Getting Started with the ChameleonMini RevE-2

November 25, 2015

Linux

1) Connect your ChameleonMini to your computer.

2) Open up your terminal application. Type is following code:

sudo bash

3) Type in your password to continue and run the command below:

socat - /dev/ttyACM0,crnl

4) To confirm that you are connected run the following command.

VERSION?

5) The ChameleonMini should respond with output similar to the version string shown below:

ChameleonMini client connection linux

Mac OS X

1) Install ZTerm. ZTerm allows you to easily connect to the ChameleonMini and run commands.

2) Connect your ChameleonMini to your computer and open Zterm. 

3) In ZTerm, select the serial port associated with your ChameleonMini.

USB Selection Xterm

USB Modem Selected Xterm

4) Click OK.

Click Ok Xterm

5) Your ChameleonMini should now be connected. Run the following command.

VERSION?

The ChameleonMini should reply as follows.

101:OK WITH TEXT
Chameleon-Mini 150304 using LUFA 130901 compiled with AVR-GCC 4.8.1

Your ChameleonMini is now ready to be used.

Follow the instructions below to enable local echo in ZTerm.

1) Click Settings on the top toolbar.

Settings Xterm

2) Click connection.

Connection Xterm

3) Click Local Echo.

Local Echo Xterm

4) Click OK to confirm,

Click OK Xterm 

You can now see what you are typing. 

Windows

1) Install the ChameleonMini Driver. A guide can be found here.

2) Install TeraTerm. TeraTerm allows you to easily connect to the ChameleonMini and run commands. 

3) Connect your ChameleonMini to your computer and open TeraTerm. 

4) Once installed Configure TeraTerm as shown below.

TeraTerm Serial 

Terminal Setup

5) To confirm that you are connected run the following command.

VERSION?

Output from the "VERSION?" command should resemble the response below.

TeraTerm Version?






Also in Blog

ProxmarkPro - How to Save/Load a Tag to SD Card
ProxmarkPro - How to Save/Load a Tag to SD Card

May 21, 2019

View full article →

ProxmarkPro - Using HID Brute
ProxmarkPro - Using HID Brute

May 21, 2019

This blog post covers how to do a brute force attack with a HID tag on the ProxmarkPro. A Brute force attack is done by trying to guess multiple tag UID's similar to a known working tag UID to gain access.

View full article →

ProxmarkPro - Cloning a HID Tag
ProxmarkPro - Cloning a HID Tag

April 02, 2019

This blog post covers the steps to clone a HID tag to a T5577 with a ProxmarkPro.

View full article →

We use cookies to ensure that we give you the best experience on our website. If you continue we'll assume that you are understand this. Learn more
Accept