Step back, slow down and remember we don’t have any context…
So, what I can gather is that you have just moved into a townhome community and you are trying to clone a Kantech IoProx key fob so that you can give one to your daughter.
You have the correct command lf io clone --vn --fc --cn but you need to know the values for vn, fc and cn.
You should be able to put your working IoProx on the LF antenna of a proxmox and run the command lf io read and it should spit out all of the data you need.
Thanks, I do the lf io read, it returns XSF(01)c2:64030, Raw: 007870a03fa8f4d3
I don’t know what goes to what. I apologize, I am exhausted.
These are the options
clone a ioProx card with specified facility-code and card number
to a T55x7, Q5/T5555 or EM4305/4469 tag.
Tag must be on the antenna when issuing this command.
options:
-h, --help This help
–vn 8bit version
–fc 8bit facility code
–cn 16bit card number
–q5 optional - specify writing to Q5/T5555 tag
–em optional - specify writing to EM4305/4469 tag
version = id_str.split(‘(’)[1].split(‘)’)[0]
facility = id_str.split(‘(’)[1].split(‘)’)[1].split(‘:’)[0]
code = id_str.split(‘:’)[1]
version = int(version, 16) #is this hex? Have only seen 1 or 2 here
facility = int(facility, 16) #this is always hex
code = int(code, 10) #this is always decimal
I followed the link, it leads to the Proxmark3 forum login page.
I haven’t been on there in a while so I am not sure how active it is.
There is a Discord for RFID Hacking ( Same peeps ) which is quite active with a large helpful community ( Just make sure you do your research / search before asking questions )
I am trying to the same thing discussed here. Why didn’t you use --vn 02 --fc ## --cn #####. I have tried it the same way without vn… fc… cn and with it; I have had no luck. It simply pulls up the lf io help. I have tried with the fc in hex 88 and as dec 136. If you have any advice you could offer I would be grateful.