Research, development and trades concerning the powerful Proxmark3 device.
Remember; sharing is caring. Bring something back to the community.
"Learn the tools of the trade the hard way." +Fravia
You are not logged in.
Time changes and with it the technology
Proxmark3 @ discord
Users of this forum, please be aware that information stored on this site is not private.
Pages: 1
Hi guys,
Thanks everyone for all of your comments in the past they have been very helpful, especially cracking open the Farpointe format. Is there a way to push blocks of data into a buffer on the Proxmark in order to emulate FSK3 without reading the data from another card? I want to push over blocks of data serially, and use the Proxmark to do an emulation for brute force attack against a reader directly. I don't think that the command set currently supports this feature, as you have to press the button on the unit in order to start the card emulation? You also have to fill the buffer with data read from another card directly? With this brute force ability, I would have the ability to contribute some more format information to the forum. Any idea Marshmellow might know?
I guess I'm looking for more detail on how SIMFSK function works than is in the manual...
Thanks!
hkplus
Last edited by hkplus (2016-06-18 18:23:30)
Offline
I think that i might have found what is needed on the forums. Going to try it out...
Offline
Would you pls share what your idea aims at hkplus? I am full ear to learn
Offline
@hkplus, it depends on what specifically you are attempting to do.
what would you like to brute force? or learn from the reader?
is it a Answer On Request type system where you want to hear a wakeup password?
do you just want to brute force a valid tag ID against a standard HID prox reader?
Offline
if you just want to know how to use simfsk see:
lf simfsk h
Offline
I want to try a bunch of sequential encodings against a card reader and see which ones make an output. I'm going to mess around with SIMFSK today and see how it works...
Offline
there is a few different bruteforce implementations, but not all works. Too little verification on the success detection step.
but that will give you some ideas. All in my fork. can't remember if they got into pm3 master.
Offline
you could likely lua script something to simfsk. but with no way to get validation from the reader you would have to watch it carefully.
Offline
I going to write an app that sends data serially to the Proxmark. Then I am going to use a data-converter to monitor the output of the reader on another serial port via the same app.
Offline
I think I saw something like that on github. A user did similar to a bruteforce, where it also looked on a webcam pic to detect if the key-try was successful. search github for brutefore and proxmark.
Offline
found it: https://github.com/mtongsang/pm3Bruter
Offline
Pages: 1