Research, development and trades concerning the powerful Proxmark3 device.
Remember; sharing is caring. Bring something back to the community.
"Learn the tools of the trade the hard way." +Fravia
You are not logged in.
Time changes and with it the technology
Proxmark3 @ discord
Users of this forum, please be aware that information stored on this site is not private.
Pages: 1
I was wondering if there is a way to test to see what type of chip is inside a new blank fob?
I bought some T5577 key fobs and one bag reads as "Valid EM410x ID" when I do a "lf search u" and another bag comes up as "Valid T55xx Chip".... The suppler is adamant that all fobs have the T5577 chip in them.
Fob 1
proxmark3> lf search u
NOTE: some demods output possible binary
if it finds something that looks like a tag
False Positives ARE possible
Checking for known tags:
EM410x pattern found:
EM TAG ID : 1A00739117
Possible de-scramble patterns
Unique TAG ID : 5800CE89E8
HoneyWell IdentKey {
DEZ 8 : 07573783
DEZ 10 : 0007573783
DEZ 5.5 : 00115.37143
DEZ 3.5A : 026.37143
DEZ 3.5B : 000.37143
DEZ 3.5C : 115.37143
DEZ 14/IK2 : 00111676723479
DEZ 15/IK3 : 000377970657768
DEZ 20/ZK : 05080000121408091408
}
Other : 37143_115_07573783
Pattern Paxton : 445107991 [0x1A87CF17]
Pattern 1 : 14311994 [0xDA623A]
Pattern Sebury : 37143 115 7573783 [0x9117 0x73 0x739117]
Valid EM410x ID Found!
Fob 2
proxmark3> lf search u
NOTE: some demods output possible binary
if it finds something that looks like a tag
False Positives ARE possible
Checking for known tags:
No Known Tags Found!
Checking for Unknown tags:
Possible Auto Correlation of 1 repeating samples
Found Sequence Terminator - First one is shown by orange and blue graph markers
Using Clock:32, Invert:0, Bits Found:513
ASK/Manchester - Clock: 32 - Decoded bitstream:
0001001000110100
0101011001111000
0000000000000000
0000000000000000
0000000000000000
0000000000000000
0000000000000000
0000000000000000
0000000000000000
0000000000000000
0000000000000000
0000000000000000
0000000000000000
0000000000000000
0001001000110100
0101011001111000
0000000000000000
0000000000000000
0000000000000000
0000000000000000
0000000000000000
0000000000000000
0000000000000000
0000000000000000
0000000000000000
0000000000000000
0000000000000000
0000000000000000
0001001000110100
0101011001111000
0000000000000000
0000000000000000
Unknown ASK Modulated and Manchester encoded Tag Found!
if it does not look right it could instead be ASK/Biphase - try 'data rawdemod ab'
Valid T55xx Chip Found
Try lf t55xx ... commands
proxmark3>
Offline
Your second fob detected a t55xx (probably t5577) chip. The first one did not.
Offline
thanks for confirming that!
Looks like I'm going to have to file a dispute as they keep claiming that they sent all T5577
Offline
Some manufacturers send out chips with EM data because some customers complain the T5577 cannot be read by their handheld cloners hence they input the EM data into it. You can try use wipe command to clear the data and use lf se u again. Alternatively you can try writing another data (HID, Indala, Keri etc) onto it. If it is able to write another data into it (beside EM), it should be a T5577 chip.
Offline
Use the default key to test if you cannot remove the data inside or like what lohcm88 said. 'lf t55 wipe' to clear the data.
try a viking clone to see whether the data gets copied over.
Or else you can get it from me if you got bulk orders of these cards.
Offline
Pages: 1