Research, development and trades concerning the powerful Proxmark3 device.
Remember; sharing is caring. Bring something back to the community.
"Learn the tools of the trade the hard way." +Fravia
You are not logged in.
Time changes and with it the technology
Proxmark3 @ discord
Users of this forum, please be aware that information stored on this site is not private.
Pages: 1
I get some lf tag from a hotel, and need help to decode the binary data in order to clone this tag on t5577.
I have read the thread http://www.proxmark.org/forum/viewtopic.php?pid=17574#p17574 , and guess they may t55xx tags.
What I have tried:
lf read
data sample
data raw am 32
Here's the result:
proxmark3> lf read
#db# LF Sampling config:
#db# [q] divisor: 95
#db# [b] bps: 8
#db# [d] decimation: 1
#db# [a] averaging: 1
#db# [t] trigger threshold: 0
#db# Done, saved 40000 out of 40000 seen samples at 8 bits/sample
#db# buffer samples: ff ff ff ff ff ff ff ff ...
proxmark3> data sample
Reading 39999 bytes from device memory
Data fetched
Samples @ 8 bits/smpl, decimation 1:1
proxmark3> data raw am 32
Using Clock:32, Invert:0, Bits Found:513
# Errors during Demoding (shown as 7 in bit stream): 19
ASK/Manchester - Clock: 32 - Decoded bitstream:
1101100000110000
0177000000100000
1010000010110001
0010001111011010
0001101100000110
0000177000000100
0001010000010110
0010010001111011
0100001101100000
1100000177000000
1000001010000010
1100010010001111
0110100001101100
0001100000177000
0001000001010000
0101100010010001
1110110100001101
1000001100000177
0000001000001010
0000101100010010
0011110110100001
1011000001100000
1770000001000001
0100000101100010
0100011110110100
0011011000001100
0001770000001000
0010100000101100
0100100011110110
1000011011000001
1000001770000001
0000010100000101
tag1:
00000010000010100000101100010010001111011010000110110000011000001
41416247B4360C1
tag2:
00000010000010100000110010101010111111011100001000100011001000001
4141955FB844641
tag3:
00000010000010101000110010101010001111011110000000111101001000001
41519547BC07A41
And with each tag, I tried "lf t55 write b 0 d 00088C6A" , but won't dump anything.
Is anyone know the type of these tags, and how to read/write them.
Thank you.
proxmark3> hw version
[[[ Cached information ]]]
Prox/RFID mark3 RFID instrument
bootrom: master/v2.2.0-201-g6fcb5dd-suspect 2016-06-02 13:58:03
os: master/v2.2.0-201-g6fcb5dd-suspect 2016-06-02 13:58:04
LF FPGA image built for 2s30vq100 on 2015/03/06 at 07:38:04
HF FPGA image built for 2s30vq100 on 2015/11/ 2 at 9: 8: 8
uC: AT91SAM7S256 Rev B
Embedded Processor: ARM7TDMI
Nonvolatile Program Memory Size: 256K bytes. Used: 184390 bytes (70%). Free: 77754 bytes (30%).
Second Nonvolatile Program Memory Size: None
Internal SRAM Size: 64K bytes
Architecture Identifier: AT91SAM7Sxx Series
Nonvolatile Program Memory Type: Embedded Flash Memory
Offline
why would you re-write the block 0 (configuration block) on the original tag?
also try
lf search
lf search u
Offline
why would you re-write the block 0 (configuration block) on the original tag?
also try
lf search
lf search u
I have tried lf search *
proxmark3> lf search
Reading 30000 bytes from device memory
Data fetched
Samples @ 8 bits/smpl, decimation 1:1
NOTE: some demods output possible binary
if it finds something that looks like a tag
False Positives ARE possible
Checking for known tags:
No Known Tags Found!
proxmark3> lf search u
Reading 30000 bytes from device memory
Data fetched
Samples @ 8 bits/smpl, decimation 1:1
NOTE: some demods output possible binary
if it finds something that looks like a tag
False Positives ARE possible
Checking for known tags:
No Known Tags Found!
Checking for Unknown tags:
Possible Auto Correlation of 2176 repeating samples
Found Sequence Terminator
Using Clock:32, Invert:0, Bits Found:513
ASK/Manchester - Clock: 32 - Decoded bitstream:
0000001000001010
0000101100010010
0011110110100001
1011000001100000
0000001000001010
0000101100010010
0011110110100001
1011000001100000
0000001000001010
0000101100010010
0011110110100001
1011000001100000
0000001000001010
0000101100010010
0011110110100001
1011000001100000
0000001000001010
0000101100010010
0011110110100001
1011000001100000
0000001000001010
0000101100010010
0011110110100001
1011000001100000
0000001000001010
0000101100010010
0011110110100001
1011000001100000
0000001000001010
0000101100010010
0011110110100001
1011000001100000
Unknown ASK Modulated and Manchester encoded Tag Found!
if it does not look right it could instead be ASK/Biphase - try 'data rawdemod ab'
I try to re-write the block 0 because I thought these cards may have different configuration.
So what's the type of these tags actually.
Offline
data save
post data trace
Offline
data save
post data trace
https://paste.pound-python.org/raw/KGKAiiLswwquZfjFFC1N/
Offline
that is strange.
Some thing like this I never seen before
with "data rawdemod am" it gives a match/repeating string like this
0603041416247B4360C1508282C48F686C189310505891ED0D8301020A0B1
23DA1B
0603041416247B4360C1508282C48F686C189310505891ED0D8301020A0B1
and the inverse, show also the repeating string
F9F2FBEBE9DB84BC9F3E5F7D7D3B709793E713EFAFA76E12F27CF1FDF5F4E
DC25E4
F9F2FBEBE9DB84BC9F3E5F7D7D3B709793E713EFAFA76E12F27CF1FDF5F4E
repeating string is normal, but at this length and with that group of HEX numbers inbetween!!! that is first time for me
the existence of "23DA1B" or in inverse case the HEX group "DC25E4" is strange to me...I don't know what that is
Even when there is no existence of the inbetween-HEX-group "23DA1B" "DC25E4" if use T55x7 to emulate this tag/key/card there is only 7 data blocks a 8bytes to write on. This
F9F2FBEBE9DB84BC9F3E5F7D7D3B709793E713EFAFA76E12F27CF1FDF5F4E needs 60 bytes to emulate it
You have a picture of it? Is there anything printed on?
Help for this I am afraid you have to wait for some most excellent veterans on LF sector to give you an explanation for this strange data...
Last edited by ntk (2016-06-05 23:39:46)
Offline
the key is in
Found Sequence Terminator
020A0B123DA1B060 is your raw repeating data
is there a card number on it? - or room number?
Last edited by marshmellow (2016-06-06 22:45:31)
Offline
oh dear, "Found Sequence Terminator" and the 77 ... I have overseen that information. Thanks Marshmellow.
Offline
Pages: 1