The iceman fork
===============
-[![Build Status](https://travis-ci.org/iceman1001/proxmark3.svg?branch=master)](https://travis-ci.org/iceman1001/proxmark3) [![Coverity Status](https://scan.coverity.com/projects/5117/badge.svg)](https://scan.coverity.com/projects/proxmark3-iceman-fork) [![Latest release] (https://img.shields.io/github/release/iceman1001/proxmark3.svg)] (https://github.com/iceman1001/proxmark3/releases/latest)
+[![Build Status](https://travis-ci.org/iceman1001/proxmark3.svg?branch=master)](https://travis-ci.org/iceman1001/proxmark3) [![Coverity Status](https://scan.coverity.com/projects/5117/badge.svg)](https://scan.coverity.com/projects/proxmark3_iceman_fork) [![Latest release] (https://img.shields.io/github/release/iceman1001/proxmark3.svg)] (https://github.com/iceman1001/proxmark3/releases/latest)
##This fork is HIGHLY experimental
+##Donate
+https://paypal.me/iceman1001/
+Feel free to donate. All support is welcome.
+
##Notice
-There is so much in this fork, with all fixes and additions its basically the most enhanced fork to this day for the Proxmark3 device.
+There is so much in this fork, with all fixes and additions its basically the most enhanced fork to this day for the Proxmark3 device. Which makes it so awesum to play with. Witt all coverity scan fixes this client is much more stable than PM3 Master.
##Offical
The official Proxmark repository is found here: https://github.com/Proxmark/proxmark3
Download the Coverity Scan Self-buld and install it.
You will need to configure ARM-NON-EABI- Compiler for it to use:
-:: Configure
-cov-configure --comptype gcc --compiler /opt/devkitpro/devkitARM/bin/arm-none-eabi-gcc
+- Configure
+`cov-configure --comptype gcc --compiler /opt/devkitpro/devkitARM/bin/arm-none-eabi-gcc`
-::run it (I'm running on Ubuntu)
-cov-build --dir cov-int make all
+- run it (I'm running on Ubuntu)
+`cov-build --dir cov-int make all`
-:: make a tarball
-tar czvf proxmark3.tgz cov-int
+- make a tarball
+`tar czvf proxmark3.tgz cov-int`
-:: upload it to coverity.com
+- upload it to coverity.com
##Whats changed?
Whats so special with this fork? I have scraped the web for different enhancements to the PM3 source code and not all of them ever found their way to the master branch.
* Minor textual changes here and there.
* Simulation of Ultralight/Ntag.
* Marshmellow's and my "RevEng" addon for the client. Ref: http://reveng.sourceforge.net/ Now using reveng1.31
- * Someone's alternative bruteforce Mifare changes.. (you need the two other exe to make it work)
-
+ * J-Run alternative bruteforce Mifare nested auths.. (you need one other exe to make it work)
* A Bruteforce for T55XX passwords against tag.
* A Bruteforce for AWID 26, starting w a facilitycode then trying all 0xFFFF cardnumbers via simulation. To be used against a AWID Reader.
* A Bruteforce for HID, starting w a facilitycode then trying all 0xFFFF cardnumbers via simulation. To be used against a HID Reader.
* Blaposts Crapto1 v3.3
- * Icsom's legic script and legic enhancements
- * Aczid's bitsliced bruteforce solver in 'hf mf hardnested'
+ * Icsom's legic script and legic enhancements
+ * Aczid's bitsliced bruteforce solver in 'hf mf hardnested'
##Straight from the CHANGELOG
=============================
- - 'analyse lcr' - added a new main command group, to help analysing bytes & bits & nibbles. (iceman)
- - 'lf nedap' - added identification of a NEDAP tag. (iceman)
- - 'lf viking clone' - fixed a bug. (iceman)
- - Added bitsliced bruteforce solver in 'hf mf hardnested' (aczid)
- - 'hf mf chk' speedup (iceman)
- - 'hf 14a/mf sim x" attack mode, now uses also moebius version of mfkey32 to try finding the key. (iceman)
- - 'hf 14a sim' Added emulation of Mifare cards with 10byte UID length. (iceman)
- - 'hf mf sim' Added emulation of Mifare cards with 10byte UID length. (iceman)
- - Added `lf guard clone/sim` (iceman)
- - Added `lf pyramd clone/sim` (iceman)
- - trying to fix "hf 14b" command to be able to read CALYPSO card. (iceman)
+ - Added `hf mf key_brute` - adds J-Runs 2nd phase bruteforce ref: https://github.com/J-Run/mf_key_brute (iceman)
+ - Added `lf jablotron` - adds demod/clone/sim of Jablotron LF tags. (iceman)
+ - Added `lf t55xx recoverpw` - adds a new password recovery using bitflips and partial flips if password write went bad. (alexgrin)
+ - `hf legic` - added improved legic data mapping. (jason)
+ - `hf mf mifare` - added possibility to target key A|B (douniwan5788)
+ - Added `analyse lcr` - added a new main command group, to help analysing bytes & bits & nibbles. (iceman)
+ - Added `lf nedap` - added identification of a NEDAP tag. (iceman)
+ - `lf viking clone` - fixed a bug. (iceman)
+ - Added bitsliced bruteforce solver in `hf mf hardnested` (Aczid)
+ - `hf mf chk` speedup (iceman)
+ - `hf 14a/mf sim x` attack mode, now uses also moebius version of mfkey32 to try finding the key. (iceman)
+ - `hf 14a sim` Added emulation of Mifare cards with 10byte UID length. (iceman)
+ - `hf mf sim` Added emulation of Mifare cards with 10byte UID length. (iceman)
+ - Added `lf guard clone/sim` (iceman)
+ - Added `lf pyramd clone/sim` (iceman)
+ - trying to fix `hf 14b` command to be able to read CALYPSO card. (iceman)
- `hf legic load`, it now loads faster and a casting bug is gone. (iceman)
- - Added `hf legic calccrc8` added a method to calculate the legic crc-8 value (iceman)
+ - Added `hf legic calccrc8` added a method to calculate the legic crc-8 value (iceman)
- `hf legic decode` fixed the output overflow bugs, better printing (iceman)
- Coverity Scan fixes a lot of resource leaks, etc (iceman)
- - Added `lf presco *` commands started (iceman)
- - Added `lf hid wiegand` added a method to calculate WIEGAND in different formats, (iceman)
+ - Added `lf presco *` commands started (iceman)
+ - Added `lf hid wiegand` added a method to calculate WIEGAND in different formats, (iceman)
- `hf mf chkkeys` better printing, same table output as nested, faster execution and added Adam Lauries "try to read Key B if Key A is found" (iceman)
- `hf mf nested` better printing and added Adam Lauries "try to read Key B if Key A is found" (iceman)
- `hf mf mifare` fixing the zero parity path, which doesn't got called. (iceman)
- `hf mf c*` updated the calling structure and refactored of the chinese magic commands (iceman, marshmellow)
- Started to add Peter Fillmore's EMV fork into Iceman fork. ref: https://github.com/peterfillmore/proxmark3 (peter fillmore, iceman)
- Added Travis-CI automatic build integration with GitHub fork. (iceman)
- - Updated the Reveng 1.30 sourcecode to 1.31 from Reveng projecthomepage (iceman)
+ - Updated the Reveng 1.30 sourcecode to 1.31 from Reveng project homepage (iceman)
+ - Updated the Reveng 1.31 sourcecode to 1.40 from Reveng project homepage (iceman)
- Added possibility to write direct to a Legic Prime Tag (MIM256/1024) without using values from the 'BigBuffer' -> 'hf legic writeRaw <addr> <value>' (icsom)
- Added possibility to decrease DCF values at address 0x05 & 0x06 on a Legic Prime Tag
- Added script `legic.lua` for display and edit Data of Legic-Prime Tags (icsom)
- Added the experimental HITAG_S support (spenneb)
- Added topaz detection to `hf search` (iceman)
- - Fixed the silent mode for 14b to be used inside 'hf search' (iceman)
+ - Fixed the silent mode for 14b to be used inside `hf search` (iceman)
---
Give me a hint, and I'll see if I can't merge in the stuff you have.
GC made updates to allow this to build easily on Ubuntu 14.04.2 LTS or 15.10
See https://github.com/Proxmark/proxmark3/wiki/Ubuntu%20Linux
-Run
- -> sudo apt-get install p7zip git build-essential libreadline5 libreadline-dev libusb-0.1-4 libusb-dev libqt4-dev perl pkg-config wget
-
+- Run
+`sudo apt-get install p7zip git build-essential libreadline5 libreadline-dev libusb-0.1-4 libusb-dev libqt4-dev perl pkg-config wget libncurses5-dev`
+
Follow these instructions
Get devkitARM release 41 from SourceForge (choose either the 64/32 bit depending on your architecture, it is assumed you know how to check and recognize your architecture):
(64-bit) http://sourceforge.net/projects/devkitpro/files/devkitARM/previous/devkitARM_r41-x86_64-linux.tar.bz2/download
(32-bit) http://sourceforge.net/projects/devkitpro/files/devkitARM/previous/devkitARM_r41-i686-linux.tar.bz2/download
-Extract the contents of the .tar.bz2:
- -> tar jxvf devkitARM_r41-<arch>-linux.tar.bz2
+- Extract the contents of the .tar.bz2
+`tar jxvf devkitARM_r41-<arch>-linux.tar.bz2`
-Create a directory for the arm dev kit:
- -> sudo mkdir -p /opt/devkitpro/
+- Create a directory for the arm dev kit
+`sudo mkdir -p /opt/devkitpro/`
-Move the ARM developer kit to the newly created directory:
- -> sudo mv devkitARM /opt/devkitpro/
+- Move the ARM developer kit to the newly created directory
+`sudo mv devkitARM /opt/devkitpro/`
-Add the appropriate environment variable:
- -> export PATH=${PATH}:/opt/devkitpro/devkitARM/bin/
+- Add the appropriate environment variable
+`export PATH=${PATH}:/opt/devkitpro/devkitARM/bin/`
-Add the environment variable to your profile:
- -> echo 'PATH=${PATH}:/opt/devkitpro/devkitARM/bin/ ' >> ~/.bashrc
+- Add the environment variable to your profile
+`echo 'PATH=${PATH}:/opt/devkitpro/devkitARM/bin/ ' >> ~/.bashrc`
-Clone iceman fork
- -> git clone https://github.com/iceman1001/proxmark3.git
+- Clone iceman fork
+`git clone https://github.com/iceman1001/proxmark3.git`
-Get the latest commits
- -> git pull
+- Get the latest commits
+`git pull`
-CLEAN COMPILE
- -> make clean && make all
+- CLEAN COMPILE
+`make clean && make all`
-Flash the BOOTROM
- -> client/flasher -b /dev/ttyACM0 bootrom/obj/bootrom.elf
+- Flash the BOOTROM
+`client/flasher /dev/ttyACM0 -b bootrom/obj/bootrom.elf`
-Flash the FULLIMAGE
- -> client/flasher /dev/ttyACM0 armsrc/obj/fullimage.elf
+- Flash the FULLIMAGE
+`client/flasher /dev/ttyACM0 armsrc/obj/fullimage.elf`
-Change into the client folder.
- -> cd client
+- Change into the client folder
+`cd client`
-Run the client
- -> ./proxmark3 /dev/ttyACM0
+- Run the client
+`./proxmark3 /dev/ttyACM0`
##Homebrew (Mac OS X)
These instructions comes from @Chrisfu, where I got the proxmark3.rb scriptfile from.
[1.6.1] How to flash: https://www.youtube.com/watch?v=WXouhuGYEiw
Recommendations:
-Use only container tag [1.6.1]
+Use only container tag [1.6.4]
##Buying a proxmark3
* http://www.elechouse.com/ (new and revised hardware package 2015, located in China)
- I recommend you to buy this version.
-
##Enjoy