... then you would need to physically have the card and present both your clone a TPX4 chip and the Hitag2 original to the reader a few times as they use a rolling code...
you mention tpx4 as in tpx4(46) or ID46 as clone in the car industry?
You can clone the fob but you would need to use a different machine.
You mention this as you seem to have experience with the "different machine". Is different one of the JMA or American cloner?
definitely PM3 is unsuitable???
I read there are a lot of unreliable CHINA cloners around which claim to do the job on id46 or hitag2 compatible, but they don't and with a write-once TPXx, experiment could be futile expensive in this direction, if you don't possess original TRS5000, ZED bull cloner
only with such TRS5000 you can use the new TPX5=TPX1(4C)+TPX2(4D)+TPX3+TPX4(ID46) "Clonable multiple times, and it incorporates the sniff function to capture the PHILIPS® data."
]]>I am new here so please be gentle.
I have a security engagement coming up where I need to gain physical access to a location. One of the tests is whether I can "bump" into somebody and clone their card.
I am used to doing this with HID type cards but this engagement is using HITAG2.
My question is, am I able to "bump" into somebody to record their card then use T5577 cards like HID to create a new one?
I was hoping somebody could assist with some steps to perform the clone as I cannot get my hands on a demo card prior to the engagement so I really have only one shot at this.
Thank you all for your help!
]]>