Research, development and trades concerning the powerful Proxmark3 device.
Remember; sharing is caring. Bring something back to the community.
"Learn the tools of the trade the hard way." +Fravia
You are not logged in.
Time changes and with it the technology
Proxmark3 @ discord
Users of this forum, please be aware that information stored on this site is not private.
The card is used to acess our office door , I don't know the chip.
The Back of the card I take a picture :
I have tried some command , and I sure it's a LF card .
First I tried run "lf em4x em410xwatch" , sometimes there's no result , and sometimes( take a long time) give me different tagID ,and the clock rate sometime 8 , sometime 10.
I run the command
proxmark3> lf read
#db# Buffer cleared (40000 bytes)
#db# buffer samples: 9e da ff f0 90 46 0b 00 ...
proxmark3> data sample 9600
Reading 9600 samples
Done!
proxmark3> data autocorr 9600
performing 28800 correlations
and I got the graphic output :
I had think it's a hid card , but when I run the command "lf hid fskdemod" , only get the "yellow led on , red led blink"
I had tried "data mandemod , askdemod , fskdemod ", and yet couldn't get any clue ,
May someone help me ?
Offline
The first picture
backend
The Second picture
output
Offline
The 2*4 dots looks like what there is on basic HID ISO cards.
What about this logo ? It looks like Pyramid. So it might actually be a Pyramid card
see http://www.farpointedata.com/images/stories/datasheets/PSI-4/PSI-4_datasheet.pdf
Although, it is not the official Pyramid logo...
If it is a Pyramid then it should be ASK Manchester 32 or 64 bit - Baud rates : RF/64 - 1 or 2 block(s)
Last edited by o0o0o0o (2013-05-06 08:43:41)
Offline
first , thx a lot to o0o0o0o
I have seen the document , but I still have no idea.
I'm newer to use proxmark. What puzzle me is that how can I get the tag_id , "lf hid fskdemod" command seem no use for this card .
Can I using the exist command to get the TagID?
Offline
Try :
lf read
data sample 4000
data plot
You should see something like this - >
Do a :
data askdemod
And you should see something pretty like this :
This is where you need to learn how to decode using your head...
Please post the result of "data askdemod" here
Offline
I tried it , It seem something strange ,
proxmark3> data buffclear
proxmark3> lf read
#db# Buffer cleared (40000 bytes)
#db# buffer samples: 58 42 4b 74 90 a6 a1 77 ...
proxmark3> data sample 9600
Reading 9600 samples
Done!
proxmark3>
The output like this :
result step 1
and after run the command "data askdemod 1" ,get the result
result step 2
I think it 's not code by ASK Manchester ?
Offline
I zoom out the data sample graphic output , clock rate sometimes 8 , sometimes 10 ,
So I think it must be something Frequency-shift keying 。
Data Sample
I test the Fskdemod ,The result still strange to me , I had think it may output a sequence of "zero" and "one" .
Fskdemod
and I test so many time , different samples , and I get different result . '
data sample 4800
proxmark3> data fskdemod
actual data bits start at sample 3447
length 50/50
bits: '101111001101111111011101110111011101110111011'
hex: 0000179b fbbbbbbb
data sample 9600
proxmark3> data fskdemod
actual data bits start at sample 4764
length 50/50
bits: '101011001011110011011111110111011101110111011'
hex: 00001597 9bfbbbbb
I' m so confused , I hope someone could help me .
Offline
I got it , I ought analyze the lastest pict use my head.......................
Offline
it is two years ago, wonder you found a soluton. Could you pls post few traces of your card again. Thanks
Offline