Appreciate you giving me the benefit of the doubt and taking the time to make me understand the general feelings of the forum in the way I have approached things. I can now understand why people have been a little brief or reluctant due to the reason listed above. To be honest I thought the PM3's main function was to clone and I knew it could do other things but thought these were all just preliminary steps with the goal of cloning the pass. As I am new I have worked out how to clone most cards with the exception of iclass and it was just frustrating for me not knowing. I am sure this will fall under the bracket "pretty little lies" and hope after more reading I can prove people wrong by adding and giving something back to this community. Many thanks again for all your help.
]]>Of course its much to take in, just do it and tell us what you learned in during the process
]]>1. in many places on this forum, the official wiki, and the github repo it is clearly stated that the proxmark3 is not for the casual user.
some here therefore are put off by those appearing to want a quick fix to a single rfid tag.
counter this by showing you've done some homework and ask specific questions.
2. "cloners" to a few here is a bad word (myself not included). maybe partly due to the reusing of pm3 code in commercialized cloners? to most, however, the PM3 is not considered to be a cloner. it is a research tool.
3. you have not stated your purpose or intentions in cloning your tags. to many assisting someone to clone a tag most commonly used for access control may be unethical.
4. many people are just shy around iclass, they may fear HID? (or more likely they fear they would be helping criminals) so they may not want a step by step outline created.
5. time, many contributors just are very busy and may only post a few times per month.
and finally, another link:
http://www.proxmark.org/forum/viewtopic … 246#p17246
I am trying to read and do my own research as well but you can imagine to someone new it is a lot to take in. If anyone can help me it would be greatly appreciated and offer still stands.
]]>I am willing to pay $50 upon receipt and another $50 after I can test the commands to see if the cloning is successful. If interested please let me know via this blog or my email.
]]>So when I do a hf search and the following comes up: This is not enough info to know what system it is running? Is there a command I can type in to know what system if I have the key.If it helps the key looks like a a normal fob with a blue/purple middle
CSN: 89 e1 b3 02 f9 ff 12 e0
CC: 8c 87 ff ff d9 ff ff ff
Mode: Application [Locked]
Coding: ISO 14443-2 B/ISO 15693
Crypt: Secured page, keys not locked
RA: Read access not enabled
Mem: 2 KBits/2 App Areas (31 * 8 bytes) [1F]
AA1: blocks 06-12
AA2: blocks 13-1F
Valid iClass Tag (or PicoPass Tag) Found - Quiting Search
If we could, we obviously would have told you about it.
]]>CSN: 89 e1 b3 02 f9 ff 12 e0
CC: 8c 87 ff ff d9 ff ff ff
Mode: Application [Locked]
Coding: ISO 14443-2 B/ISO 15693
Crypt: Secured page, keys not locked
RA: Read access not enabled
Mem: 2 KBits/2 App Areas (31 * 8 bytes) [1F]
AA1: blocks 06-12
AA2: blocks 13-1F
Valid iClass Tag (or PicoPass Tag) Found - Quiting Search
Thanks for getting back to me and being a little more specific. Given the example I gave above is this the best way to go to about it or can't you tell what card/ system this uses given the info I have provided?
No way unless you test them with the available keys.
]]>