Proxmark3 Emulating NDEF Web URL

Hello Everyone,

I’m new to working with NFC and would appreciate some guidance.

I’d like to emulate the URL www.google.com on my Proxmark3 so that scanning the device with a phone automatically opens the URL.

Could someone help me with the correct commands and steps to achieve this?

From my understanding, I need to use SIM operations for this, but I’m unsure how to correctly emulate the required data. Do I need to create a dump file with specific HEX data first? If so, what should it contain?

Any advice or guidance would be greatly appreciated.

Thanks in advance!

Can someone please check this and try to help. very pleaaase <3

Dumb thought, but what about writing it to a ntag, then reding tat tag with the Proxmark and emulating it?

2 Likes

I do not want to use ntag as a middleware layer. I want to emulate this URL directly. Did someone tried to do that ?

I get that, once you dump the ntag on the PM you dont need the tag anymore.
you can save the dump (bin?) for future use.

if you dont want to use a tag at all, im not sure how to go at it. Did you dig around the commands?

1 Like

no need to cross post everywhere … and its not cool to highjack someone thread for no reason where there is a place for that … where you already posted …

5 Likes

Yes, i did few. like hf mf wrbl 4 -d “https://www.google.com” But phone is not understanding it. So URL is not opening.

Got it thanks. I am very new here. Sorry if i did something incorrectly. I really need some help with this staff.

Could you please validate my sequence for doing this staff.

Python Script `import struct

Define the URL to be written

url = “https://www.google.com

NDEF record structure for a URL

ndef_header = b’\xD1\x01’ # NDEF Record Header (TNF: Well-Known Type, SR: Short Record)
uri_identifier_code = b’\x01’ # “https://” prefix
url_bytes = url.encode(“utf-8”)
length = len(url_bytes) + 1 # URL length + 1 byte for identifier

Full NDEF message

ndef_message = ndef_header + struct.pack(“B”, length) + uri_identifier_code + url_bytes

Save to a binary file

with open(“google_url_tag.ndef”, “wb”) as f:
f.write(ndef_message)

print(“NDEF file generated: google_url_tag.ndef”)
`

hf mf auth 0 A ffffffffffff

hf mf wrbl 4 -f google_url_tag.ndef

no this is not at all valid.

this is chat gpt generated garbage and none of it is how the proxmark works.

2 Likes

NFC Tools - (android and ios mobile) This app lets you read and write NFC tags, including adding a website link to a tag.

NFC Tools can write standard information on your tags that will be compatible with any NFC device.

For example, you can save a VCARD to easily share your contact details, go to a URL, share a phone number, or share your geographic location.

The “Save” tab allows you to store standard data such as:

  • text

  • link to page

  • email

  • contact

  • telephone number

  • defined message

  • address or geographic coordinates

  • WiFi or Bluetooth configuration

  • own data.

worth noting iphones don’t play too nicely with anything that isn’t uri based, such as vcards.

NDEF on iOS gist

1 Like

— I think I need to start creating mobile applications.