Proxmark3 community

Research, development and trades concerning the powerful Proxmark3 device.

Remember; sharing is caring. Bring something back to the community.


"Learn the tools of the trade the hard way." +Fravia

You are not logged in.

Announcement

Time changes and with it the technology
Proxmark3 @ discord

Users of this forum, please be aware that information stored on this site is not private.

#1 2018-08-09 07:18:06

natezoom
Contributor
Registered: 2017-11-22
Posts: 10

Help decoding/identifying dump

I dumped a key card from holiday inn here is the file(used htmldump.lua script -- that's why its a .html extension): here *download first and open in web browser
The card is a Mifare Classic 1k - keys got from nested attack.
from the dump I see this "6F 01 51 90 51 90" which might be a check in date backwards? - 09/15?   (side note: this card is 2-3 years old)
anybody have any ideas?

Offline

#2 2018-08-09 09:25:42

iceman
Administrator
Registered: 2013-04-25
Posts: 9,506
Website

Re: Help decoding/identifying dump

tip
preferable to use bin / eml dumps, since they load up in bindiff / hexeditor  easy

Offline

Board footer

Powered by FluxBB