Upgrading Proxmark3 Firmware from 20140401 to 20150224

July 27, 2015

These instructions describe the process of upgrading from firmware version to 20140401 (“old firmware”) to 20150224 (“new firmware”) using Windows 7 or Windows XP.

Locate the flasher program from the software distribution currently running on your Proxmark. For example, if the Proxmark is currently running github-20140401, you should download binaries from http://ryscc.com/products/PM3PRD/dl/pm3-bin-20140401.zip.

Download the 20150224 precompiled software distribution.

  1. Extract the old firmware to a location of your choosing.

  2. Extract the new firmware you would like to load on the Proxmark3.

  3. Open a Windows command prompt (“cmd.exe”) and change the current directory to the directory containing the old flasher.

  4. Run the command below.

    > flasher.exe COM4 ­-b path\to\pm3-­bin-­20150222\bootrom.elf path\to\pm3-­bin-­20150224\fullimage.elf
  1. Hold down the Proxmark button and do not release it until flashing has completed. Flasher should report that it is waiting for the Proxmark to appear on the port specified.

  2. Connect the Proxmark to the PC and flashing should begin

  3. Once flashing is completed, confirm that everything is working by disconnecting and reconnecting the Proxmark's power supply

  4. Run the 20150224 Windows Proxmark client

Flasher Output

Loading ELF file 'path\to\pm3-bin-20150222\bootrom.elf'... 
Loading usable ELF segments: 
0: V 0x00100000 P 0x00100000 (0x00000200->0x00000200) [R X] @0x94 
1: V 0x00200000 P 0x00100200 (0x00000b60->0x00000b60) [RWX] @0x298 

Loading ELF file 'path\to\pm3-bin-20150224\fullimage.elf'... 
Loading usable ELF segments: 
0: V 0x00102000 P 0x00102000 (0x0001497e->0x0001497e) [R  ] @0xb4 
1: V 0x00118000 P 0x00118000 (0x0001b525->0x0001b525) [R X] @0x14a38 
2: V 0x00200000 P 0x00133528 (0x000029d8->0x000029d8) [RWX] @0x2ff60 
Note: Extending previous segment from 0x1b525 to 0x1df00 bytes 
Note: 0x3-byte hole created 

Waiting for Proxmark to appear on COM4....... Found. 

Flashing... 
Writing segments for file: path\to\pm3-bin-20150222\bootrom.elf 
 0x00100000..0x001001ff [0x200 / 1 blocks]. OK 
 0x00100200..0x00100d5f [0xb60 / 6 blocks]...... OK 

Writing segments for file: path\to\pm3-bin-20150224\fullimage.elf 
 0x00102000..0x0011697d [0x1497e / 165 blocks].....................................................................................................................................................................OK 
 0x00118000..0x00135eff [0x1df00 / 240 blocks]................................................................................................................................................................................................................................................ OK 
Resetting hardware... 
All done. 
Have a nice day!

Proxmark3 Client Output

proxmark3> hw ver 
#db# Prox/RFID mark3 RFID instrument                 
#db# bootrom: master/v1.1.0-269-g0387cd3-suspect 2015-02-24 19:18:25                  
#db# os: master/v1.1.0-269-g0387cd3-suspect 2015-02-24 19:18:26                 
#db# HF FPGA image built on 2015/02/11 at 21:05:50                 
uC: AT91SAM7S256 Rev B          
Embedded Processor: ARM7TDMI          
Nonvolatile Program Memory Size: 256K bytes          
Second Nonvolatile Program Memory Size: None          
Internal SRAM Size: 64K bytes          
Architecture Identifier: AT91SAM7Sxx Series          
Nonvolatile Program Memory Type: Embedded Flash Memory





Also in Blog

Getting Started with MagSpoof R3 firmware on macOS
Getting Started with MagSpoof R3 firmware on macOS

April 25, 2017

Follow this step by step guide to get started using the MagSpoof R3 firmware on macOS.

View full article →

MagSpoof R3 on GitHub
MagSpoof R3 on GitHub

April 25, 2017

Hardware and software sources for the MagSpoof R3 are now available at https://github.com/RyscCorp/magspoof_r3.

 

 

View full article →

Getting Started with MagSpoof using Arduino IDE
Getting Started with MagSpoof using Arduino IDE

March 27, 2017

This guide covers the process of getting started with the MagSpoof using Arduino IDE.

View full article →