Proxmark3 community

Research, development and trades concerning the powerful Proxmark3 device.

Remember; sharing is caring. Bring something back to the community.


"Learn the tools of the trade the hard way." +Fravia

You are not logged in.

Announcement

Time changes and with it the technology
Proxmark3 @ discord

Users of this forum, please be aware that information stored on this site is not private.

#1 2018-09-05 21:28:16

davidlebr1
Contributor
Registered: 2018-09-05
Posts: 5

Clone a proximity card identify as EM410x

Hi Promark Community,

I have been playing with proxmark the last few days and I'm trying to clone a proximity card EM410x to T5577. Maybe it's not a EM410x?

Here is what I did :

proxmark3> lf search
NOTE: some demods output possible binary
  if it finds something that looks like a tag          
False Positives ARE possible
          

Checking for known tags:
          
EM410x pattern found:           

EM TAG ID      : 12B685D58C          

Possible de-scramble patterns          
Unique TAG ID  : 486DA1AB31          
HoneyWell IdentKey {          
DEZ 8          : 08770956          
DEZ 10         : 3062224268          
DEZ 5.5        : 46725.54668          
DEZ 3.5A       : 018.54668          
DEZ 3.5B       : 182.54668          
DEZ 3.5C       : 133.54668          
DEZ 14/IK2     : 00080371635596          
DEZ 15/IK3     : 000311076956977          
DEZ 20/ZK      : 04080613100110110301          
}
Other          : 54668_133_08770956          
Pattern Paxton : 312087436 [0x129A138C]          
Pattern 1      : 2352151 [0x23E417]          
Pattern Sebury : 54668 5 382348  [0xD58C 0x5 0x5D58C]          

Valid EM410x ID Found!       
   
proxmark3> lf em 410xwrite 12B685D58C 1
Writing T55x7 tag with UID 0x12b685d58c (clock rate: 64)          
#db# Started writing T55x7 tag ...          
#db# Clock rate: 64          
#db# Tag T55x7 written with 0xff8cb76455b5471e

Then, once the card is cloned, I try it on the reader but it doesn't work. Here is a picture of the reader :
FluxBB bbcode test

It's seems to be something like this : https://www.utcfssecurityproductspages. … &cat_2=121

Thanks for your help in advance !

Offline

#2 2018-09-06 03:53:15

marshmellow
Contributor
From: US
Registered: 2013-06-10
Posts: 2,302

Re: Clone a proximity card identify as EM410x

run

lf search

then

data detectclock a

and note the

#db# Started writing T55x7 tag ...         
#db# Clock rate: 64

from your cloning attempt...

Offline

#3 2018-09-06 11:13:07

Onisan
Contributor
From: London
Registered: 2016-07-18
Posts: 88

Re: Clone a proximity card identify as EM410x

Casi Rusco readers can also be Indala as well as 40 bit.

Offline

#4 2018-09-06 15:00:50

davidlebr1
Contributor
Registered: 2018-09-05
Posts: 5

Re: Clone a proximity card identify as EM410x

marshmellow wrote:

run

lf search

then

data detectclock a

and note the

#db# Started writing T55x7 tag ...         
#db# Clock rate: 64

from your cloning attempt...

From the cloned card :

proxmark3> lf search
NOTE: some demods output possible binary
  if it finds something that looks like a tag          
False Positives ARE possible
          

Checking for known tags:
          
EM410x pattern found:           

EM TAG ID      : 12B685D58C          

Possible de-scramble patterns          
Unique TAG ID  : 486DA1AB31          
HoneyWell IdentKey {          
DEZ 8          : 08770956          
DEZ 10         : 3062224268          
DEZ 5.5        : 46725.54668          
DEZ 3.5A       : 018.54668          
DEZ 3.5B       : 182.54668          
DEZ 3.5C       : 133.54668          
DEZ 14/IK2     : 00080371635596          
DEZ 15/IK3     : 000311076956977          
DEZ 20/ZK      : 04080613100110110301          
}
Other          : 54668_133_08770956          
Pattern Paxton : 312087436 [0x129A138C]          
Pattern 1      : 2352151 [0x23E417]          
Pattern Sebury : 54668 5 382348  [0xD58C 0x5 0x5D58C]          

Valid EM410x ID Found!          
proxmark3> data detectclock a
Auto-detected clock rate: 64, Best Starting Position: 0          
proxmark3> 

Offline

#5 2018-09-06 15:02:08

davidlebr1
Contributor
Registered: 2018-09-05
Posts: 5

Re: Clone a proximity card identify as EM410x

Onisan wrote:

Casi Rusco readers can also be Indala as well as 40 bit.

I tried to read it as Indala but got no result.

Offline

#6 2018-09-06 15:03:23

marshmellow
Contributor
From: US
Registered: 2013-06-10
Posts: 2,302

Re: Clone a proximity card identify as EM410x

davidlebr1 wrote:
marshmellow wrote:

run

lf search

then

data detectclock a

and note the

#db# Started writing T55x7 tag ...         
#db# Clock rate: 64

from your cloning attempt...

From the cloned card :

proxmark3> lf search
NOTE: some demods output possible binary
  if it finds something that looks like a tag          
False Positives ARE possible
          

Checking for known tags:
          
EM410x pattern found:           

EM TAG ID      : 12B685D58C          

Possible de-scramble patterns          
Unique TAG ID  : 486DA1AB31          
HoneyWell IdentKey {          
DEZ 8          : 08770956          
DEZ 10         : 3062224268          
DEZ 5.5        : 46725.54668          
DEZ 3.5A       : 018.54668          
DEZ 3.5B       : 182.54668          
DEZ 3.5C       : 133.54668          
DEZ 14/IK2     : 00080371635596          
DEZ 15/IK3     : 000311076956977          
DEZ 20/ZK      : 04080613100110110301          
}
Other          : 54668_133_08770956          
Pattern Paxton : 312087436 [0x129A138C]          
Pattern 1      : 2352151 [0x23E417]          
Pattern Sebury : 54668 5 382348  [0xD58C 0x5 0x5D58C]          

Valid EM410x ID Found!          
proxmark3> data detectclock a
Auto-detected clock rate: 64, Best Starting Position: 0          
proxmark3> 

That won't tell you anything on the cloned card as that is the one not working (you already know its clock rate as the cloning process told you)

Offline

#7 2018-09-06 15:10:16

davidlebr1
Contributor
Registered: 2018-09-05
Posts: 5

Re: Clone a proximity card identify as EM410x

marshmellow wrote:
davidlebr1 wrote:
marshmellow wrote:

run

lf search

then

data detectclock a

and note the  from your cloning attempt...

From the cloned card :

proxmark3> lf search
NOTE: some demods output possible binary
  if it finds something that looks like a tag          
False Positives ARE possible
          

Checking for known tags:
          
EM410x pattern found:           

EM TAG ID      : 12B685D58C          

Possible de-scramble patterns          
Unique TAG ID  : 486DA1AB31          
HoneyWell IdentKey {          
DEZ 8          : 08770956          
DEZ 10         : 3062224268          
DEZ 5.5        : 46725.54668          
DEZ 3.5A       : 018.54668          
DEZ 3.5B       : 182.54668          
DEZ 3.5C       : 133.54668          
DEZ 14/IK2     : 00080371635596          
DEZ 15/IK3     : 000311076956977          
DEZ 20/ZK      : 04080613100110110301          
}
Other          : 54668_133_08770956          
Pattern Paxton : 312087436 [0x129A138C]          
Pattern 1      : 2352151 [0x23E417]          
Pattern Sebury : 54668 5 382348  [0xD58C 0x5 0x5D58C]          

Valid EM410x ID Found!          
proxmark3> data detectclock a
Auto-detected clock rate: 64, Best Starting Position: 0          
proxmark3> 

That won't tell you anything on the cloned card as that is the one not working (you already know its clock rate as the cloning process told you)

You are right ! Just changed the clock rate to 32 and it work! Thanks for your help, we can close this as solved ! TIL !

Offline

Board footer

Powered by FluxBB