Research, development and trades concerning the powerful Proxmark3 device.
Remember; sharing is caring. Bring something back to the community.
"Learn the tools of the trade the hard way." +Fravia
You are not logged in.
Time changes and with it the technology
Proxmark3 @ discord
Users of this forum, please be aware that information stored on this site is not private.
Hi Promark Community,
I have been playing with proxmark the last few days and I'm trying to clone a proximity card EM410x to T5577. Maybe it's not a EM410x?
Here is what I did :
proxmark3> lf search
NOTE: some demods output possible binary
if it finds something that looks like a tag
False Positives ARE possible
Checking for known tags:
EM410x pattern found:
EM TAG ID : 12B685D58C
Possible de-scramble patterns
Unique TAG ID : 486DA1AB31
HoneyWell IdentKey {
DEZ 8 : 08770956
DEZ 10 : 3062224268
DEZ 5.5 : 46725.54668
DEZ 3.5A : 018.54668
DEZ 3.5B : 182.54668
DEZ 3.5C : 133.54668
DEZ 14/IK2 : 00080371635596
DEZ 15/IK3 : 000311076956977
DEZ 20/ZK : 04080613100110110301
}
Other : 54668_133_08770956
Pattern Paxton : 312087436 [0x129A138C]
Pattern 1 : 2352151 [0x23E417]
Pattern Sebury : 54668 5 382348 [0xD58C 0x5 0x5D58C]
Valid EM410x ID Found!
proxmark3> lf em 410xwrite 12B685D58C 1
Writing T55x7 tag with UID 0x12b685d58c (clock rate: 64)
#db# Started writing T55x7 tag ...
#db# Clock rate: 64
#db# Tag T55x7 written with 0xff8cb76455b5471e
Then, once the card is cloned, I try it on the reader but it doesn't work. Here is a picture of the reader :
It's seems to be something like this : https://www.utcfssecurityproductspages. … &cat_2=121
Thanks for your help in advance !
Offline
run
lf search
then
data detectclock a
and note the
#db# Started writing T55x7 tag ...
#db# Clock rate: 64
from your cloning attempt...
Offline
Casi Rusco readers can also be Indala as well as 40 bit.
Offline
run
lf search
then
data detectclock a
and note the
#db# Started writing T55x7 tag ...
#db# Clock rate: 64from your cloning attempt...
From the cloned card :
proxmark3> lf search
NOTE: some demods output possible binary
if it finds something that looks like a tag
False Positives ARE possible
Checking for known tags:
EM410x pattern found:
EM TAG ID : 12B685D58C
Possible de-scramble patterns
Unique TAG ID : 486DA1AB31
HoneyWell IdentKey {
DEZ 8 : 08770956
DEZ 10 : 3062224268
DEZ 5.5 : 46725.54668
DEZ 3.5A : 018.54668
DEZ 3.5B : 182.54668
DEZ 3.5C : 133.54668
DEZ 14/IK2 : 00080371635596
DEZ 15/IK3 : 000311076956977
DEZ 20/ZK : 04080613100110110301
}
Other : 54668_133_08770956
Pattern Paxton : 312087436 [0x129A138C]
Pattern 1 : 2352151 [0x23E417]
Pattern Sebury : 54668 5 382348 [0xD58C 0x5 0x5D58C]
Valid EM410x ID Found!
proxmark3> data detectclock a
Auto-detected clock rate: 64, Best Starting Position: 0
proxmark3>
Offline
Casi Rusco readers can also be Indala as well as 40 bit.
I tried to read it as Indala but got no result.
Offline
marshmellow wrote:run
lf search
then
data detectclock a
and note the
#db# Started writing T55x7 tag ...
#db# Clock rate: 64from your cloning attempt...
From the cloned card :
proxmark3> lf search NOTE: some demods output possible binary if it finds something that looks like a tag False Positives ARE possible Checking for known tags: EM410x pattern found: EM TAG ID : 12B685D58C Possible de-scramble patterns Unique TAG ID : 486DA1AB31 HoneyWell IdentKey { DEZ 8 : 08770956 DEZ 10 : 3062224268 DEZ 5.5 : 46725.54668 DEZ 3.5A : 018.54668 DEZ 3.5B : 182.54668 DEZ 3.5C : 133.54668 DEZ 14/IK2 : 00080371635596 DEZ 15/IK3 : 000311076956977 DEZ 20/ZK : 04080613100110110301 } Other : 54668_133_08770956 Pattern Paxton : 312087436 [0x129A138C] Pattern 1 : 2352151 [0x23E417] Pattern Sebury : 54668 5 382348 [0xD58C 0x5 0x5D58C] Valid EM410x ID Found! proxmark3> data detectclock a Auto-detected clock rate: 64, Best Starting Position: 0 proxmark3>
That won't tell you anything on the cloned card as that is the one not working (you already know its clock rate as the cloning process told you)
Offline
davidlebr1 wrote:marshmellow wrote:run
lf search
then
data detectclock a
and note the from your cloning attempt...
From the cloned card :
proxmark3> lf search NOTE: some demods output possible binary if it finds something that looks like a tag False Positives ARE possible Checking for known tags: EM410x pattern found: EM TAG ID : 12B685D58C Possible de-scramble patterns Unique TAG ID : 486DA1AB31 HoneyWell IdentKey { DEZ 8 : 08770956 DEZ 10 : 3062224268 DEZ 5.5 : 46725.54668 DEZ 3.5A : 018.54668 DEZ 3.5B : 182.54668 DEZ 3.5C : 133.54668 DEZ 14/IK2 : 00080371635596 DEZ 15/IK3 : 000311076956977 DEZ 20/ZK : 04080613100110110301 } Other : 54668_133_08770956 Pattern Paxton : 312087436 [0x129A138C] Pattern 1 : 2352151 [0x23E417] Pattern Sebury : 54668 5 382348 [0xD58C 0x5 0x5D58C] Valid EM410x ID Found! proxmark3> data detectclock a Auto-detected clock rate: 64, Best Starting Position: 0 proxmark3>
That won't tell you anything on the cloned card as that is the one not working (you already know its clock rate as the cloning process told you)
You are right ! Just changed the clock rate to 32 and it work! Thanks for your help, we can close this as solved ! TIL !
Offline