Research, development and trades concerning the powerful Proxmark3 device.
Remember; sharing is caring. Bring something back to the community.
"Learn the tools of the trade the hard way." +Fravia
You are not logged in.
Time changes and with it the technology
Proxmark3 @ discord
Users of this forum, please be aware that information stored on this site is not private.
Pages: 1
I was messing around with some Honeywell cards...and the bit structure is pretty much exactly what is listed in this thread:
http://proxmark.org/forum/viewtopic.php?id=2341
...except that the Checksum calculation given in that thread does not seem to be correct. The proxmark firmware does not use this checksum when determining if the card is a valid format.
Has anyone done any further work on the checksum calculation for these types of cards?
Thanks
HK
Offline
Sorry just to clarify, I have two cards marked "Honeywell" and the Bit structure and the scrambled ID bits are similar to the thread mentioned above. The only issue is that my parity and checksum values are completely different. I am trying to figure out if this is a different series of card from that manufacturer...when I demod the Proxmark has to invert the bits and after inversion the demods look like:
Card ID:66027263 BIT HEX: 5600000000577377FD1 C 70 0000000000
Card ID:65889046 BIT HEX: 5600000000466145BE1 6 88 0000000000
On the first card, the parity 0x0C works out according to the earlier thread's procedure, but the checksum of 0x70 does not.
On the second card, the parity of 0x06 does not work out at all, and the checksum of 0x88 doesn't either.
Any ideas on why I can't calculate these values on these original cards?
Thank you
Last edited by hkplus (2019-11-15 06:44:14)
Offline
how about you save two signal traces of your and share here? Easier to let ppl work on it.
Offline
I would love to do that and appreciate your interest Iceman... but could you tell me what Proxmark commands can produce this trace? I typically just use lf search and demod dump...
Offline
easy, I suggest you replace n with printed number or found id
lf read
data save lf_honeywell_nnnn.pm3
Offline
I am not familiar with these files...I have generated them...how do I upload them to the forum?
Offline
Weird just checked these files and there are zero bytes in them...
Offline
You should use a file share service and post the links here
Offline
File sizes are zero - no content in them after creation with proxmark.exe?
Offline
Hi Iceman
I have one honeywell quadrakey dual chips.
lf search: NexWatch ID: 71510297
Had to Invert - probably NexKey
DemodBuffer: A9FFFFFFFFFBDEC7B8EE08FFFFFFFFFF -560000 000004213847-11F7(Checksum different from 17CD/1797)
I'm using proxmark easy, can you advsie more detials on how to save two signal traces?
Offline
I suggest you replace n with printed number or found id
lf read
data save lf_quadrakey_nnnn.pm3
hf search
Since you have a dual card, you will need to figure out which kind of tech the second interface uses.
Offline
try pulling latest code, it should atleast give you the descrambled 88bit format id.
The checksum / parity is still unknown.
Offline
Pages: 1