I’ve cloned many AWID fobs before but this one doesn’t seem to be cloneable.
data for the fob to be copied:
[+] AWID - len: 37 FC: 2599 Card: 159865 - Wiegand: 1513ce0f20, Raw: 012274847d781e8811111111
When I do the command lf awid clone --fmt 37 --fc 2599 --cn 159865, the raw data and weigand turn up different.
I even tried dumping and restoring t55xx but that only ends up bricking my t55xx.
This is the dump data/file
[usb] pm3 → lf t55xx dump
[+] Page 0
[+] blk | hex data | binary | ascii
[+] ----±---------±---------------------------------±------
[+] 00 | 40083830 | 01000000000010000011100000110000 | @.80
[+] 01 | 00913A42 | 00000000100100010011101001000010 | …:B
[+] 02 | 7D781E8B | 01111101011110000001111010001011 | }x…
[+] 03 | 20888888 | 00100000100010001000100010001000 | …
[+] 04 | 00000000 | 00000000000000000000000000000000 | …
[+] 05 | 00000000 | 00000000000000000000000000000000 | …
[+] 06 | 00000000 | 00000000000000000000000000000000 | …
[+] 07 | 00000000 | 00000000000000000000000000000000 | …
[+] Page 1
[+] blk | hex data | binary | ascii
[+] ----±---------±---------------------------------±------
[+] 00 | 40083830 | 01000000000010000011100000110000 | @.80
[+] 01 | 700A8502 | 01110000000010101000010100000010 | p…
[+] 02 | 2A6B1668 | 00101010011010110001011001101000 | *k.h
[+] 03 | 00000000 | 00000000000000000000000000000000 | …
Is this cloneable?
1 Like
It seems to work for me, are you on the latest firmware?
could you post an lf search
of both the target and source cards?
1 Like
The source card is (the one I need to copy)
[usb] pm3 → lf search
[=] Note: False Positives ARE possible
[=]
[=] Checking for known tags…
[=]
[!] Specify one authentication mode
[+] AWID - len: 37 FC: 2599 Card: 159865 - Wiegand: 1513ce0f2a, Raw: 012274847d781e8b41111111
[+] Valid AWID ID found!
[+] Chipset detection: T55xx
[?] Hint: try lf t55xx
commands
The blank one I am copying onto is this:
[usb] pm3 → lf search
[=] Note: False Positives ARE possible
[=]
[=] Checking for known tags…
[=]
[!] Specify one authentication mode
[-] No known 125/134 kHz tags found!
[+] Chipset detection: T55xx
[?] Hint: try lf t55xx
commands
[usb] pm3 →
Even tho it’s not detecrting, it works I just cloned another one onto it. For these ones you need to paste data before they can be read.
1 Like
Can you tell me how you made it work?
1 Like
I copied lf awid clone --fmt 37 --fc 2599 --cn 159865
straight from your post…
What does it end up as?
1 Like
I use the following command:[
usb] pm3 → lf awid clone --fmt 37 --fc 2599 --cn 159865
[=] Preparing to clone AWID 37 to T55x7 with FC: 2599 CN: 159865
[+] Blk | Data
[+] ----±-----------
[+] 00 | 00107060
[+] 01 | 01227484
[+] 02 | 7D781E88
[+] 03 | 11111111
[+] Data written and verified
[+] Done
[?] Hint: try lf awid reader
to verify
The blank fobs becomes this:
[usb] pm3 → lf awid reader
[+] AWID - len: 37 FC: 2599 Card: 159865 - Wiegand: 1513ce0f20, Raw: 012274847d781e8811111111
even though the source card is this:
[+] AWID - len: 37 FC: 2599 Card: 159865 - Wiegand: 1513ce0f2a, Raw: 012274847d781e8b41111111
1 Like
Well now I’m confused
but
Those don’t match either
Does the newly cloned card work on the door or whatever you’re cloning it for?
1 Like
My apologies!!
This is the source card:
[+] AWID - len: 37 FC: 2599 Card: 159865 - Wiegand: 1513ce0f2a, Raw: 012274847d781e8b41111111
This is what I am doing and how it’s ending up:
[usb] pm3 → lf awid clone --fmt 37 --fc 2599 --cn 159865
[=] Preparing to clone AWID 37 to T55x7 with FC: 2599 CN: 159865
[+] Blk | Data
[+] ----±-----------
[+] 00 | 00107060
[+] 01 | 01227484
[+] 02 | 7D781E88
[+] 03 | 11111111
[+] Data written and verified
[+] Done
[?] Hint: try lf awid reader
to verify
RESULT:
[usb] pm3 → lf awid reader
[+] AWID - len: 37 FC: 2599 Card: 159865 - Wiegand: 1513ce0f20, Raw: 012274847d781e8811111111
No, the fob does not work.
1 Like
In that case it’s not working for me
It seems to be an issue with the PM3 client in how it encodes the 37 bit credential, only the parity seems to be calculated wrong
Let’s try debugging the t5 dump and restore process, what have you tried there?
1 Like
Ok, I figured it out.
Here’s how I did it.
[=] raw: 000000000000002006ec0c86
[usb] pm3 → LF T55XX WRITE -b 0 -d 00107060
[=] Writing page 0 block: 00 data: 0x00107060
[usb] pm3 → LF T55XX WRITE -b 1 -d 01227484
[=] Writing page 0 block: 01 data: 0x01227484
[usb] pm3 → LF T55XX WRITE -b 2 -d 7d781e8b
[=] Writing page 0 block: 02 data: 0x7D781E8B
[usb] pm3 → LF T55XX WRITE -b 3 -d 41111111
[=] Writing page 0 block: 03 data: 0x41111111
[usb] pm3 → lf search
[=] Note: False Positives ARE possible
[=]
[=] Checking for known tags…
[=]
[!] Specify one authentication mode
[+] AWID - len: 37 FC: 2599 Card: 159865 - Wiegand: 1513ce0f2a, Raw: 012274847d781e8b41111111
[+] Valid AWID ID found!
[=] Couldn’t identify a chipset
1 Like