-40%
New Proxmark3 NFC PM3 RFID Writer For RFID NFC Card Copier Clone 2 USB Port 512K
$ 41.18
- Description
- Size Guide
Description
Note: we support the firmware of ICEMAN, LB, Offical2.0, off-line, if you need any firmware, pls leave message when you place order, we can flash it for you!for this link, usually we flash Offical2.0's firmware .
If you need the all firmware, pls leave your email.
New hardware update:
1.
Bundle1
has 2 USB Ports: one is for powerbank, another can be off-line sniffing, office 2.0 firmware installed
2.
Bundle2
has 1 USB ports, Iceman firmware installed
2. AT91SAM7S256 up to AT91SAM7S512
Software and video tutorial is provided upon request after purchase
Compared with PM3 RD V2.0 improvement:
1. Built-in high-frequency antenna, antenna depth matching, eliminate blind spots, read the whole card data flowing without interruption.
2. increase Parse the secret key rate , the size of the card takes all.
3. sniffing data, complete stable, low error rate.
4. The low frequency antenna to improve the signal to noise ratio, the higher the recognition rate, detachable design to meet various needs.
5. No antenna interface, did not need have to plug because it is easy to damaged.
6. Cancel the lithium battery, simple and convenient. (Offline can use mobile power supply)
7. In addition to the original relay and other unrelated, low cost, lightweight and portable.
Compatible with all official firmware, according to need to brush any version.
According to your preference, you can use the official "Command Line" or "Proxmark Tool.exe" to operate
(Low frequency antenna installed on the right side)
# LF antenna: 30.41 V @ 125.00 kHz
# LF antenna: 22.01V @ 134.00 kHz
# HF antenna: 28.43V @ 13.56 MHz
(Low frequency antenna installed on the left)
Operating voltage: 3.5-5.5V
Current job: 50-130mA
Length and width dimensions: 54mm * 86.6mm
The thickness: 6.2mm (thinnest) 9.8mm (plus screw) 15.8 (plus low frequency antenna)
This software only has chinese version now:
function:
high frequency:
Operating card mode:
1. Conventional M1 S50 card reader and other 14443A Class B card.
2. Use the PRNG vulnerability parsing sector 0.
3. Use nested (mfoc) vulnerability resolve the whole card.
Analog card mode:
1. Analog Mifare series S50 / Ultralight / DESFire card UID.
2. Analog M1 S50 whole sector data. (Pick a card reader)
3. Analog M1 S50 shell, to obtain data to calculate the secret key (pick a card reader)
Silent mode:
1. Silent sniffer data communication between the M1 S50 card and card reader, analytical secret key.
2. Silent sniffing 14443A Class B card reader with a complete communications data.
Reader device can be used for debugging and behavior analysis.
Low Frequency:
Operating card mode:
1. read ID, HID, T55XX, Indala and other low-frequency card.
2. By T55XX card write ID / HID / Indala, turned into three cards.
Analog card mode:
1. Enter ID / HID card, analog to the specified card type.
2. Analog modulation schemes specified data cards and ASK / FSK / PSK
Silent Mode:
1. silently sniff data between the card and the reader (less, not tested)