Skip to content

Proxmark3

RFID/NFC research and penetration testing tool

Description

Proxmark3 is the most powerful RFID/NFC research tool. It reads, writes, emulates, and clones contactless cards at both low frequency (125 kHz) and high frequency (13.56 MHz). Essential for physical penetration testing.

Installation

BASH
# Install client (RRG/Iceman fork)
git clone https://github.com/RfidResearchGroup/proxmark3
cd proxmark3
make clean && make all
sudo make install

# Connect
pm3          # Auto-detect
pm3 /dev/ttyACM0

Basic Usage

BASH
# Auto-detect card
pm3 --> auto

# LF (125 kHz) operations
pm3 --> lf search          # Detect LF card
pm3 --> lf hid read        # Read HID ProxCard
pm3 --> lf em 410x read    # Read EM4100

# HF (13.56 MHz) operations
pm3 --> hf search          # Detect HF card
pm3 --> hf mf info         # Mifare Classic info
pm3 --> hf 14a info        # ISO 14443A info

Advanced Usage

BASH
# Clone HID card
pm3 --> lf hid read                     # Read original
pm3 --> lf hid clone --raw 2006EC0C86   # Write to T5577

# Mifare Classic attack
pm3 --> hf mf autopwn     # Automatic key recovery
pm3 --> hf mf dump        # Dump all sectors
pm3 --> hf mf restore     # Write to blank card

# Simulate card (no write needed)
pm3 --> lf hid sim --raw 2006EC0C86
pm3 --> hf mf sim --uid DEADBEEF

# Brute force facility codes
pm3 --> lf hid brute --fc 1 --cn 1-65535

# Sniff communication
pm3 --> hf sniff
pm3 --> lf sniff

Common Workflows

BASH
# Physical pentest card cloning
pm3 --> lf search    # or hf search
pm3 --> lf hid read  # Read badge
pm3 --> lf hid clone --raw <ID>  # Clone to T5577
# Test at target access point