-
-
Notifications
You must be signed in to change notification settings - Fork 1.2k
Description
No access to discord, so i post it here ...
Using this:
[usb] pm3 --> hw version
[ Proxmark3 RFID instrument ]
[ Client ]
Iceman/master/v4.18994-552-g325376d7e-suspect 2024-11-21 20:36:26 a3319015f
compiled with............. MinGW-w64 13.2.0
platform.................. Windows (64b) / x86_64
Readline support.......... present
QT GUI support............ present
native BT support......... absent
Python script support..... absent
Python SWIG support....... absent
Lua script support........ present ( 5.4.6 )
Lua SWIG support.......... present
[ Proxmark3 ]
firmware.................. PM3 GENERIC
[ ARM ]
bootrom: Iceman/master/v4.18994-552-g325376d7e-suspect 2024-11-21 20:35:52 a3319015f
os: Iceman/master/v4.18994-552-g325376d7e-suspect 2024-11-21 20:36:00 a3319015f
compiled with GCC 12.2.0
[ FPGA ]
fpga_pm3_hf.ncd image 2s30vq100 2024-02-03 15:12:20
fpga_pm3_lf.ncd image 2s30vq100 2024-02-03 15:12:10
fpga_pm3_felica.ncd image 2s30vq100 2024-02-03 15:12:41
fpga_pm3_hf_15.ncd image 2s30vq100 2024-02-03 15:12:31
[ Hardware ]
--= uC: AT91SAM7S512 Rev B
--= Embedded Processor: ARM7TDMI
--= Internal SRAM size: 64K bytes
--= Architecture identifier: AT91SAM7Sxx Series
--= Embedded flash memory 512K bytes ( 65% used )
[usb] pm3 -->
I got a card for a combined fingerprint/nfc terminal from hipsecurity.com:
[usb] pm3 --> hf mf info
[=] --- ISO14443-a Information ---------------------
[+] UID: EB 80 nn nn
[+] ATQA: 00 04
[+] SAK: 08 [2]
[=] --- Keys Information
[+] loaded 2 user keys
[+] loaded 61 hardcoded keys
[+] Sector 0 key A... FFFFFFFFFFFF
[+] Sector 0 key B... FFFFFFFFFFFF
[+] Sector 1 key A... FFFFFFFFFFFF
[+] Backdoor key..... A31667A8CEC1
[+] Block 0.... EB80nnnn1F08040090FAF10326420188
[=] --- Fingerprint
[+] Unknown card with backdoor, please report details!
[=] --- Magic Tag Information
[=] <n/a>
[=] --- PRNG Information
[+] Prng....... weak
[usb] pm3 -->