MF_Attack_hardnestedDialogHardnested AttackKnown Block:Block:ABTarget Block:MF_Sim_simDialogSimulateuUID 4 or 7 bytes. If not specified, the UID 4B from emulator memory will be used--atqaProvide explicit ATQA (2 bytes)--saknAutomatically exit simulation after <numreads> blocks have been read by reader. 0 = infiniteiInteractive, means that console will not be returned until simulation finishes or is abortedxCrack, performs the 'reader attack', nr/ar attack against a legitimate reader, fishes out the key(s)eset keys found from 'reader attack' to emulator memory (implies x(--crack) and i)-vverbose outputfProvide explicit SAK (1 byte)get UIDs to use for 'reader attack' from file 'f <filename.txt>' (implies x and i)rGenerate random nonces instead of sequential nonces. Standard reader attack won't work with this option, only moebius attack worksMF_UID_parameterDialogSet ParameterUID:ATQA:SAK:MF_trailerDecoderDialogTrailer DecoderBlocks416Trailer Data:
(like "FF0780" or "FF 07 80")Or set bits manuallyCx0Cx1Cx2Cx3Data Block Permission:Block0Block1Block2ReadWriteIncreaseDecrease/Transfer/RestoreTrailer Block Permission:KeyAAccess BitsKeyBReference:
MF1S70YYX_V1 Product data sheet
Rev. 3.2 — 23 November 2017Note:the Access Bits usually contains 4 bytes(8 hex symbols), but only the first 3 bytes matters. You can set the 4th byte randomly.Invalid!
It could make the whole sector blocked irreversibly!ValidBlockKeyA+BMainWindowProxmark3GUIConnectDisconnectMifareSelect TrailerCard TypeMINI3201K10242K20484K4096FileLoadSaveDataKeyAttackCard InfoCheck DefaultNestedHardnestedDarksideRead/WriteBlock:Key:Key Type:List DataLFotherDivisor:Actural Freq: 125.000kHzTrigger threshold:Samples to skip:Get ConfigSet ConfigData:Normal(Require Password)DumpRestoreChinese Magic Card(Without Password)Lock UFUID CardAbout UID CardSet ParameterWipeSimulateClearClient Path:Port:Refresh PortsSelect AllKeyBlocks->KeyKeyBlocks<-KeyFill KeysTrailer DecoderSet FontsRead OneWrite OneRead SelectedWrite SelectedSniffSniff(14a)LF ConfigFrequency125k134kYou might need a modified LF antenna if the freq is not 125k/134k.
When setting the freq, the "hw setlfdivisor" will also be called.Bits per sample:Decimation:Averaging:ResetLF OperationSearchRead and search for valid known tag.ReadSniff low frequency signal with LF field ON.
Use this to get raw data from a tag.TuneMeasure LF antenna tuning.
If the antenna voltage has a obvious drop after putting card on the antenna, it is likely that the tag is a LF tag.
On Iceman/RRG repo, press the button on PM3 to stop measuringSniff low frequency signal with LF field OFF.
Use this to get raw data from a reader
or the communication between a tag and a reader.T55xxBasic Configuration(Page 0 Block 0)Hex:Bin:Get from DataSet to DataLocked:Master Key:Data Bit Rate:eXtended Mode:Modulation:PSK Clock Freq:Answer on Request:One Time Pad:Max Block:Password:Seq. Terminator:Seq. Start Marker:Fast Downlink:Inverse Data:Init-Delay:Analog Front-End Option(Page 1 Block 3)Option Key:Soft Modulation:Clamp Voltage:Modulation Voltage:Clock Detection Threshold:Gap Detection Threshold:Write Dampling:Demod Delay:Downlink Protocol:T55xx Read ConfigBit Rate:Seq. Term.Offset:Inverted:T5577T5555RawCommandHistory:ClearHistorySendClearOutputSettingsClientPreload script path(Reconnect to apply):If the client requires some enviroment variables, you can make a script file(*.bat on Windows or *.sh on Linux) to configure them, then put the path of the script there.Client working directory(Reconnect to apply):On Windows, the client working directory should not be identical to the path of GUI, otherwise the client will use the wrong .dll file.Start arguments(Reconnect to apply):-f is necessary because the GUI need to handle the output in time. In some cases, the arguments should be set to "-p /dev/<port> -f" or "-p <port> -f".Config file path(Reconnect to apply):config.jsonDifferent clients require different config files. You can change the content of config file if the command format changes.Keep the client active even the PM3 hardware is disconnected.(Experimental)../data<port> -fKeep buttons enabled even the client is running or disconnectedGUILanguage: Choose Language(Restart this app to use new language)InfoPlz choose a port firstConnectedNot ConnectedFailed to openContinue?Dock all windowsVer: Check UpdateFailed to load config fileSome of the data and key will be cleared.Plz select the font of data widget and key widgetData must consists of 32 Hex symbols(Whitespace is allowed)Key must consists of 12 Hex symbols(Whitespace is allowed)Plz select the data file:Binary Data Files(*.bin *.dump)All Files(*.*)Plz select the key file:Plz select the location to save data file:Failed to save toPlz select the location to save key file:Binary Key Files(*.bin *.dump)Text Data Files(*.txt *.eml) Normally, the Block 0 of a typical Mifare card, which contains the UID, is locked during the manufacture. Users cannot write anything to Block 0 or set a new UID to a normal Mifare card. Chinese Magic Cards(aka UID Cards) are some special cards whose Block 0 are writeable. And you can change UID by writing to it.There are two versions of Chinese Magic Cards, the Gen1 and the Gen2. Gen1: also called UID card in China. It responses to some backdoor commands so you can access any blocks without password. The Proxmark3 has a bunch of related commands(csetblk, cgetblk, ...) to deal with this type of card, and my GUI also support these commands. Gen2: doesn't response to the backdoor commands, which means that a reader cannot detect whether it is a Chinese Magic Card or not by sending backdoor commands.There are some types of Chinese Magic Card Gen2. CUID Card: the Block 0 is writeable, you can write to this block repeatedly by normal wrbl command. (hf mf wrbl 0 A FFFFFFFFFFFF <the data you want to write>) FUID Card: you can only write to Block 0 once. After that, it seems like a typical Mifare card(Block 0 cannot be written to). (some readers might try changing the Block 0, which could detect the CUID Card. In that case, you should use FUID card.) UFUID Card: It behaves like a CUID card(or UID card? I'm not sure) before you send some special command to lock it. Once it is locked, you cannot change its Block 0(just like a typical Mifare card). Seemingly, these Chinese Magic Cards are more easily to be compromised by Nested Attack(it takes little time to get an unknown key).Plz select the trace file:Plz select the location to save trace file:Trace Files(*.trc)IdleStopSecBlkKeyAKeyBHW Version:PM3:State:RunningActural Freq: MifareSuccess!InfoPlz provide at least one known keyFailed!The Access Bits is invalid!
It could make the whole sector blocked irreversibly!
Continue to write?Successful!Failed to write to these blocks:Select them?Failed to read card.