Research, development and trades concerning the powerful Proxmark3 device.
Remember; sharing is caring. Bring something back to the community.
"Learn the tools of the trade the hard way." +Fravia
You are not logged in.
Time changes and with it the technology
Proxmark3 @ discord
Users of this forum, please be aware that information stored on this site is not private.
Since I don't have time nor all needed different tags/readers to test all functionality of the source of iceman fork, I turn to the community to for help.
I need a complete testing of all functionality in iceman fork OR proxmark offical release.
Just take the latest source from GitHub, and test it all out. Report back as GitHub issues when there is compilation errors, run-time errors, bugs in expected behavior. Look at the current issues to understand which problems already is known.
Offline
I have been running a lot of indala, mifare and iClass. Other than the indala fix's marshmellow commit.. Everything is working as expected. I have a list of confirmed working commands if you want.
I have access to Indala & iClass multiclass Readers including the long range R90, ASR-620, & Maxiprox if you need anything specifically run.
Last edited by Dmanufacturer (2017-08-28 11:44:25)
Offline
A list of confirmed working commands would be great. post it here, or pastebin.com it..
Offline
Confirmed working with the latest iceman fork as of 08/28/17.
iClass:
- hf iclass managekeys n 0 k <key>
- hf iclass managekeys p
- hf iclass dump k <key>
- hf iclass readblk b <block> k <key>
- hf iclass writeblk b <block> d <data> k <key>
- hf iclass eload f <file>
Indala:
- lf indala demod <value>
- lf indala clone <value>
Mifare:
- hf mf chk *1 ? d <keys_dic>
- hf mf chk *1 ? t
- hf mf hardnested 0 A <key> 4 A w
- hf mf dump
- hf mf restore
- hf mf rdsc <sector> A <key>
- hf mf rdbl <block> A <key>
- hf mf wrbl <block> A <key> <data>
- hf mf cgetsc <sector>
- hf mf cgetbl <block>
- hf mf csave u 1
- hf mf csave 1 i test
- hf mf decrypt <nt> <ar_enc> <at_enc> <data>
- hf mf nested <card mem> <blockno> <key A/B> d
HID:
- lf hid read
- lf hid demod
- lf hid wiegand 0 <fc> <cn>
- lf hid clone <id>
- lf hid sim <id>
T55xx:
- lf t55xx wr b <block> d <data>
- lf t55xx detect
- lf t55xx config
- lf t55xx wipe
Data:
- data load <file>
- data save <file>
- data rawdemod p1 32 1
- data printdemod x o 1-4
- data samples <size>
Scripts:
- script run dumptoemul.lua
- script run remagic.lua
Analyse:
- analyse hid r <key>
Last edited by Dmanufacturer (2017-08-30 08:43:50)
Offline
Thats a great list.
Are you sure about hf mf cload ? I pushed a fix today and @blackpaanda still gets an error..
Offline
Apologies, hf mf cload & hf mf csetuid were tested with the original proxmark git (Removing from the list above)
Getting the same error as blackpaanda and more on the iceman fork however the original git is still working as intended.
Iceman fork:
pm3 --> hf mf cload D3A2859F
File content error. Block data must include 32 HEX symbols
pm3 --> hf mf cload D3A2859F
#db# wupC1 error
Can't set magic card block: 0
pm3 --> hf mf cload D3A2859F
Command execute timeout
Can't set magic card block: 0
pm3 --> hf mf cload D3A2859F
#db# wupC1 error
Can't set magic card block: 0
pm3 --> hf mf cload D3A2859F
File content error. Block data must include 32 HEX symbols
Original git output:
proxmark3> hf mf cload D3A2859F
Chinese magic backdoor commands (GEN 1a) detected
Loading magic mifare 1K
Loaded from file: D3A2859F.eml
For hf mf csetuid, I had to enter the command a couple times for it to work.. either my antenna is crap or something else is wrong.
pm3 --> hf mf csetuid 01020304
--wipe card:NO uid:01 02 03 04
Command execute timeout
Couldn't get old data. Will write over the last bytes of Block 0.
new block 0: 01 02 03 04 04 00 00 00 00 00 00 00 00 00 00 00
UART:: write time-out
Sending bytes to proxmark failed
#db# wupC1 error
Can't set UID. error=2
pm3 --> hf mf csetuid 01020304
--wipe card:NO uid:01 02 03 04
old block 0: D3 A2 85 9F 6B 88 04 00 C8 01 00 20 00 00 00 16
new block 0: 01 02 03 04 04 88 04 00 C8 01 00 20 00 00 00 16
old UID:00 00 00 00
new UID:01 02 03 04
pm3 --> hf search
UID : 01 02 03 04
ATQA : 00 04
SAK : 08 [2]
TYPE : NXP MIFARE CLASSIC 1k | Plus 2k SL1 | 1k Ev1
proprietary non iso14443-4 card found, RATS not supported
Answers to magic commands (GEN 1a): YES
Prng detection: WEAK
Valid ISO14443-A Tag Found - Quiting Search
Also just ran the formatMifare lua script and that is now confirmed working. I had to uncomment the "core.console(cmd)" first.
- script run formatMifare -k <old_key> -n <new_key> -a FF0780
Last edited by Dmanufacturer (2017-08-28 15:53:34)
Offline
band aid fix for hf mf cload.
client/cmdhfmf.c
Change line 2146 from "char buf[33] = {0x00}; // 32+1 null terminator" to "char buf[256] = {0x00};"
tested and confirmed working.
Last edited by Dmanufacturer (2017-08-28 16:50:43)
Offline
This thread wasn't suppose to be filled up with issues. My idea was to report back here and start a GitHub issue when something doesn't work. The cload is fixed now.
Offline
yes, indeed, so, lets go, whatever, but a updated list of tested functionality would really be helpful..
There have been much adaptations on both offical and iceman firmware ...
Offline
Working commands in official client
hf legic decode
hf legic reader
hf legic save
hf legic load
hf legic sim
Last edited by Larision (2018-11-17 19:57:56)
Offline