Can anyone help me with this AWID fob?

I’ve cloned many AWID fobs before but this one doesn’t seem to be cloneable.

data for the fob to be copied:
[+] AWID - len: 37 FC: 2599 Card: 159865 - Wiegand: 1513ce0f20, Raw: 012274847d781e8811111111

When I do the command lf awid clone --fmt 37 --fc 2599 --cn 159865, the raw data and weigand turn up different.

I even tried dumping and restoring t55xx but that only ends up bricking my t55xx.

This is the dump data/file

[usb] pm3 → lf t55xx dump

[+] Page 0
[+] blk | hex data | binary | ascii
[+] ----±---------±---------------------------------±------
[+] 00 | 40083830 | 01000000000010000011100000110000 | @.80
[+] 01 | 00913A42 | 00000000100100010011101001000010 | …:B
[+] 02 | 7D781E8B | 01111101011110000001111010001011 | }x…
[+] 03 | 20888888 | 00100000100010001000100010001000 | …
[+] 04 | 00000000 | 00000000000000000000000000000000 | …
[+] 05 | 00000000 | 00000000000000000000000000000000 | …
[+] 06 | 00000000 | 00000000000000000000000000000000 | …
[+] 07 | 00000000 | 00000000000000000000000000000000 | …

[+] Page 1
[+] blk | hex data | binary | ascii
[+] ----±---------±---------------------------------±------
[+] 00 | 40083830 | 01000000000010000011100000110000 | @.80
[+] 01 | 700A8502 | 01110000000010101000010100000010 | p…
[+] 02 | 2A6B1668 | 00101010011010110001011001101000 | *k.h
[+] 03 | 00000000 | 00000000000000000000000000000000 | …

Is this cloneable?

1 Like

It seems to work for me, are you on the latest firmware?

could you post an lf search of both the target and source cards?

1 Like

The source card is (the one I need to copy)

[usb] pm3 → lf search

[=] Note: False Positives ARE possible
[=]
[=] Checking for known tags…
[=]
[!] Specify one authentication mode
[+] AWID - len: 37 FC: 2599 Card: 159865 - Wiegand: 1513ce0f2a, Raw: 012274847d781e8b41111111

[+] Valid AWID ID found!

[+] Chipset detection: T55xx
[?] Hint: try lf t55xx commands

The blank one I am copying onto is this:

[usb] pm3 → lf search

[=] Note: False Positives ARE possible
[=]
[=] Checking for known tags…
[=]
[!] Specify one authentication mode
[-] No known 125/134 kHz tags found!
[+] Chipset detection: T55xx
[?] Hint: try lf t55xx commands
[usb] pm3

Even tho it’s not detecrting, it works I just cloned another one onto it. For these ones you need to paste data before they can be read.

1 Like

Can you tell me how you made it work?

1 Like

I copied lf awid clone --fmt 37 --fc 2599 --cn 159865 straight from your post…

What does it end up as?

1 Like

I use the following command:[

usb] pm3 → lf awid clone --fmt 37 --fc 2599 --cn 159865
[=] Preparing to clone AWID 37 to T55x7 with FC: 2599 CN: 159865
[+] Blk | Data
[+] ----±-----------
[+] 00 | 00107060
[+] 01 | 01227484
[+] 02 | 7D781E88
[+] 03 | 11111111
[+] Data written and verified
[+] Done
[?] Hint: try lf awid reader to verify

The blank fobs becomes this:

[usb] pm3 → lf awid reader
[+] AWID - len: 37 FC: 2599 Card: 159865 - Wiegand: 1513ce0f20, Raw: 012274847d781e8811111111

even though the source card is this:

[+] AWID - len: 37 FC: 2599 Card: 159865 - Wiegand: 1513ce0f2a, Raw: 012274847d781e8b41111111

1 Like

Well now I’m confused

but

Those don’t match either

Does the newly cloned card work on the door or whatever you’re cloning it for?

1 Like

My apologies!!

This is the source card:

[+] AWID - len: 37 FC: 2599 Card: 159865 - Wiegand: 1513ce0f2a, Raw: 012274847d781e8b41111111

This is what I am doing and how it’s ending up:

[usb] pm3 → lf awid clone --fmt 37 --fc 2599 --cn 159865
[=] Preparing to clone AWID 37 to T55x7 with FC: 2599 CN: 159865
[+] Blk | Data
[+] ----±-----------
[+] 00 | 00107060
[+] 01 | 01227484
[+] 02 | 7D781E88
[+] 03 | 11111111
[+] Data written and verified
[+] Done
[?] Hint: try lf awid reader to verify

RESULT:

[usb] pm3 → lf awid reader
[+] AWID - len: 37 FC: 2599 Card: 159865 - Wiegand: 1513ce0f20, Raw: 012274847d781e8811111111

No, the fob does not work.

1 Like

In that case it’s not working for me

It seems to be an issue with the PM3 client in how it encodes the 37 bit credential, only the parity seems to be calculated wrong

Let’s try debugging the t5 dump and restore process, what have you tried there?

1 Like

Ok, I figured it out.

Here’s how I did it.

[=] raw: 000000000000002006ec0c86
[usb] pm3 → LF T55XX WRITE -b 0 -d 00107060
[=] Writing page 0 block: 00 data: 0x00107060
[usb] pm3 → LF T55XX WRITE -b 1 -d 01227484
[=] Writing page 0 block: 01 data: 0x01227484
[usb] pm3 → LF T55XX WRITE -b 2 -d 7d781e8b
[=] Writing page 0 block: 02 data: 0x7D781E8B
[usb] pm3 → LF T55XX WRITE -b 3 -d 41111111
[=] Writing page 0 block: 03 data: 0x41111111

[usb] pm3 → lf search

[=] Note: False Positives ARE possible
[=]
[=] Checking for known tags…
[=]
[!] Specify one authentication mode
[+] AWID - len: 37 FC: 2599 Card: 159865 - Wiegand: 1513ce0f2a, Raw: 012274847d781e8b41111111

[+] Valid AWID ID found!

[=] Couldn’t identify a chipset

1 Like

Thank you!

1 Like