So I’ve got what was supposed to be a 26bit HID tag and it read exactly as expected the first time I put it on my proxmark. The second time I messed with it the client identified it as a t55 so naturally I tried writing a different card number to it. It failed now I’m trying to brute force the password on it because it wasn’t one of the defaults listed in the dictionary file that came when I downloaded the proxmark client.
That being said if I’m doing my math right here, it could take up to 34 years to finish this task. It’s working at about 4 tries per second.
I’m open to other ideas, side note it says valuprox on the back of the card in case anyone has unlocked one before.
ah sorry, so the T5577 has “test mode” commands that basically backdoor the thing… I think they are your typical “security through obscurity” type of thing, so naturally the test mode commands were discovered and they let you like totally work around and reset the T5577 completely… search the forums here for test mode commands… there have been a few threads about it… @TomHarkness was first on the scene I think with the test most stuff.
Sounds a lot better than waiting around for 34 years, I also kind of wanted to know what password they were using but if I could reset it that would at least unlock the full potential of the chip. Thank you for the tip, I’ll start looking.