Research, development and trades concerning the powerful Proxmark3 device.
Remember; sharing is caring. Bring something back to the community.
"Learn the tools of the trade the hard way." +Fravia
You are not logged in.
Time changes and with it the technology
Proxmark3 @ discord
Users of this forum, please be aware that information stored on this site is not private.
Pages: 1
Just received a 36-bit tag. I've never seen one of these before. Commands I tried are listed below.
austin@austin-VirtualBox:~$ cd proxmark3/client
austin@austin-VirtualBox:~/proxmark3/client$ ./proxmark3 /dev/ttyACM0
Prox/RFID mark3 RFID instrument
bootrom: master/v3.0.1-75-g1dae981-suspect 2017-08-27 16:49:17
os: master/v2.3 2016-09-19 20:28:38
LF FPGA image built for 2s30vq100 on 2015/03/06 at 07:38:04
HF FPGA image built for 2s30vq100 on 2015/11/ 2 at 9: 8: 8
uC: AT91SAM7S512 Rev B
Embedded Processor: ARM7TDMI
Nonvolatile Program Memory Size: 512K bytes. Used: 183707 bytes (35%). Free: 340581 bytes (65%).
Second Nonvolatile Program Memory Size: None
Internal SRAM Size: 64K bytes
Architecture Identifier: AT91SAM7Sxx Series
Nonvolatile Program Memory Type: Embedded Flash Memory
proxmark3> lf hid read
#db# DownloadFPGA(len: 42096)
#db# TAG ID: 36cbc29fef (20471) - Format Len: 36bit - FC: 0 - Card: 0
proxmark3> data printdemod x
DemodBuffer: 1D555A69A59AA55996AAA9AA
proxmark3> lf t55xx dump
Reading Page 0:
blk | hex data | binary
----+----------+---------------------------------
#db# DownloadFPGA(len: 42096)
Reading Page 1:
blk | hex data | binary
----+----------+---------------------------------
I also tried this.
proxmark3> data printdemod x o 1
DemodBuffer: 3AAAB4D34B354AB32D55535
proxmark3> data printdemod x o 2
DemodBuffer: 755569A6966A95665AAAA6A800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
proxmark3> data printdemod x o 3
DemodBuffer: EAAAD34D2CD52ACCB5554D5000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
proxmark3> data printdemod x o 3
DemodBuffer: EAAAD34D2CD52ACCB5554D5000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
proxmark3> data printdemod x o 4
DemodBuffer: D555A69A59AA55996AAA9AA000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
proxmark3> data printdemod x o 5
DemodBuffer: AAAB4D34B354AB32D555354000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
proxmark3> data printdemod x o 6
DemodBuffer: 55569A6966A95665AAAA6A8000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
Any suggestions on cloning this or further commands to try? Thanks!
Offline
This looks like it might be an HID Siemens tag.
As output from my updated HID decoder (from my fork; pending inclusion in official repo)
proxmark3> lf hid decode 36cbc29fef
Sie36 FC: 222689, Card: 20471, IL: 0, Parity valid
Is there any number printed on this card?
Offline
Pages: 1