Research, development and trades concerning the powerful Proxmark3 device.
Remember; sharing is caring. Bring something back to the community.
"Learn the tools of the trade the hard way." +Fravia
You are not logged in.
Time changes and with it the technology
Proxmark3 @ discord
Users of this forum, please be aware that information stored on this site is not private.
Pages: 1
I've been at this a couple of months and come up with nothing, now I need to ask for some help.
I have built a wiegotcha (RFID thief) using a HF antenna (HID R10, the R90 is really expensive if this doesnt work...)
The data it spits out when used to scan a Mifare classic 1k card is as follows:
Bit length - 33
Facility code - 67
ID number - 9602288
proxmark hex - 23872509e1
block7 - 00000003872509e1
raw bits - 00000010001110000111001001010000100111100001
So if this was an LF card, this info would be great, and i could clone a card simply, but HF is very different.
I've read up on decoding the block7 data for iclass cards using the master key ect, but this doesnt work with mifare.
In an ideal world i want to decode this info to get the UID and any more info i can.
Can anyone help, or point me in the right direction?
Thanks
Offline
What is the uid of the card?
Offline
If you want more information about a card without using anything more than Wiegand to interface with an R10 or R90, you're not going to get far.
You can determine the UID from a very limited range of very specific credentials.
Offline
Pages: 1