Research, development and trades concerning the powerful Proxmark3 device.
Remember; sharing is caring. Bring something back to the community.
"Learn the tools of the trade the hard way." +Fravia
Time changes and with it the technology
Proxmark3 @ discord
Users of this forum, please be aware that information stored on this site is not private.
Hi,
I am using Python, serial and usb commands of Proxmark3. I am sending raw data via usb, and i understood the structure of data sent thanks to Wireshark :
- Each command refers to a corresponding code (stored in include/usb_cmd.h) packed into 8 bytes,
- Each 3 arguments are packed into 8 bytes,
- Additional data may come after this frame of 32 bytes (default keys for example).
However, i have a concerning problem. Arguments for usb commands do not seem to be documented, and are hard coded into source code in hex.
Is there somewhere i can find explanations for arguments, is someone made this work on the past, or do I have to go trough the C source code and/or Wireshark output to understand each usb commands ?
Thanks in advance.
the commands are quite easy to find, or the needed usb command structure used.
https://github.com/Proxmark/proxmark3/b … /usb_cmd.h
What is used as in/out parameters, can only be found with looking at each implementation.
However like many before you have come to realise that the client implement so much functionality that making a new client is quite useless given the amount of effort to put into just to get the same functionality as current client.
Well, I decided to use libNFC which was more adapted to what I wanted to do. There is a function in the API which permits to send raw bytes, and receive raw bytes.
I kept Proxmark and usb commands for MiFARE classic cracks.