```
|
|
|
|
|
|
|
|
Simulate iClass
|
|
|
|
```
|
|
|
|
Options
|
|
|
|
---
|
|
|
|
0 <CSN> simulate the given CSN
|
2019-09-20 19:19:19 +08:00
|
|
|
2 Runs part 1 of LOCLASS attack
|
2019-08-13 04:24:33 +08:00
|
|
|
1 simulate default CSN
|
|
|
|
3 Full simulation using emulator memory (see 'hf iclass eload')
|
|
|
|
|
|
|
|
pm3 --> hf iclass sim 3
|
|
|
|
```
|
|
|
|
|
|
|
|
Clone iClass Legacy Sequence
|
|
|
|
```
|
2019-09-20 19:19:19 +08:00
|
|
|
pm3 --> hf iclass rdbl b 7 k 0
|
|
|
|
pm3 --> hf iclass wrbl b 7 d 6ce099fe7e614fd0 k 0
|
2019-08-13 04:24:33 +08:00
|
|
|
```
|
|
|
|
|
|
|
|
Simulate iClass Sequence
|
|
|
|
```
|
2019-09-20 19:19:19 +08:00
|
|
|
pm3 --> hf iclass dump k 0
|
|
|
|
pm3 --> hf iclass eload f hf-iclass-db883702f8ff12e0.bin
|
2019-08-13 04:24:33 +08:00
|
|
|
pm3 --> hf iclass sim 3
|
|
|
|
```
|
|
|
|
|
|
|
|
Extract custom iClass key (loclass attack)
|
|
|
|
```
|
|
|
|
Options
|
|
|
|
---
|
|
|
|
f <filename> : specify a filename to clone from
|
|
|
|
k <Key> : Access Key as 16 hex symbols or 1 hex to select key from memory
|
|
|
|
e : If 'e' is specified, elite computations applied to key
|
|
|
|
|
|
|
|
pm3 --> hf iclass sim 2
|
|
|
|
pm3 --> hf iclass loclass f iclass_mac_attack.bin
|
|
|
|
pm3 --> hf iclass dump k <Kcus> e
|
|
|
|
```
|
|
|
|
|
2019-08-13 16:48:56 +08:00
|
|
|
Verify custom iClass key
|
|
|
|
```
|
|
|
|
Options
|
|
|
|
---
|
|
|
|
f <filename> : Dictionary file with default iclass keys
|
|
|
|
u : CSN
|
|
|
|
p : EPURSE
|
|
|
|
m : macs
|
|
|
|
e : elite
|
|
|
|
|
2019-08-26 19:36:37 +08:00
|
|
|
pm3 --> hf iclass lookup u 010a0ffff7ff12e0 p feffffffffffffff m 66348979153c41b9 f iclass_default_keys e
|
2019-08-13 16:48:56 +08:00
|
|
|
```
|
|
|
|
|
2019-08-13 04:24:33 +08:00
|
|
|
## Mifare
|
2019-08-18 17:53:20 +08:00
|
|
|
^[Top](#top)
|
2019-08-13 04:24:33 +08:00
|
|
|
|
|
|
|
Check for default keys
|
|
|
|
```
|
|
|
|
Options
|
|
|
|
---
|
|
|
|
<*card memory> <key type (A/B/?)> [t|d|s|ss] <dic (*.dic)>
|
2019-08-16 07:20:57 +08:00
|
|
|
* : all sectors
|
|
|
|
card memory : 0 - MINI(320 bytes), 1 - 1K, 2 - 2K, 4 - 4K
|
|
|
|
d : write keys to binary file
|
2019-08-13 04:24:33 +08:00
|
|
|
|
2019-08-26 19:03:11 +08:00
|
|
|
pm3 --> hf mf chk *1 ? d mfc_default_keys
|
2019-08-13 04:24:33 +08:00
|
|
|
```
|
|
|
|
|
2019-08-16 07:20:57 +08:00
|
|
|
Check for default keys from local memory
|
|
|
|
```
|
|
|
|
Options
|
|
|
|
---
|
2019-08-26 19:36:37 +08:00
|
|
|
card memory : 0 - MINI(320 bytes), 1 - 1K, 2 - 2K, 4 - 4K
|
2019-08-16 07:20:57 +08:00
|
|
|
m : use dictionary from flashmemory
|
|
|
|
|
|
|
|
pm3 --> hf mf fchk 1 m
|
|
|
|
```
|
|
|
|
|
2019-08-13 04:24:33 +08:00
|
|
|
Dump Mifare card contents
|
|
|
|
```
|
|
|
|
Options
|
|
|
|
---
|
2019-08-16 07:20:57 +08:00
|
|
|
<card memory> : 0 = 320 bytes (Mifare Mini), 1 = 1K (default), 2 = 2K, 4 = 4K
|
|
|
|
k <name> : key filename, if no <name> given, UID will be used as filename"
|
|
|
|
f <name> : data filename, if no <name> given, UID will be used as filename
|
2019-08-13 04:24:33 +08:00
|
|
|
|
|
|
|
pm3 --> hf mf dump 1
|
|
|
|
pm3 --> hf mf dump 1 k hf-mf-A29558E4-key.bin f hf-mf-A29558E4-data.bin
|
|
|
|
```
|
|
|
|
|
|
|
|
Convert .bin to .eml
|
|
|
|
```
|
|
|
|
Options
|
|
|
|
---
|
2019-08-16 07:20:57 +08:00
|
|
|
i <file> : Specifies the dump-file (input). If omitted, 'dumpdata.bin' is used
|
2019-08-13 04:24:33 +08:00
|
|
|
|
|
|
|
pm3 --> script run dumptoemul -i dumpdata.bin
|
|
|
|
```
|
|
|
|
|
|
|
|
Write to Mifare block
|
|
|
|
```
|
|
|
|
Options
|
|
|
|
---
|
|
|
|
<block number> <key A/B> <key (12 hex symbols)> <block data (32 hex symbols)>
|
|
|
|
|
|
|
|
pm3 --> hf mf wrbl 0 A FFFFFFFFFFFF d3a2859f6b880400c801002000000016
|
|
|
|
```
|
|
|
|
|
2019-09-20 19:19:19 +08:00
|
|
|
Run autopwn
|
|
|
|
```
|
|
|
|
Options
|
|
|
|
---
|
|
|
|
|
|
|
|
pm3 --> hf mf autopwn
|
|
|
|
```
|
|
|
|
|
2019-08-13 04:24:33 +08:00
|
|
|
Run Hardnested attack
|
|
|
|
```
|
|
|
|
Options
|
|
|
|
---
|
|
|
|
<block number> <key A|B> <key (12 hex symbols)> <target block number> <target key A|B> [known target key (12 hex symbols)] [w] [s]
|
|
|
|
w : Acquire nonces and write them to binary file nonces.bin
|
|
|
|
|
|
|
|
pm3 --> hf mf hardnested 0 A 8829da9daf76 0 A w
|
|
|
|
```
|
|
|
|
|
|
|
|
Load Mifare emul dump file into memory for simulation
|
|
|
|
```
|
|
|
|
Options
|
|
|
|
---
|
|
|
|
<card memory> <file name w/o `.eml`>
|
|
|
|
[card memory]: 0 = 320 bytes (Mifare Mini), 1 = 1K (default), 2 = 2K, 4 = 4K, u = UL
|
|
|
|
|
2019-09-20 19:19:19 +08:00
|
|
|
pm3 --> hf mf eload hf-mf-353C2AA6
|
|
|
|
pm3 --> hf mf eload 1 hf-mf-353C2AA6
|
2019-08-13 04:24:33 +08:00
|
|
|
```
|
|
|
|
|
2019-08-26 19:36:37 +08:00
|
|
|
Simulate Mifare
|
2019-08-13 04:24:33 +08:00
|
|
|
```
|
|
|
|
u : (Optional) UID 4,7 or 10 bytes. If not specified, the UID 4B from emulator memory will be used
|
|
|
|
|
|
|
|
pm3 --> hf mf sim u 353c2aa6
|
|
|
|
```
|
|
|
|
|
|
|
|
Simulate Mifare Sequence
|
|
|
|
```
|
2019-08-26 19:03:11 +08:00
|
|
|
pm3 --> hf mf chk *1 ? d mfc_default_keys
|
2019-08-13 04:24:33 +08:00
|
|
|
pm3 --> hf mf dump 1
|
|
|
|
pm3 --> script run dumptoemul -i dumpdata.bin
|
|
|
|
pm3 --> hf mf eload 353C2AA6
|
|
|
|
pm3 --> hf mf sim u 353c2aa6
|
|
|
|
```
|
|
|
|
|
|
|
|
Clone Mifare 1K Sequence
|
|
|
|
```
|
2019-08-26 19:03:11 +08:00
|
|
|
pm3 --> hf mf chk *1 ? d mfc_default_keys
|
2019-08-13 04:24:33 +08:00
|
|
|
pm3 --> hf mf dump
|
|
|
|
pm3 --> hf mf restore 1 u 4A6CE843 k hf-mf-A29558E4-key.bin f hf-mf-A29558E4-data.bin
|
|
|
|
```
|
2019-08-13 16:48:56 +08:00
|
|
|
|
2019-09-20 19:19:19 +08:00
|
|
|
## Wiegand manipulation
|
2019-08-18 17:53:20 +08:00
|
|
|
^[Top](#top)
|
2019-08-13 16:48:56 +08:00
|
|
|
|
2019-09-20 19:19:19 +08:00
|
|
|
List all available weigand formats in client
|
2019-08-13 16:48:56 +08:00
|
|
|
```
|
2019-09-20 19:19:19 +08:00
|
|
|
pm3 --> wiegand list
|
2019-08-13 16:48:56 +08:00
|
|
|
```
|
|
|
|
|
2019-09-20 19:19:19 +08:00
|
|
|
Convert Site & Facility code to Wiegand raw hex
|
2019-08-13 16:48:56 +08:00
|
|
|
```
|
2019-09-20 19:19:19 +08:00
|
|
|
Options
|
|
|
|
---
|
|
|
|
w <format> o <OEM> f <FC> c <CN> i <issuelevel>
|
|
|
|
w : wiegand format to use
|
|
|
|
o : OEM number / site code
|
|
|
|
f : facility code
|
|
|
|
c : card number
|
|
|
|
i : issue level
|
|
|
|
|
|
|
|
pm3 --> wiegand encode 0 56 150
|
2019-08-13 16:48:56 +08:00
|
|
|
```
|
|
|
|
|
2019-09-20 19:19:19 +08:00
|
|
|
Convert Site & Facility code from Wiegand raw hex to numbers
|
2019-08-13 16:48:56 +08:00
|
|
|
```
|
|
|
|
Options
|
|
|
|
---
|
2019-09-20 19:19:19 +08:00
|
|
|
p : ignore parity errors
|
|
|
|
|
|
|
|
pm3 --> wiegand decode 2006f623ae
|
|
|
|
```
|
|
|
|
|
|
|
|
## HID Prox
|
|
|
|
^[Top](#top)
|
|
|
|
|
|
|
|
Read HID Prox card
|
|
|
|
```
|
|
|
|
pm3 --> lf hid read
|
|
|
|
```
|
2019-08-13 16:48:56 +08:00
|
|
|
|
2019-09-20 19:19:19 +08:00
|
|
|
Demodulate HID Prox card
|
|
|
|
```
|
|
|
|
pm3 --> lf hid demod
|
2019-08-13 16:48:56 +08:00
|
|
|
```
|
|
|
|
|
|
|
|
Simulate Prox card
|
|
|
|
```
|
|
|
|
|
|
|
|
pm3 --> lf hid sim 200670012d
|
|
|
|
```
|
|
|
|
|
|
|
|
Clone Prox to T5577 card
|
|
|
|
```
|
|
|
|
pm3 --> lf hid clone 200670012d
|
|
|
|
```
|
|
|
|
|
|
|
|
Brute force HID reader
|
|
|
|
```
|
|
|
|
Options
|
|
|
|
---
|
2019-08-16 07:20:57 +08:00
|
|
|
a <format> : 26|33|34|35|37|40|44|84
|
|
|
|
f <facility-code> : 8-bit value HID facility code
|
|
|
|
c <cardnumber> : (optional) cardnumber to start with, max 65535
|
|
|
|
d <delay> : delay betweens attempts in ms. Default 1000ms
|
|
|
|
v : verbose logging, show all tries
|
2019-08-13 16:48:56 +08:00
|
|
|
|
|
|
|
pm3 --> lf hid brute a 26 f 224
|
|
|
|
pm3 --> lf hid brute v a 26 f 21 c 200 d 2000
|
|
|
|
```
|
|
|
|
|
|
|
|
## Indala
|
2019-08-18 17:53:20 +08:00
|
|
|
^[Top](#top)
|
2019-08-13 16:48:56 +08:00
|
|
|
|
|
|
|
Read Indala card
|
|
|
|
```
|
|
|
|
pm3 --> lf indala read
|
|
|
|
```
|
|
|
|
|
|
|
|
Demodulate Indala card
|
|
|
|
```
|
|
|
|
pm3 --> lf indala demod
|
|
|
|
```
|
|
|
|
|
|
|
|
Simulate Indala card
|
|
|
|
```
|
|
|
|
Options
|
|
|
|
---
|
|
|
|
<uid> : 64/224 UID
|
|
|
|
|
|
|
|
pm3 --> lf indala sim a0000000c2c436c1
|
|
|
|
```
|
|
|
|
|
|
|
|
Clone to T55x7 card
|
|
|
|
```
|
|
|
|
Options
|
|
|
|
---
|
|
|
|
<uid> : 64/224 UID
|
|
|
|
|
|
|
|
pm3 --> lf indala clone a0000000c2c436c1
|
|
|
|
```
|
|
|
|
|
|
|
|
## Hitag
|
2019-08-18 17:53:20 +08:00
|
|
|
^[Top](#top)
|
2019-08-13 16:48:56 +08:00
|
|
|
|
|
|
|
Read Hitag information
|
|
|
|
```
|
|
|
|
pm3 --> lf hitag info
|
|
|
|
```
|
|
|
|
|
|
|
|
Act as Hitag reader
|
|
|
|
```
|
|
|
|
Options
|
|
|
|
---
|
|
|
|
HitagS:
|
|
|
|
01 <nr> <ar> : Read all pages, challenge mode
|
|
|
|
02 <key> : Read all pages, crypto mode. Set key=0 for no auth
|
|
|
|
|
|
|
|
Hitag2:
|
2019-08-16 07:20:57 +08:00
|
|
|
21 <password> : Read all pages, password mode. Default: 4D494B52 ("MIKR")
|
2019-08-13 16:48:56 +08:00
|
|
|
22 <nr> <ar> : Read all pages, challenge mode
|
|
|
|
23 <key> : Read all pages, crypto mode. Key format: ISK high + ISK low. Default: 4F4E4D494B52 ("ONMIKR")
|
|
|
|
25 : Test recorded authentications
|
|
|
|
26 : Just read UID
|
|
|
|
|
|
|
|
pm3 --> lf hitag 26
|
|
|
|
pm3 --> lf hitag 21 4D494B52
|
|
|
|
```
|
|
|
|
|
2019-08-26 19:36:37 +08:00
|
|
|
Sniff Hitag traffic
|
2019-08-13 16:48:56 +08:00
|
|
|
```
|
|
|
|
pm3 --> lf hitag sniff
|
|
|
|
pm3 --> lf hitag list
|
|
|
|
```
|
|
|
|
|
|
|
|
Simulate Hitag
|
|
|
|
```
|
2019-08-26 19:36:37 +08:00
|
|
|
pm3 --> lf hitag sim c378181c_a8f7.ht2
|
2019-08-13 16:48:56 +08:00
|
|
|
```
|
|
|
|
|
|
|
|
Write to Hitag block
|
|
|
|
```
|
|
|
|
Options
|
|
|
|
---
|
|
|
|
HitagS:
|
|
|
|
03 <nr,ar> <page> <byte0...byte3> : Write page, challenge mode
|
|
|
|
04 <key> <page> <byte0...byte3> : Write page, crypto mode. Set key=0 for no auth
|
|
|
|
|
|
|
|
Hitag2:
|
|
|
|
24 <key> <page> <byte0...byte3> : Write page, crypto mode. Key format: ISK high + ISK low.
|
|
|
|
27 <password> <page> <byte0...byte3> : Write page, password mode. Default: 4D494B52 ("MIKR")
|
|
|
|
|
|
|
|
pm3 --> lf hitag writer 24 499602D2 1 00000000
|
|
|
|
```
|
|
|
|
|
|
|
|
Simulate Hitag2 sequence
|
|
|
|
```
|
|
|
|
pm3 --> lf hitag reader 21 56713368
|
2019-08-26 19:36:37 +08:00
|
|
|
pm3 --> lf hitag sim c378181c_a8f7.ht2
|
2019-08-13 16:48:56 +08:00
|
|
|
```
|
|
|
|
|
|
|
|
## T55XX
|
2019-08-18 17:53:20 +08:00
|
|
|
^[Top](#top)
|
2019-08-13 16:48:56 +08:00
|
|
|
|
|
|
|
Detect T55XX card
|
|
|
|
```
|
|
|
|
pm3 --> lf t55xx detect
|
|
|
|
```
|
|
|
|
|
2019-08-16 07:20:57 +08:00
|
|
|
Configure modulation
|
2019-08-13 16:48:56 +08:00
|
|
|
```
|
|
|
|
Options
|
|
|
|
---
|
2019-08-16 07:20:57 +08:00
|
|
|
<FSK|FSK1|FSK1a|FSK2|FSK2a|ASK|PSK1|PSK2|NRZ|BI|BIa> : Set modulation
|
2019-08-13 16:48:56 +08:00
|
|
|
EM is ASK
|
|
|
|
HID Prox is FSK
|
|
|
|
Indala is PSK
|
|
|
|
|
|
|
|
pm3 --> lf t55xx config FSK
|
|
|
|
```
|
|
|
|
|
2019-08-16 07:20:57 +08:00
|
|
|
Set timings to default
|
|
|
|
```
|
|
|
|
Options
|
|
|
|
---
|
2019-08-26 19:36:37 +08:00
|
|
|
p : persist to flashmemory
|
|
|
|
z : Set default t55x7 timings (use p to save if required)
|
2019-08-16 07:20:57 +08:00
|
|
|
|
|
|
|
pm3 --> lf t55xx deviceconfig z p
|
|
|
|
```
|
|
|
|
|
2019-08-13 16:48:56 +08:00
|
|
|
Write to T55xx block
|
|
|
|
```
|
2019-08-26 19:36:37 +08:00
|
|
|
b <block> : block number to write. Between 0-7
|
|
|
|
d <data> : 4 bytes of data to write (8 hex characters)
|
2019-08-13 16:48:56 +08:00
|
|
|
|
|
|
|
pm3 --> lf t55xx wr b 0 d 00081040
|
|
|
|
```
|
|
|
|
|
|
|
|
Wipe a T55xx tag and set defaults
|
|
|
|
```
|
2019-08-16 07:20:57 +08:00
|
|
|
pm3 --> lf t55xx wipe
|
2019-08-13 16:48:56 +08:00
|
|
|
```
|
|
|
|
|
|
|
|
## Data
|
2019-08-18 17:53:20 +08:00
|
|
|
^[Top](#top)
|
2019-08-13 16:48:56 +08:00
|
|
|
|
|
|
|
Get raw samples [512-40000]
|
|
|
|
```
|
2019-08-16 07:20:57 +08:00
|
|
|
pm3 --> data samples <size>
|
2019-08-13 16:48:56 +08:00
|
|
|
```
|
|
|
|
|
|
|
|
Save samples to file
|
|
|
|
```
|
2019-08-16 07:20:57 +08:00
|
|
|
pm3 --> data save <filename>
|
2019-08-13 16:48:56 +08:00
|
|
|
```
|
|
|
|
|
|
|
|
Load samples from file
|
|
|
|
```
|
2019-08-16 07:20:57 +08:00
|
|
|
pm3 --> data load <filename>
|
2019-08-13 16:48:56 +08:00
|
|
|
```
|
|
|
|
|
|
|
|
## Lua Scripts
|
2019-08-18 17:53:20 +08:00
|
|
|
^[Top](#top)
|
2019-08-13 16:48:56 +08:00
|
|
|
|
|
|
|
List Lua Scripts
|
|
|
|
|
|
|
|
```
|
2019-08-16 07:20:57 +08:00
|
|
|
pm3 --> script list
|
2019-08-13 16:48:56 +08:00
|
|
|
```
|
|
|
|
|
|
|
|
Convert .bin to .eml
|
|
|
|
```
|
|
|
|
Options
|
|
|
|
---
|
2019-08-16 07:20:57 +08:00
|
|
|
i <file> : Specifies the dump-file (input). If omitted, 'dumpdata.bin' is used
|
2019-08-13 16:48:56 +08:00
|
|
|
|
2019-08-16 07:20:57 +08:00
|
|
|
pm3 --> script run dumptoemul -i xxxxxxxxxxxxxx.bin
|
2019-08-13 16:48:56 +08:00
|
|
|
```
|
|
|
|
|
|
|
|
Format Mifare card
|
|
|
|
```
|
|
|
|
Options
|
|
|
|
---
|
|
|
|
k <key> : the current six byte key with write access
|
|
|
|
n <key> : the new key that will be written to the card
|
|
|
|
a <access> : the new access bytes that will be written to the card
|
|
|
|
x : execute the commands aswell.
|
|
|
|
|
2019-08-16 07:20:57 +08:00
|
|
|
pm3 --> script run formatMifare -k FFFFFFFFFFFF -n FFFFFFFFFFFF -x
|
|
|
|
```
|
|
|
|
|
|
|
|
## Memory
|
2019-08-18 17:53:20 +08:00
|
|
|
^[Top](#top)
|
2019-08-16 07:20:57 +08:00
|
|
|
|
|
|
|
Load default keys into memory
|
|
|
|
```
|
|
|
|
Options
|
|
|
|
---
|
2019-08-26 19:36:37 +08:00
|
|
|
o <offset> : offset in memory
|
|
|
|
f <filename> : file name
|
|
|
|
m : upload 6 bytes keys (mifare key dictionary)
|
|
|
|
i : upload 8 bytes keys (iClass key dictionary)
|
|
|
|
t : upload 4 bytes keys (pwd dictionary)
|
2019-08-16 07:20:57 +08:00
|
|
|
|
2019-08-24 05:21:20 +08:00
|
|
|
pm3 --> mem load f mfc_default_keys m
|
|
|
|
pm3 --> mem load f t55xx_default_pwds t
|
|
|
|
pm3 --> mem load f iclass_default_keys i
|
2019-08-16 07:20:57 +08:00
|
|
|
```
|
|
|
|
|
|
|
|
## Sim Module
|
2019-08-18 17:53:20 +08:00
|
|
|
^[Top](#top)
|
2019-08-16 07:20:57 +08:00
|
|
|
|
|
|
|
Upgrade Sim Module firmware
|
|
|
|
```
|
2019-08-31 04:13:51 +08:00
|
|
|
pm3 --> sc upgrade f ../tools/simmodule/sim011.bin
|
2019-08-16 07:20:57 +08:00
|
|
|
```
|
|
|
|
|
|
|
|
## Smart Card
|
2019-08-18 17:53:20 +08:00
|
|
|
^[Top](#top)
|
2019-08-16 07:20:57 +08:00
|
|
|
|
|
|
|
Get Smart Card Information
|
|
|
|
```
|
|
|
|
pm3 --> sc info
|
|
|
|
```
|
|
|
|
|
|
|
|
Act like an IS07816 reader
|
|
|
|
```
|
|
|
|
pm3 --> sc reader
|
|
|
|
```
|
|
|
|
|
|
|
|
Set clock speed
|
|
|
|
```
|
|
|
|
Options
|
|
|
|
---
|
2019-08-26 19:36:37 +08:00
|
|
|
c <speed> : clockspeed (0 = 16MHz, 1=8MHz, 2=4MHz)
|
|
|
|
|
|
|
|
pm3 --> sc setclock c 2
|
2019-08-16 07:20:57 +08:00
|
|
|
```
|
|
|
|
|
|
|
|
Send raw hex data
|
|
|
|
```
|
|
|
|
Options
|
2019-08-26 19:36:37 +08:00
|
|
|
---
|
|
|
|
r : do not read response
|
|
|
|
a : active smartcard without select (reset sc module)
|
|
|
|
s : active smartcard with select (get ATR)
|
|
|
|
t : executes TLV decoder if it possible
|
|
|
|
0 : use protocol T=0
|
|
|
|
d <bytes> : bytes to send
|
|
|
|
|
|
|
|
pm3 --> sc raw s 0 d 00a404000e315041592e5359532e4444463031 : 1PAY.SYS.DDF01 PPSE directory with get ATR
|
|
|
|
pm3 --> sc raw 0 d 00a404000e325041592e5359532e4444463031 : 2PAY.SYS.DDF01 PPSE directory
|
|
|
|
pm3 --> sc raw 0 t d 00a4040007a0000000041010 : Mastercard
|
|
|
|
pm3 --> sc raw 0 t d 00a4040007a0000000031010 : Visa
|
2019-08-16 07:20:57 +08:00
|
|
|
````
|
|
|
|
|
|
|
|
Bruteforce SPI
|
|
|
|
```
|
|
|
|
Options
|
|
|
|
---
|
|
|
|
t : executes TLV decoder if it possible
|
|
|
|
|
2019-08-26 19:36:37 +08:00
|
|
|
pm3 --> sc brute
|
2019-08-16 07:20:57 +08:00
|
|
|
pm3 --> sc brute t
|
2019-08-13 16:48:56 +08:00
|
|
|
```
|