I kept Proxmark and usb commands for MiFARE classic cracks.
]]>Thanks anyway !
]]>https://github.com/Proxmark/proxmark3/b … /usb_cmd.h
What is used as in/out parameters, can only be found with looking at each implementation.
However like many before you have come to realise that the client implement so much functionality that making a new client is quite useless given the amount of effort to put into just to get the same functionality as current client.
]]>I am using Python, serial and usb commands of Proxmark3. I am sending raw data via usb, and i understood the structure of data sent thanks to Wireshark :
- Each command refers to a corresponding code (stored in include/usb_cmd.h) packed into 8 bytes,
- Each 3 arguments are packed into 8 bytes,
- Additional data may come after this frame of 32 bytes (default keys for example).
However, i have a concerning problem. Arguments for usb commands do not seem to be documented, and are hard coded into source code in hex.
Is there somewhere i can find explanations for arguments, is someone made this work on the past, or do I have to go trough the C source code and/or Wireshark output to understand each usb commands ?
Thanks in advance.
]]>