""" DES Talk - A Proxmark3 DESFire Communication Tool Copyright (C) 2025 Trigat Description: This script simplifies the creation and deletion of DESFire applications and files. It supports USB, Bluetooth, and Termux connections and has been tested on Android and Linux. Note: Modify TCP_PORT below if using TCP app with Android or Termux License: GNU General Public License v3.0 This program is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. Full license text: """ import subprocess import time import os import re try: import pm3 # Used when inside the pm3 environment PM3_AVAILABLE = True p = pm3.pm3() except ImportError: PM3_AVAILABLE = False # Use subprocess instead # SPECIFY PORT IF USING TCP APP WITH ANDROID OR TERMUX TCP_PORT = 4444 def detect_proxmark_device(): # Detect the Proxmark3 connection type (USB, Bluetooth, or TCP). try: # Try running `pm3 --list` to detect available Proxmark devices result = subprocess.run(["pm3", "--list"], capture_output=True, text=True, check=True) lines = result.stdout.splitlines() for line in lines: if ":" in line: # Expected format: "1: /dev/ttyACM0" or "1: bt:xx:xx:xx:xx:xx" device = line.split(": ", 1)[1].strip() print(f"✅ Using Proxmark device: {device}") return device except Exception: print("⚠️ `pm3 --list` failed, falling back to manual detection.") # If `pm3 --list` doesn't work, check manually (Android or fallback mode) usb_devices = ["/dev/ttyACM0", "/dev/ttyACM1", "/dev/ttyUSB0", "/dev/ttyUSB1"] for dev in usb_devices: if os.path.exists(dev): print(f"✅ Using USB device: {dev}") return dev # Default to TCP mode for Android Termux print(f"⚠️ No USB or Bluetooth device found, defaulting to TCP (localhost:{TCP_PORT})") return f"tcp:localhost:{TCP_PORT}" def send_proxmark_command(command): if PM3_AVAILABLE: p.console(command) return p.grabbed_output.strip() else: full_command = f"{command}\n" host_device = detect_proxmark_device() process = subprocess.Popen( ["proxmark3", host_device], stdin=subprocess.PIPE, stdout=subprocess.PIPE, stderr=subprocess.PIPE, text=True ) output, error = process.communicate(full_command) time.sleep(0.2) # Small delay to let Proxmark process fully # Combine stdout and stderr response_lines = (output or "").splitlines() + (error or "").splitlines() # Remove the harmless "STDIN unexpected end" message filtered_response = "\n".join(line for line in response_lines if "STDIN unexpected end" not in line) return filtered_response.strip() def authenticate_and_menu(): key_type = input("Enter key type (DES, 2TDEA, 3TDEA, AES): ").strip() key = input("Enter 8, 16, 24 or 32-byte hex key (no spaces): ").strip() # Authenticate auth_command = f"hf mfdes auth -t {key_type} -k {key}" auth_response = send_proxmark_command(auth_command) print(auth_response) # Check for Proxmark failure messages if "error" in auth_response.lower() or "must have" in auth_response.lower(): print("❌ Authentication failed. Check your connection, key, and key type.") return while True: # Get AIDs aids_command = f"hf mfdes getaids -n 0 -t {key_type} -k {key}" aids_response = send_proxmark_command(aids_command) print(aids_response) # Regex to match valid 6-character hex AIDs hex_pattern = re.compile(r"\b[0-9A-Fa-f]{6}\b") aids = [] for line in aids_response.split("\n"): if "PM3 UART serial baudrate" in line: continue match = hex_pattern.search(line) if match: aids.append(match.group(0)) if aids: # Check if there are any AIDs print("\nAvailable AIDs:") for i, aid in enumerate(aids): print(f"{i + 1}. {aid}") else: print("\n❌ No AID found on the card.") print("\nChoose an option:") print("1. Select an AID") print("2. Create a new AID") print("3. Delete an AID") print("4. Format PICC") print("5. Show free memory") print("6. Exit") choice = input("Enter your choice: ").strip() if choice == "1": selected_index = int(input("Select an available AID number (e.g., 1, 2, or 3): ")) - 1 if selected_index < 0 or selected_index >= len(aids): print("\nInvalid selection.") continue selected_aid = aids[selected_index] print(f"\nSelecting AID: {selected_aid}") select_command = f"hf mfdes selectapp --aid {selected_aid} -t {key_type} -k {key}" select_response = send_proxmark_command(select_command) print(select_response) # Show file menu aid_file_menu(selected_aid, key_type, key) elif choice == "2": create_aid(key_type, key) elif choice == "3": delete_aid(key_type, key) elif choice == "4": format_picc(key_type, key) elif choice == "5": free_memory(key_type, key) elif choice == "6": print("Exiting...") break else: print("Invalid choice, please try again.") def aid_file_menu(selected_aid, key_type, key): while True: print(f"\n[ AID {selected_aid} is open ]") print("\nChoose an operation:") print("1. List Files") print("2. Read a File") print("3. Create a File") print("4. Write to a File") print("5. Delete a File") print("6. Exit") choice = input("Enter your choice: ").strip() if choice == "1": list_files(selected_aid, key_type, key) elif choice == "2": read_file(selected_aid, key_type, key) elif choice == "3": create_file(selected_aid, key_type, key) elif choice == "4": write_to_file(selected_aid, key_type, key) elif choice == "5": delete_file(selected_aid, key_type, key) elif choice == "6": print("Returning to AID selection...") break else: print("Invalid choice, please try again.") def create_aid(key_type, key): aid = input("Enter new AID (6 hex characters, e.g., 112233): ").strip() iso_fid = input("Enter ISO File ID (4 hex characters, e.g., 1234): ").strip() dstalgo = input("Enter encryption algorithm (DES, 2TDEA, 3TDEA, AES): ").strip().upper() create_command = f"hf mfdes createapp -n 0 --aid {aid} --fid {iso_fid} --dstalgo {dstalgo} -t {key_type} -k {key} -a" response = send_proxmark_command(create_command) print(response) def delete_aid(key_type, key): aid = input("Enter AID to delete (6 hex characters): ").strip() delete_command = f"hf mfdes deleteapp --aid {aid} -n 0 -t {key_type} -k {key}" response = send_proxmark_command(delete_command) print(response) def format_picc(key_type, key): confirm = input("Are you sure you want to format the PICC? This will erase all data. (y/n): ").strip().lower() if confirm == "y": format_command = f"hf mfdes formatpicc -t {key_type} -k {key} -v" response = send_proxmark_command(format_command) print(response) elif confirm == "n": print("Formatting cancelled.") else: print("Invalid input. Please enter 'y' or 'n'.") def free_memory(key_type, key): memory_command = f"hf mfdes freemem -t {key_type} -k {key}" response = send_proxmark_command(memory_command) for line in response.splitlines(): if "Free memory" in line: print(f"\n✅ {line}") return print("❌ Unable to retrieve free memory information.") def list_files(aid, key_type, key): print("\nFetching file list...") command = f"hf mfdes getfileids --aid {aid} -t {key_type} -k {key}" response = send_proxmark_command(command) # Extract file IDs by looking for "File ID:" regex file_ids = [] for line in response.splitlines(): match = re.search(r"File ID:\s*([0-9A-Fa-f]{2})", line) if match: file_ids.append(match.group(1)) if file_ids: print("\nAvailable File IDs:") for i, file_id in enumerate(file_ids, 1): print(f"{i}. {file_id}") return file_ids else: print("No files found in this AID.") return [] def read_file(aid, key_type, key): file_id = input("Enter file ID to read: ").strip() # Get offset and ensure it's a 3-byte hex value (default: 000000) offset_input = input("Enter offset (default 0): ").strip() or "0" offset_hex = format(int(offset_input), '06X') # Convert to 3-byte hex # Get length and ensure it's a 3-byte hex value (default: 000000 for full read) length_input = input("Enter length to read (e.g., 16 for 16 bytes, 64 for 64 bytes, default full read): ").strip() or "0" length_hex = format(int(length_input), '06X') # Convert to 3-byte hex read_command = f"hf mfdes read --aid {aid} --fid {file_id} -t {key_type} -k {key} --offset {offset_hex} --length {length_hex}" response = send_proxmark_command(read_command) # Extract and display file content print("\nFile Data:") for line in response.splitlines(): if re.search(r"\| [0-9A-Fa-f]{2} .* \|", line): # Matches data table format print(line) return response def create_file(aid, key_type, key): # Prompt for file ID in hex format file_id = input("Enter file ID (2 hex characters, e.g., 01, 02): ").strip() # Prompt for file size in KB, allowing for decimal values like 0.2KB file_size_kb_input = input("Enter file size in KB (e.g., .2 for 0.2KB, 1 for 1KB, 4 for 4KB, 16 for 16KB): ").strip() # Prefixes "00" to file_id for ISO file ID iso_file_id = f"00{file_id}" try: # Convert the input to a float file_size_kb = float(file_size_kb_input) if file_size_kb <= 0: raise ValueError("File size must be greater than 0.") # Convert KB to bytes (1 KB = 1024 bytes) file_size_bytes = int(file_size_kb * 1024) if file_size_bytes < 3: print("⚠️ File size is too small. Setting to minimum size of 3 bytes.") file_size_bytes = 3 # Convert bytes to hexadecimal file_size_hex = format(file_size_bytes, 'X').upper().zfill(6) print(f"File size in bytes: {file_size_bytes} bytes") print(f"File size in hex: {file_size_hex}") except ValueError as e: print(f"Invalid file size: {e}") return create_command = f"hf mfdes createfile --aid {aid} --fid {file_id} --isofid {iso_file_id} --size {file_size_hex} -t {key_type} -k {key}" response = send_proxmark_command(create_command) print(response) def write_to_file(aid, key_type, key): file_id = input("Enter file ID to write to: ").strip() # Get file size file_size_command = f"hf mfdes getfilesettings --aid {aid} --fid {file_id} -t {key_type} -k {key}" response = send_proxmark_command(file_size_command) # Extract the file size from the response file_size_match = re.search(r"File size \(bytes\)... (\d+) / 0x([0-9A-Fa-f]+)", response) if not file_size_match: print("❌ Unable to determine file size.") return file_size = int(file_size_match.group(1)) # Decimal file size print(f"✅ File size detected: {file_size} bytes") # Prompt user for data format choice (plain text or hex) while True: data_format = input("Enter data format (Type 1 for plain text, 2 for hex): ").strip() if data_format == "1": # Text input (no hex) write_data = input(f"Enter text to write (up to {file_size} bytes, no need for hex): ").strip() write_data_hex = write_data.encode().hex().upper() # Convert to hex break elif data_format == "2": # Hex input write_data_hex = input(f"Enter hex data to write (up to {file_size * 2} hex chars): ").strip() if len(write_data_hex) % 2 != 0: # Ensure it's a valid hex string print("❌ Invalid hex input. Please enter an even number of characters.") elif len(write_data_hex) // 2 > file_size: print(f"❌ Data exceeds file size limit of {file_size} bytes. Try again.") else: break else: print("❌ Invalid choice. Please choose 1 for text or 2 for hex.") write_command = f"hf mfdes write --aid {aid} --fid {file_id} -t {key_type} -k {key} -d {write_data_hex}" response = send_proxmark_command(write_command) print(response) def delete_file(aid, key_type, key): file_id = input("Enter file ID to delete: ").strip() delete_command = f"hf mfdes deletefile --aid {aid} --fid {file_id} -t {key_type} -k {key}" response = send_proxmark_command(delete_command) print(response) if __name__ == "__main__": authenticate_and_menu()