Research, development and trades concerning the powerful Proxmark3 device.
Remember; sharing is caring. Bring something back to the community.
"Learn the tools of the trade the hard way." +Fravia
You are not logged in.
Time changes and with it the technology
Proxmark3 @ discord
Users of this forum, please be aware that information stored on this site is not private.
Hi,
I am using Python, serial and usb commands of Proxmark3. I am sending raw data via usb, and i understood the structure of data sent thanks to Wireshark :
- Each command refers to a corresponding code (stored in include/usb_cmd.h) packed into 8 bytes,
- Each 3 arguments are packed into 8 bytes,
- Additional data may come after this frame of 32 bytes (default keys for example).
However, i have a concerning problem. Arguments for usb commands do not seem to be documented, and are hard coded into source code in hex.
Is there somewhere i can find explanations for arguments, is someone made this work on the past, or do I have to go trough the C source code and/or Wireshark output to understand each usb commands ?
Thanks in advance.
Offline
the commands are quite easy to find, or the needed usb command structure used.
https://github.com/Proxmark/proxmark3/b … /usb_cmd.h
What is used as in/out parameters, can only be found with looking at each implementation.
However like many before you have come to realise that the client implement so much functionality that making a new client is quite useless given the amount of effort to put into just to get the same functionality as current client.
Offline
Thanks you for your answer. The existing client is indeed powerfull, but it cannot be used to create more automated tests, if you do not want to parse log ...
Thanks anyway !
Offline
and that would be one of the reason for the built-in support for lua scripting. To increase the flexibilty to the client.
Offline
Yes, I began with existing and my own Lua scripts, but i wanted to see how far i could go.
Offline
And how far did you go?
Offline
Well, I decided to use libNFC which was more adapted to what I wanted to do. There is a function in the API which permits to send raw bytes, and receive raw bytes.
I kept Proxmark and usb commands for MiFARE classic cracks.
Offline
...you mean like pm3's raw commands? i.e. hf 14a raw
Offline
yes exactly, but libNFC corresponded more to the project and can be generalized on more hardware.
Offline
Interesting, which project ?
Offline
A private one I worked on
Offline