The Elechouse Proxmark3 Dev Kit 2 (RDV2) is the most recent addition to the Proxmark family. This redesign offers increased portability through smaller board dimensions and support for an on-board battery (sold separately). The main board measures a mere 82 mm x 38 mm. Unfortunately, this version is not open source at the moment but a schematic for its predecessor, the RDV1 is available online.
Inside the box you'll find an Elechouse Proxmark3, PCB Sandwich Enclosure Assembly, 125kHz LF Antenna, 13.56Mhz HF Antenna, MMCX antenna cables, Power Cable, and Tag Bundle. The specific tags included in the bundle can be found under the Specifications tab. The Proxmark client software and firmware are open source and available for download. The RDV2 ships preprogrammed running Asper's binary builds. See the links tab for client software builds.
Below is a quick comparison of the Rysc Corp and Elechouse Proxmark3.
|Antenna Type||PCB||Wound wire|
|Antenna Connector||4-pin Mini USB||MMCX|
|Dimensions||82 mm x 52 mm||82 mm x 38 mm|
|Open Source Hardware||Yes||No|
|FPGA||Spartan 2||Spartan 2|
|Fully Enclosed Board||Yes||No|
$159.00 USD $179.00 USD
Based on the open-source RFID emulator ChameleonMini: https://github.com/emsec/
The credit-card sized ChameleonMini Rev.G is a versatile tool for practical NFC and RFID security analysis, compliance and penetration tests, and various end-user applications. The freely programmable platform can create perfect clones of various existing commercial smartcards, including cryptographic functions and the Unique Identifier (UID). It can be employed to assess security aspects in RFID and NFC environments in different attack scenarios, such as replay or relay attacks, state restoration attacks, sniffing of NFC communication, or functional tests of RFID equipment. New firmware for the ChameleonMini can be comfortably uploaded via a USB bootloader. A convenient, human-readable command set allows to configure its behavior and update the settings and content of up to eight internally stored, virtualized contactless cards. During battery-powered stand-alone operation, the integrated buttons and LEDs enable user interaction and feedback.
The ChameleonMini firmware can be configured and uploaded via USB to emulate a passive NFC device (e.g. a contactless card), act as an active NFC device (e.g. an RFID reader), sniff the communication (i.e. monitor the bits on the RF interface), and log the communication (during emulation and sniffing). The ChameleonMini can be interfaced with standard terminal software, via the command line, or controlled by user-written scripts and applications. The modular firmware structure allows for easy expandability to other not yet supported cards and standards. Various functions and settings can be assigned to the buttons and LEDs. Card contents can be easily uploaded and downloaded via USB using X-MODEM.
Features of the ChameleonMini:
|ChameleonMini RevE-2||ChameleonMini Rev.G|
|Operating Distance||Up to 30 mm||Up to 60 mm|
In addition to monitoring bluetooth communications, the Ubertooth One can also be used as a 2.4Ghz spectrum analyzer.
WARNING: The Ubertooth One is test equipment for Bluetooth systems. It has not been tested for compliance with regulations governing transmission of radio signals. You are responsible for using your Ubertooth One legally.
Sold Out $105.00 USD
The FaceDancer21 is an open source project created by Travis Goodspeed. It is an extension of the GoodFET design that facilitates security testing of USB device drivers. The device is controlled using python "clients".
The main purpose of this board is to allow USB devices to be written in host-side Python, so that one workstation can fuzz-test the USB device drivers of another host. For example, one of these clients permits the device to pretend to be a USB HID keyboard.
The FaceDancer21 comes fully assembled, programmed and tested. Please see the links tab for additional information. Note that the FaceDancer21 and GoodFET share the same code base.
YARD Stick One is a sub-1 GHz wireless transceiver controlled directly from your computer. It uses the same radio circuit as the popular IM-Me. The radio functions that are possible by customizing IM-Me firmware are now at your fingertips when you attach YARD Stick One to a computer via USB. The YARD Stick One fits neatly inside our YARD Stick One Enclosure.
YARD Stick One (Yet Another Radio Dongle) comes with RfCat firmware installed, courtesy of atlas. RfCat allows you to control the wireless transceiver from an interactive Python shell or your own program running on your computer. YARD Stick One also has CC Bootloader installed, so you can upgrade RFCat or install your own firmware without any additional programming hardware.
Originally based on the ToorCon 14 Badge design, YARD Stick One has several featured not previously seen in CC1111 dongles:
The USB Armory Kit from Inverse Path is an open source hardware design, implementing a flash drive sized computer. The kit Includes a USB Armory, Enclosure and Host Adapter. The USB Armory Kit can be purchased with or without an SD Card. The SD Card is pre-loaded with Debian and can simplify the process of getting started with the device.
The compact USB powered device provides a platform for developing and running a variety of applications.
The security features of the USB Armory System on a Chip (SoC), combined with the openness of the board design, empower developers and users with a fully customizable USB trusted device for open and innovative personal security applications.
The hardware design features the Freescale i.MX53 processor, supporting advanced security features such as secure boot and ARM® TrustZone®.
The USB armory hardware is supported by standard software environments and requires very little customization effort. In fact vanilla Linux kernels and standard distributions run seamlessly on the tiny USB armory board.
The USB armory board has been created by Inverse Path to support the development of a variety of security applications.
The capability of emulating arbitrary USB devices in combination with the i.MX53 SoC speed, the security features and the flexible and fully customizable operating environment, makes the USB armory the ideal platform for all kinds of personal security applications.
The transparency of the open and minimal design for the USB armory hardware facilitates auditability and greatly limits the potentiality and scope of supply chain attacks.
The secure boot feature allows users to fuse verification keys that ensure only trusted firmware can be ever executed on a specific USB armory board.
The support for ARM® TrustZone®, in contrast to conventional TPMs, allows developers to engineer custom trusted platform modules by enforcing domain separation, between the "secure" and "normal" worlds, that propagates throughout all SoC components, and therefore not only limited to the CPU core.
An excellent overview of the technology and its support for the i.MX53 SoC can be found at the Genode framework project.
Proof of concept applications have already been tested and will soon be released.
The following example security application ideas illustrate the flexibility of the USB armory concept:
Standard connectivity options:
Step by step instructions for getting started with the Proxmark3 Client V2.3.0 on Windows, Linux, and macOS (OS X).