Proxmark Low Frequency Sniffing Part 1

Поделиться
HTML-код
  • Опубликовано: 6 окт 2024
  • Welcome to the Iceman channel!
    This video will show you how to use the low frequency sniffing function on the proxmark3. This is a great way to capture data from low frequency tags, such as 125kHz tags. We'll show you how to set up the proxmark3 and then how to use the sniffing function to capture data from a 125kHz tag against a Farpoint Pyramid P-300 series reader.
    Commands we be using:
    lf sniff -h
    lf config -h
    data plot
    lf search -1
    data save
    data load
    Smash that like button! Destroy that subscribe button!
    Get your Iceman Swag store.streamel...
    Get 5% discount on LAB401.COM by using the code ICEMAN at checkout.
    Works on all but the flipper zero category.
    Follow me on Twitter / herrmann1001
    The community discord server
    RFID Hacking by Iceman / discord
    RRG/Iceman repository for Proxmark3
    github.com/rfi...
    Citation:
    @misc{proxmark3,
    author = {C. {Herrmann}},
    title = {{Proxmark3 -- low frequency sniffing part 1}},
    howpublished = {\url{ • Proxmark Low Frequency... }},
    keywords = {iceman proxmark3 125khz 134khz low frequency sniffing},
    }

Комментарии • 31

  • @RJWolfeStunts
    @RJWolfeStunts 3 года назад +2

    Glad to see some more videos - thanks for making them and can't wait for the next ones!

    • @iceman1001
      @iceman1001  3 года назад +1

      More to come for sure!

  • @CWGminer
    @CWGminer 3 года назад +4

    Great video, I had no idea that using lf search after plotting the data would mark the bits it reads from the card. My only criticism is that the audio is quiet, could you turn up your mic gain in the future? Thanks!

    • @iceman1001
      @iceman1001  3 года назад +2

      yeah, we also pushed some fixes found during making these videos. Funny how that is.
      And yes, I notice the audio too and correct it for the latest video.

    • @CWGminer
      @CWGminer 3 года назад

      @@iceman1001 thank you for the response, I look forward to watching the rest of your videos.

  • @Hansulf
    @Hansulf 2 года назад

    Just found you helping someone on the Porxmark community and now your videos. Pretty nice!

    • @iceman1001
      @iceman1001  2 года назад +1

      Welcome aboard!
      I guess you will find your way to the discord discord.gg/iceman too?

  • @fallfur
    @fallfur 2 года назад +2

    Nice video buddy! So much thanks for the explaining of these functions!

    • @iceman1001
      @iceman1001  2 года назад

      Thanks,
      I'm glad you found it interesting.
      Don't forget to join discord.gg/iceman

  • @TheBlackBriefcase
    @TheBlackBriefcase 3 года назад +2

    Thank you! Looking forward to iclass next!

    • @iceman1001
      @iceman1001  3 года назад +2

      Not quite done with low frequency sniffing videos yet but afterwards its high frequency sniffing coverage

  • @Myppomeu
    @Myppomeu Год назад +1

    Awesome! Thank you for your great work!

  • @nu77byte49
    @nu77byte49 3 года назад +1

    Looking forward to the BH training

  • @Dannydawson537
    @Dannydawson537 2 года назад +2

    Absolutely brilliant vid absolutely smashed it sir 👍🏻🇬🇧 how do I ask questions? For my college project

    • @iceman1001
      @iceman1001  2 года назад +1

      For questions I suggest that you head over to the RFID Hacking Discord server. Excellent place to ask at

    • @Dannydawson537
      @Dannydawson537 2 года назад +1

      @@iceman1001 thanks sir very kind

  • @Gibonz
    @Gibonz Месяц назад +1

    Hi friend love the vid, and thanks!
    One question from a noob here, can Proxmark3 be held up against and sniff a T5577 reader and obtain access codes? (without having an original real access fob)

    • @iceman1001
      @iceman1001  Месяц назад +1

      That is a great question. If the Reader sends password the pm3 can sniff it.
      Otherwise you will need to sniff the t5577 writer.

  • @godjhaka7376
    @godjhaka7376 6 месяцев назад +1

    Fkn amazing

  • @Savage.735
    @Savage.735 3 года назад +1

    Nice

  • @Drforbin941
    @Drforbin941 Год назад

    Can you also use the plot window for HF as well to tell mod bitrate etc?

    • @iceman1001
      @iceman1001  Год назад

      For HF the plot window is only used in the "hf sniff" part.
      and some other exceptions.
      The "HF * INFO" commands give the needed information. Its more structured technology. LF is guessing.

  • @Drforbin941
    @Drforbin941 Год назад

    Hey ice, couple of quick questions. One, what is the use of eml, bin, and json files?
    Also on my graph while doing some t55 work I get a orange and light blue line?
    It's not the pointer lines? what do they mean?
    thank you.

    • @iceman1001
      @iceman1001  Год назад

      the files is used to store data in different formats, which you can backup your tags, share.
      blue line is demodulation plot.
      don't remember what the orange line shows out memory, have a look at the source code
      one tip is to press `h` when the plot window is active. It will print the help text in your terminal window.

    • @Drforbin941
      @Drforbin941 Год назад +1

      @@iceman1001 Help does not show what the colors represent. I don't think light blue is demod. it's just a vertical line.

  • @bougieperfectionz8414
    @bougieperfectionz8414 Год назад

    how do i save thetags on the cc i find without the phone can i just have it on standalone mode to capture cards n reverse it later on labtop or phone, i have did all steps flashed everything all that

    • @iceman1001
      @iceman1001  Год назад

      I am afraid that I ain't following what you are trying to ask about. Let me suggest you head over to the RFID Hacking discord and ask your question there instead.
      Here is a link: discord.gg/yYEbHeWD

  • @bougieperfectionz8414
    @bougieperfectionz8414 Год назад

    Why won’t my proxmark 3 rdv4 connect to /dev/ttyACM0 to find the usb ? Also the code does not operate my kali Linux to do anything worth the dmesg code to see if your the host by serial number how do I fix this iceman?

    • @iceman1001
      @iceman1001  Год назад

      it should if you followed the guides on the repo,
      otherwise I suggest jumping on the discord server and ask questions there instead.

    • @Dre-q8p
      @Dre-q8p 8 месяцев назад

      Hey did you figure it out