Difference between revisions of "RFID with the Proxmark3"

From csn
Jump to navigation Jump to search
 
(39 intermediate revisions by the same user not shown)
Line 1: Line 1:
== Connecting to the Proxmark3 ==
+
The proxmark is an RFID security tool that is capable of reading from and writing to a range of different RFID cards. Usually RFID readers and writers come from a hardware vendor that only works with a specific frequency and card type. This is much the same as WiFi radios, they are only designed for a narrow frequency set and to talk a single protocol. The proxmark is a swiss army knife of RFID. You could also think of it as a software-defined radio for RFID. Like a lot of security testing tools, it is designed with the expert in mind and does not come with a point and click GUI
  
Plug in the Proxmark3 and:  
+
Start by plugging the Proxmark into your computer and connecting it through to your Ubuntu virtual machine.
 +
 
 +
[[File:pm3.png|thumb|600px|right|alt=Introducing the Proxmark3 RDV4|Indroducing the Proxmark3 RDV4]]
 +
 
 +
<!-- Jimmy was here
 +
 
 +
'''Please don't plug in your proxmark into your computer until you are instructed to. They are expensive and somewhat easy to brick during the setup phase.'''
 +
== The install ==
 +
 
 +
Start your install on Ubuntu with your proxmark not plugged into your PC.
 +
 
 +
The guide below is a composite of:
 +
 
 +
https://github.com/RfidResearchGroup/proxmark3
 +
 
 +
You must remove modem manager to eliminate the chance of bricking your Proxmark
 +
 
 +
sudo apt remove modemmanager
 +
 
 +
Update the packages list
 +
 
 +
sudo apt-get update
 +
 
 +
Install the requirements
 +
 
 +
sudo apt-get install --no-install-recommends git ca-certificates build-essential pkg-config libreadline-dev gcc-arm-none-eabi libnewlib-dev qtbase5-dev libbz2-dev libbluetooth-dev libssl-dev liblz4-dev
 +
 
 +
 
 +
Get the Proxmark git repo
 +
 
 +
git clone https://github.com/RfidResearchGroup/proxmark3.git
 +
 
 +
Move into the directory with:
 +
 
 +
cd proxmark3
 +
 
 +
Then:
 +
 
 +
sudo make udev
 +
 
 +
Get permissions to use /dev/ttyACM0 by adding the current user to the proper group to get permission to use /dev/ttyACM0. This step can be done from the RRG/Iceman Proxmark3 repo with
 +
 
 +
make accessrights
 +
make
 +
 
 +
'''Reboot Linux now and plug in the Proxmark3'''
 +
 
 +
[[File:prox_vm_connect.png|thumb|600px|right|alt=When you plug in your proxmark3, you '''Must''' check the following boxes to connect it through to Linux. If you stuff this up, then start again, as you won't have the admin creds on the Windows SOE to release host's (Windows) hold.| When you plug in your proxmark3, you '''Must''' check the following boxes to connect it through to Linux. If you stuff this up, then start again, as you won't have the admin creds on the Windows SOE to release host's (Windows) hold.]]
 +
 
 +
Pull up a fresh terminal, post reboot, then:
 +
 
 +
cd proxmark3
 +
 
 +
Then:
 +
 
 +
./pm3-flash-all
 +
 
 +
-->
 +
 
 +
Perform a:  
  
 
  sudo dmesg | grep -i USB
 
  sudo dmesg | grep -i USB
  
to check that it is installed
+
to check that the proxmark looks visible oven USB. Then:
 +
 
 +
cd proxmark3
  
 
== Using the Proxmark 3 ==
 
== Using the Proxmark 3 ==
[[File:pm3.png|thumb|600px|right|alt=Indroducing the Proxmark3 RDV4|Indroducing the Proxmark3 RDV4]]
+
 
 
Then you can start proxmark with  
 
Then you can start proxmark with  
  
  proxmark3 /dev/ttyACM0
+
  ./pm3
  
 
Have a play with the following commands:  
 
Have a play with the following commands:  
  
 
  [usb] pm3 --> hw status
 
  [usb] pm3 --> hw status
 +
 +
Who and what is Iceman? Can you find the Github repo?
 +
 
  [usb] pm3 --> hw version
 
  [usb] pm3 --> hw version
[usb] pm3 --> hw tune
 
  
Run the following to make sure your card is prepared:
+
What is the embedded processor and instruction set of the Proxmark you have?
  
  [usb] pm3 --> script run init_rdv4
+
  [usb] pm3 --> hw tune
 
 
The following command upgrades your device sim module firmware. Don't not turn off your device during the execution of this command!! Even its a quite fast command you should be warned. You may brick it if you interrupt it.
 
  
[usb] pm3 --> smart upgrade -f /usr/local/share/proxmark3/firmware/sim011.bin
+
What frequency is Low Frequency RFID? What Frequency is High Frequency RFID?
  
 
To get an overview of the available commands for LF RFID and HF RFID:
 
To get an overview of the available commands for LF RFID and HF RFID:
  
 
  [usb] pm3 --> lf  
 
  [usb] pm3 --> lf  
 +
 +
How many low frequency tags are supported?
 +
 
  [usb] pm3 --> hf
 
  [usb] pm3 --> hf
 +
 +
How many high frequency tags are supported?
  
 
To search quickly for known LF or HF tags:
 
To search quickly for known LF or HF tags:
Line 36: Line 102:
 
  [usb] pm3 --> lf search
 
  [usb] pm3 --> lf search
 
  [usb] pm3 --> hf search
 
  [usb] pm3 --> hf search
 
An easy approach is to:
 
 
hf mf autopwn
 
  
 
== Tune for LF and HF ==
 
== Tune for LF and HF ==
Line 52: Line 114:
  
 
Here you are looking for the card to "couple". So the lower the voltage drops the more the RFID card is drawing from the system and the better the read you will get.
 
Here you are looking for the card to "couple". So the lower the voltage drops the more the RFID card is drawing from the system and the better the read you will get.
 +
 +
== Play with the practice RFID cards ==
 +
 +
Take 4 RFID tags/cards from the practice cards for each of them, can you identify:
 +
*Is this a low-frequency or high-frequency tag?
 +
*What type of card is it, and which group might have manufactured it?
 +
 +
= Start your Skills Test here =
 +
 +
At this point, you are ready to start your skills test. Use the materials below as well as your tutor as a guide to complete your skills test as a group.
 +
 +
== LF T5577 card ==
 +
[[File:lf.png|thumb|600px|right|alt=Low Frequency capability|Low Frequency capability]]
 +
If you think this could be a T55xx you can run a:
 +
 +
lf t55 detect
 +
 +
This should return the type of card. You can then examine the datasheet here: http://ww1.microchip.com/downloads/en/DeviceDoc/ATA5577C-Read-Write-LF-RFID-IDIC-100-to-150-kHz-Data-Sheet-DS70005357B.pdf
 +
 +
You can try to read all of the blocks with the following command:
 +
 +
lf t55xx dump
 +
 +
This should dump all the blocks on the t55xx card
  
 
== HF Mifare ==
 
== HF Mifare ==
[[File:hf.png|thumb|600px|right|alt=High Frequency capability|High Frequency capability]]
+
[[File:hf.png|thumb|500px|right|alt=High Frequency capability|High Frequency capability]]
 
High Frequency Mifare cards are also super common. You should be able to detect one with the standard:
 
High Frequency Mifare cards are also super common. You should be able to detect one with the standard:
  
Line 65: Line 151:
 
This should reveal all the different types of cards that can be read. Try to correlate the previous info from ''hf search'' against the info that you see in the image to the right. You could now try a:
 
This should reveal all the different types of cards that can be read. Try to correlate the previous info from ''hf search'' against the info that you see in the image to the right. You could now try a:
  
  hf 14a info
+
  hf mfu info
  
 
If that reveals that it is a gen 1a then you could consider executing a command frame the following block:
 
If that reveals that it is a gen 1a then you could consider executing a command frame the following block:
  
[[File:gen1a.png|thumb|600px|right|alt=HF MF Gen 1a|HF MF Gen 1a]]
+
[[File:mf.png|thumb|400px|right|alt=Generic Mifare commands|Generic Mifare commands]]
  
Probably a more generic set of commands are those that sit under the operations OR Recovery banners. In theory, these should work on all the Mifare cards.
+
Often the proxmark software will prompt you for a command to try.
  
You could also read the entire card with:
+
  hf mfu dump
 
 
  pm3 --> hf mf autopwn
 
  
 
You would then open a separate terminal and:  
 
You would then open a separate terminal and:  
Line 81: Line 165:
 
  xxd hf-mf-ABCEDFIG-dump.bin
 
  xxd hf-mf-ABCEDFIG-dump.bin
  
This should provide you with the binary output.
+
This should provide you with the binary output of the card.
 
 
== LF T5577 card ==
 
[[File:lf.png|thumb|600px|right|alt=Low Frequency capability|Low Frequency capability]]
 
If you think this could be a T55xx you can run a:
 
 
 
lf t55 detect
 
 
 
This should return the type of card. You can then examine the datasheet here: http://ww1.microchip.com/downloads/en/DeviceDoc/ATA5577C-Read-Write-LF-RFID-IDIC-100-to-150-kHz-Data-Sheet-DS70005357B.pdf
 
 
 
You can try to read all of the blocks with the following command:
 
 
 
lf t55xx read -b 0
 
 
 
You should keep incrementing the block number so that you can pull out all of the data.
 

Latest revision as of 01:36, 24 October 2023

The proxmark is an RFID security tool that is capable of reading from and writing to a range of different RFID cards. Usually RFID readers and writers come from a hardware vendor that only works with a specific frequency and card type. This is much the same as WiFi radios, they are only designed for a narrow frequency set and to talk a single protocol. The proxmark is a swiss army knife of RFID. You could also think of it as a software-defined radio for RFID. Like a lot of security testing tools, it is designed with the expert in mind and does not come with a point and click GUI

Start by plugging the Proxmark into your computer and connecting it through to your Ubuntu virtual machine.

Introducing the Proxmark3 RDV4
Indroducing the Proxmark3 RDV4


Perform a:

sudo dmesg | grep -i USB

to check that the proxmark looks visible oven USB. Then:

cd proxmark3

Using the Proxmark 3

Then you can start proxmark with

./pm3

Have a play with the following commands:

[usb] pm3 --> hw status

Who and what is Iceman? Can you find the Github repo?

[usb] pm3 --> hw version

What is the embedded processor and instruction set of the Proxmark you have?

[usb] pm3 --> hw tune

What frequency is Low Frequency RFID? What Frequency is High Frequency RFID?

To get an overview of the available commands for LF RFID and HF RFID:

[usb] pm3 --> lf 

How many low frequency tags are supported?

[usb] pm3 --> hf

How many high frequency tags are supported?

To search quickly for known LF or HF tags:

[usb] pm3 --> lf search
[usb] pm3 --> hf search

Tune for LF and HF

Move the card around and watch for the voltage to drop
Move the card around and watch for the voltage to drop

If you are having trouble getting a read try

lf tune --mix

OR

hf tune --mix

Here you are looking for the card to "couple". So the lower the voltage drops the more the RFID card is drawing from the system and the better the read you will get.

Play with the practice RFID cards

Take 4 RFID tags/cards from the practice cards for each of them, can you identify:

  • Is this a low-frequency or high-frequency tag?
  • What type of card is it, and which group might have manufactured it?

Start your Skills Test here

At this point, you are ready to start your skills test. Use the materials below as well as your tutor as a guide to complete your skills test as a group.

LF T5577 card

Low Frequency capability
Low Frequency capability

If you think this could be a T55xx you can run a:

lf t55 detect

This should return the type of card. You can then examine the datasheet here: http://ww1.microchip.com/downloads/en/DeviceDoc/ATA5577C-Read-Write-LF-RFID-IDIC-100-to-150-kHz-Data-Sheet-DS70005357B.pdf

You can try to read all of the blocks with the following command:

lf t55xx dump

This should dump all the blocks on the t55xx card

HF Mifare

High Frequency capability
High Frequency capability

High Frequency Mifare cards are also super common. You should be able to detect one with the standard:

hf search

If you find a tag record what sort of tag you think it could be. Try just typing:

hf

This should reveal all the different types of cards that can be read. Try to correlate the previous info from hf search against the info that you see in the image to the right. You could now try a:

hf mfu info

If that reveals that it is a gen 1a then you could consider executing a command frame the following block:

Generic Mifare commands
Generic Mifare commands

Often the proxmark software will prompt you for a command to try.

hf mfu dump

You would then open a separate terminal and:

xxd hf-mf-ABCEDFIG-dump.bin

This should provide you with the binary output of the card.