The Proxmark3 Dev Kit 4 (RDV4) from RRG/ProxGrind is more compact/portable and brings various improvements to the open source design. Antennas are highly customizable and there is a new multifunction multiplexing interface to support additional components such as external battery, external active high powered antenna, bluetooth interfaces and more. The new model replaces RDV3 (aka PM3 Easy), RDV2, and the original PM3 design.
2019-07 / 4.01 update notes: Multiple device improvements over the 4.0 version:
- Gold-plated FPC Connector
- Antenna “Q-Switch” allowing for adapting antennas to specific operations
- Antenna Frequency Switch allowing for optimised 125KHz and 134KHz performance
- Reduced power supply noise
Includes: Proxmark3 RDV4 unit, plastic enclosure, dual HF/LF antenna, two test cards (5577, Mifare 1k S50 compatible), SIM/SAM (Subscriber Identity Module / Secure Access Module) extender, usb cable, and small screw driver.
Whether you’re in the field, in the lab, or in the classroom, the Proxmark3 is the RFID tool of the trade when it comes to sniffing, reading, and cloning RF Tags. Proxmark3 can run independently from a PC powered by an optional battery, and offers depending on the targeted RFID Tag advanced functions like Offline Encryption, Online sniffing, default key cracking, data dumping, or the ability to run simulations. It is currently the “gold standard” when it comes to RFID research.
Developed back in 2007 by Jonathan Westhues and published under General Public License, the Proxmark3 has made its way from a DIY project to an almost ready-to-use device capable of analyzing the RFID communication at low frequencies (125 KHz) and high frequencies (13.56MHz).
RFID was first introduced for identification purposes only, but was quickly adopted for other applications in commerce and transportation. RFID technology is now in widespread use for a variety of applications across many industries. In 2006, Westhues was hired by California State Senator Joe Simitian to illustrate the ease with which state lawmakers’ RFID-based ID cards could be read and cloned. He successfully read and cloned the ID card of California State Assembly member Fran Pavley, who remarked, “All that was done within a moment’s notice of time without me even being aware of it.”