Jump to content
 







Main menu
   


Navigation  



Main page
Contents
Current events
Random article
About Wikipedia
Contact us
Donate
 




Contribute  



Help
Learn to edit
Community portal
Recent changes
Upload file
 








Search  

































Create account

Log in
 









Create account
 Log in
 




Pages for logged out editors learn more  



Contributions
Talk
 



















Contents

   



(Top)
 


1 Technical specification  



1.1  Antennas  





1.2  ADC  





1.3  FPGA  





1.4  CPU  





1.5  Flash memory  







2 Software  





3 Community  





4 Researches used Proxmark3  





5 References  














Proxmark3






Türkçe
 

Edit links
 









Article
Talk
 

















Read
Edit
View history
 








Tools
   


Actions  



Read
Edit
View history
 




General  



What links here
Related changes
Upload file
Special pages
Permanent link
Page information
Cite this page
Get shortened URL
Download QR code
Wikidata item
 




Print/export  



Download as PDF
Printable version
 
















Appearance
   

 






From Wikipedia, the free encyclopedia
 


Proxmark3
First version of Proxmark3 originally designed by Jonathan Westhues
Date invented2007
FPGAXilinx Spartan®-II
ProcessorAtmel AT91SAM7S64
Memory64 kB flash

Proxmark3 is a multi-purpose hardware tool for radio-frequency identification (RFID) security analysis, research and development. It supports both high frequency (13.56 MHz) and low frequency (125/134 kHz) proximity cards and allows users to read, emulate, fuzz, and brute force the majority of RFID protocols.[1]

Originally created by Jonathan Westhues and published as open-source hardware, it was later picked up by a community of developers who significantly improved both hardware and software in comparison with the original version. Proxmark3 gathered a large community of security researchers investigating RFID access control systems, who expand and maintain the project while using it in their own research.[2] The original Proxmark3 hardware platform served as the basis for new device versions, including commercial ones.[1]

Technical specification

[edit]

Proxmark3 is based on field-programmable gate array (FPGA) technology, which allows the implementation of high-performance low-level analog signal processing, modulation and demodulation. A separate microcontroller processes demodulated frames. Such setup potentially allows any RFID protocol to be implemented in Proxmark3's software.

Proxmark3 Hardware Blocks

Antennas

[edit]

2 independent antenna circuits are used for low frequencies (LF) 125 kHz and 134 kHz, and high frequency (HF) 13.56 MHz. Initially, both antennas were connected with a shared 4-pin Hirose USB connector, which was unreliable at times. Subsequent revisions have opted to use a separate connector for each antenna.

ADC

[edit]

8-bit Analog-to-digital converter (ADC) receives an analog signal from the antenna circuit, digitizes it and outputs the digital signal to the FPGA.

FPGA

[edit]

Field-programmable gate array does both the low-level modulation when transmitting data from CPU and demodulation when receiving a signal from an ADC. It can process various modulations such as on–off keying (OOK), amplitude-shift keying (ASK), etc. The FPGA works in two ways: as reader generating electromagnetic field for cards, or as card waiting for reader field.

CPU

[edit]

The ARM microcontroller is responsible for the protocol part. It encodes and decodes the frames (Manchester, Miller, etc) and performs more advanced functions. The CPU can reply back to the FPGA after signal handling, thus implementing the transport layer. The CPU also manages the USB communication with the PC client application.[3]

Flash memory

[edit]

Flash memory is used to store firmware. The early versions of Proxmark3 only had 64 kB of flash memory,[4] but as firmware developed that became scarce and versions with 512 kB appeared.[5]

The firmware itself consists of ARM code and an FPGA image (which is loaded by the ARM). The FPGA communicates with the ARM through either its SPI port (the ARM is the master) or its generic SSP. The SPI is used for FPGA configuration. The SSP is used for data sent over the air.[6]

Software

[edit]

At the time Proxmark3 was developed, SDR was a hard to access technology. For that reason a split FPGA/MCU architecture was designed: an FPGA handles low-level functionality such as modulation/demodulation, while a microcontroller cares for the high-level functionality (command-line interface, protocol encoding/decoding, etc). While the FPGA/MCU architecture is technically outdated, it remained unchanged throughout hardware revisions. This allowed different versions to use the same firmware and resulted in a large code-base. However, with time the Proxmark3 codebase became increasingly fractured and hardware instabilities started to appear. As a result, some implementations refine and optimize the code (for example Proxmark3 RDV4), while others use the original Proxmark3 codebase (for example Proxmark3 EVO).[5]

General commands of Proxmark3 RDV4

Proxmark3 software is divided into three parts:

Proxmark3 client application plots data sample

Older firmware used USB HID protocol to connect the client to the Proxmark3. It was not possible to stream the received samples in real-time to the PC. CPU received a command from the client, executed it and stored the result in the memory buffer. The client had to send a new command to retrieve the CPU buffered data.[7] New firmware versions use CDC serial interface to communicate with the client.[2]

Signal samples may be handled by the PC client, it can plot received data to assist in analyzing unknown signals.

Community

[edit]

Since Proxmark3's release in 2007 several RFID enthusiasts have been extending its functionality. Proxmark3 community has seen rapid growth after the release of firmware supporting the ISO/IEC 14443-A standard and appearing successful attacks on Mifare Classic. The Proxmark3 forum (registration required) became one of the main hubs for RFID system vulnerability discussion frequented by security researchers focusing on electronic access control (EAC) systems. The Proxmark community also houses developers of other RFID research tools: for example LibNFC.[8] The community Discord server was later created to host both text and voice discussions on the topic of EAC system security. It had about 3000 members at the end of 2021.

Researches used Proxmark3

[edit]

Mifare Classic cards attacks:

Mifare Classic paper:

Mifare DESFire paper:

HID iClass papers:

Hitag paper:

Megamos paper:

NFC papers:

References

[edit]
  1. ^ a b Chantzis, Fotios (2021). Practical IoT hacking : the definitive guide to attacking the internet of things. Ioannis Stais, Paulino Calderon, Evangelos Deirmentzoglou, Beau Woods. San Francisco. ISBN 978-1-7185-0091-4. OCLC 1178868866.{{cite book}}: CS1 maint: location missing publisher (link)
  • ^ a b Yang, Qing (2018). Inside radio : an attack and defense guide. Lin Huang. Singapore. ISBN 978-981-10-8447-8. OCLC 1029352620.{{cite book}}: CS1 maint: location missing publisher (link)
  • ^ Crepaldi, Paulo; Pimenta, Tales (2017-11-29). Radio Frequency Identification. BoD – Books on Demand. ISBN 978-953-51-3629-3.
  • ^ "A Test Instrument for HF/LF RFID". cq.cx. Retrieved 2021-09-15.
  • ^ a b "Proxmark 3 | Proxmark". proxmark.com. Retrieved 2021-09-15.
  • ^ "Hardware Description · Proxmark/proxmark3 Wiki". GitHub. Retrieved 2021-09-15.
  • ^ R., Garcia, F. D. Koning Gans, G.T de Verdult (2012). Tutorial: Proxmark, the Swiss Army Knife for RFID Security Research : Tutorial at 8th Workshop on RFID Security and Privacy (RFIDSec 2012). Nijmegen : Radboud University Nijmegen, ICIS. OCLC 1247335104.{{cite book}}: CS1 maint: multiple names: authors list (link)
  • ^ Koning Gans, Gerhard de (2013). Outsmarting smart cards. [S.l.: s.n.] ISBN 978-94-6191-675-4. OCLC 830879913.
  • ^ Courtois, Nicolas (2009). "Card-Only Attacks on MiFare Classic or How to Steal Your Oyster Card and Break into Buildings Worldwide" (PDF). UCL Discovery. Retrieved September 16, 2021.
  • ^ de Koning Gans, Gerhard; Hoepman, Jaap-Henk; Garcia, Flavio D. (2008), "A Practical Attack on the MIFARE Classic", Smart Card Research and Advanced Applications, Lecture Notes in Computer Science, vol. 5189, Berlin, Heidelberg: Springer Berlin Heidelberg, pp. 267–282, arXiv:0803.2285, doi:10.1007/978-3-540-85893-5_20, ISBN 978-3-540-85892-8, S2CID 1280839
  • ^ Flynn, Rory. "An investigation of possible attacks on the MIFARE DESFire EV1 smartcard used in public transportation" (PDF). Retrieved September 16, 2021.
  • ^ "Heart of Darkness - exploring the uncharted backwaters of HID iCLASS security" (PDF). Retrieved September 16, 2021.
  • ^ Verdult, Roel; Garcia, Flavio; Balasch, Josep (2012). Gone in 360 Seconds: Hijacking with Hitag2. [S.l.] : USENIX Association. OCLC 1247338434.
  • ^ Verdult, Roel; Garcia, Flavio; Ege, Baris. "Dismantling Megamos Crypto: Wirelessly Lockpicking a Vehicle Immobilizer" (PDF). Archived (PDF) from the original on 2015-09-10. Retrieved February 4, 2023.
  • ^ Verdult, Roel; Kooman, Francois (February 2011). "Practical Attacks on NFC Enabled Cell Phones". 2011 Third International Workshop on Near Field Communication. pp. 77–82. doi:10.1109/NFC.2011.16. hdl:2066/92208. ISBN 978-1-61284-176-2. S2CID 16296134.

  • Retrieved from "https://en.wikipedia.org/w/index.php?title=Proxmark3&oldid=1193755467"

    Categories: 
    Radio-frequency identification
    Open-source hardware
    Computer-related introductions in 2007
    Hidden categories: 
    CS1 maint: location missing publisher
    CS1 maint: multiple names: authors list
    Articles with self-published sources from September 2021
    All articles with self-published sources
     



    This page was last edited on 5 January 2024, at 13:08 (UTC).

    Text is available under the Creative Commons Attribution-ShareAlike License 4.0; additional terms may apply. By using this site, you agree to the Terms of Use and Privacy Policy. Wikipedia® is a registered trademark of the Wikimedia Foundation, Inc., a non-profit organization.



    Privacy policy

    About Wikipedia

    Disclaimers

    Contact Wikipedia

    Code of Conduct

    Developers

    Statistics

    Cookie statement

    Mobile view



    Wikimedia Foundation
    Powered by MediaWiki