Research, development and trades concerning the powerful Proxmark3 device.
Remember; sharing is caring. Bring something back to the community.
"Learn the tools of the trade the hard way." +Fravia
Time changes and with it the technology
Proxmark3 @ discord
Users of this forum, please be aware that information stored on this site is not private.
Hi guys,
Thanks everyone for all of your comments in the past they have been very helpful, especially cracking open the Farpointe format. Is there a way to push blocks of data into a buffer on the Proxmark in order to emulate FSK3 without reading the data from another card? I want to push over blocks of data serially, and use the Proxmark to do an emulation for brute force attack against a reader directly. I don't think that the command set currently supports this feature, as you have to press the button on the unit in order to start the card emulation? You also have to fill the buffer with data read from another card directly? With this brute force ability, I would have the ability to contribute some more format information to the forum. Any idea Marshmellow might know?
I guess I'm looking for more detail on how SIMFSK function works than is in the manual...
Thanks!
hkplus
Last edited by hkplus (2016-06-18 18:23:30)
@hkplus, it depends on what specifically you are attempting to do.
what would you like to brute force? or learn from the reader?
is it a Answer On Request type system where you want to hear a wakeup password?
do you just want to brute force a valid tag ID against a standard HID prox reader?
if you just want to know how to use simfsk see:
lf simfsk h
there is a few different bruteforce implementations, but not all works. Too little verification on the success detection step.
but that will give you some ideas. All in my fork. can't remember if they got into pm3 master.
you could likely lua script something to simfsk. but with no way to get validation from the reader you would have to watch it carefully.
I think I saw something like that on github. A user did similar to a bruteforce, where it also looked on a webcam pic to detect if the key-try was successful. search github for brutefore and proxmark.
found it: https://github.com/mtongsang/pm3Bruter