Research, development and trades concerning the powerful Proxmark3 device.
Remember; sharing is caring. Bring something back to the community.
"Learn the tools of the trade the hard way." +Fravia
You are not logged in.
Time changes and with it the technology
Proxmark3 @ discord
Users of this forum, please be aware that information stored on this site is not private.
I have an indala card here is info.
##########################################
[=] Session log C:/Users/─хэшё/.proxmark3/logs/log_20200812.txt
[=] Loading preferences...
[+] loaded from JSON file C:/Users/─хэшё/.proxmark3/preferences.json
[=] Using UART port com20
[=] Communicating with PM3 over USB-CDC
██████╗ ███╗ ███╗█████╗
██╔══██╗████╗ ████║╚═══██╗
██████╔╝██╔████╔██║ ████╔╝
██╔═══╝ ██║╚██╔╝██║ ╚══██╗ iceman@icesql.net
██║ ██║ ╚═╝ ██║█████╔╝ https://github.com/rfidresearchgroup/proxmark3/
╚═╝ ╚═╝ ╚═╝╚════╝ bleeding edge
[ Proxmark3 RFID instrument ]
[ CLIENT ]
client: RRG/Iceman/master/v4.9237-399-g456cc66a 2020-06-19 13:46:09
compiled with MinGW-w64 9.3.0 OS:Windows (64b) ARCH:x86_64
[ PROXMARK3 ]
[ ARM ]
bootrom: RRG/Iceman/master/v4.9237-399-g456cc66a 2020-06-19 13:46:55
os: RRG/Iceman/master/v4.9237-399-g456cc66a 2020-06-19 13:47:12
compiled with GCC 9.2.1 20191025 (release) [ARM/arm-9-branch revision 277599]
[ FPGA ]
LF image built for 2s30vq100 on 2020-02-22 at 12:51:14
HF image built for 2s30vq100 on 2020-01-12 at 15:31:16
[ Hardware ]
--= uC: AT91SAM7S512 Rev B
--= Embedded Processor: ARM7TDMI
--= Nonvolatile Program Memory Size: 512K bytes, Used: 224096 bytes (43%) Free: 300192 bytes (57%)
--= Second Nonvolatile Program Memory Size: None
--= Internal SRAM Size: 64K bytes
--= Architecture Identifier: AT91SAM7Sxx Series
--= Nonvolatile Program Memory Type: Embedded Flash Memory
[usb] pm3 --> lf search
[=] NOTE: some demods output possible binary
[=] if it finds something that looks like a tag
[=] False Positives ARE possible
[=]
[=] Checking for known tags...
[=]
[+] Indala Found - bitlength 224, Raw 0x80000003b2a293b7e2e31aba3cbee4afb3c6ad1fcf649393928c14e5
[+] Valid Indala ID found!
[usb] pm3 --> lf indala demod
[+] Indala Found - bitlength 224, Raw 0x80000003b2a293b7e2e31aba3cbee4afb3c6ad1fcf649393928c14e5
[usb] pm3 --> lf indala altdemod
[=] Recovered 936 raw bits, expected: 937
[=] worst metric (0=best..7=worst): 3 at pos 26
[+] UID | 0000000000000000000000000000001011011100110000110001110100100101 (2dcc31d25)
[usb] pm3 -->
################################################################
What should i do next? Which card to copy ( type of card to clone? ) and which command to enter?
Please help me, who understands this issue))
Offline
I would start with the command
lf indala
and see what comes up in the help.
Offline
I would start with the command
lf indala
and see what comes up in the help.
Yes Thanks i know what will happen when you enter this command.
I have some questions
1 what type of card can i write indala on?
2 what is the correct command for this to be ( command to write to a new card )?
Last edited by Key master (2020-08-13 11:50:41)
Offline
OK lets see
lf indala
[usb] pm3 --> lf indala
help this help
demod demodulate an indala tag (PSK1) from GraphBuffer
altdemod alternative method to Demodulate samples for Indala 64 bit UID (option '224' for 224 bit)
read read an Indala Prox tag from the antenna
clone clone Indala tag to T55x7
sim simulate Indala tag
This shows us
clone clone Indala tag to T55x7
where clone would be used to "clone indala tag" to the T55x7 card.
So there is the clone command that can write to a T55x7 card
So once we have a t55x7 (e.g. T5577) card on the proxmark, what is the format of the command.
if we use the clone command without any options it should tell us
lf indala clone
[usb] pm3 --> lf indala clone
Usage: lf indala clone [-h|-H|--help] [-l|-L|--long] [-c|-C|--heden=<decimal>] [-r|-R|--raw=<hex>]... [-q|-Q|--Q5] [|--fc=<decimal>] [|--cn=<decimal>]
clone INDALA tag to T55x7 (or to q5/T5555)
-h, -H, --help This help
-l, -L, --long optional - long UID 224 bits
-c, -C, --heden=<decimal> Cardnumber for Heden 2L format
-r, -R, --raw=<hex> raw bytes
-q, -Q, --Q5 optional - specify write to Q5 (t5555 instead of t55x7)
, --fc=<decimal> Facility Code (26 bit format)
, --cn=<decimal> Cardnumber (26 bit format)
Examples:
lf indala clone --heden 888
lf indala clone --fc 123 --cn 1337
lf indala clone -r a0000000a0002021
lf indala clone -l -r 80000001b23523a6c2e31eba3cbee4afb3c6ad1fcf649393928c14e5
We can see that not only do we know the command we have an example.
The last line looks to show the code in the format you found.
So, since you will be cloning to your own card, at this point there is no harm in trying that command.
Once cloned, if it worked, you should be able to check by using the same approach to find the card ID. If that all looks the same, time to test in the real world.
Offline