if you wanna write this to a T5577 (much cheaper) you can write an em4100 credential, these are often cross compatible so long as the system hasn’t disabled em4100 (most don’t turn it off because they don’t know it’s a security flaw)
your clone command is: lf em 410x --id 0002D5F3D6
@tac0s has enlisted me for the wiki when it goes up and i’ve got some time off work i’ll make sure things like this are documented step by step with correct syntax so there’s no confusion in the future.
Gents I can’t thank you enough! I managed to get it working and copying fobs to cards already
I had a look at the video about copying to Em410 fob and I’m very interested! I cant seem to understand the 0002D5F3D6 part of the command. Is this the UID of a previous LF searched or dumped card of am I barking up the wrong tree
Thanks again litterally no experience in this so your help has been invaluable!
Ok the thing to note about Indala tags is that they have no CRC or parity checking at all, so if some random noise is close enough to an Indala ID signal, the proxmark3 will “detect” it as an Indala. How you can tell if it really is Indala and not random noise is to repeatedly read the tag… if the ID keeps changing, it’s just random noise being picked up and interpreted as an Indala tag.
In short, I think your coupling is a problem. The green ring indicates this is a “compact” fob so the antenna is probably very small inside there. You will likely have to hang the fob half-way off the LF antenna ring to properly couple. You can use lf tune to try to locate best position by watching for the largest voltage drop. Run the tune command and move the fob around until you see the largest voltage drop… then keep it there and run your command.
Paxton access tokens come in various styles and colours which is system dependent.
Paxton10: Bullet fob white ring, plain white card, bluetooth remote, disc/ band, cable tie.
Paxton Net2: Bullet fob blue ring, plain white card, bluetooth remote, disc/ band, cable tie.
Paxton Compact/ Switch2: Bullet fob green/ amber/ red ring, white card green/ amber/ red square.
All are Hitag2 with Paxton basestation password and transponder password changed.
The data stored in pages 4 to 7 is the encoded Paxton credential which is formatted differently for each of the above systems. Paxton10 also uses the unique, locked, Hitag2 IDE as a part of its credential so it cannot be cloned. The Paxton10 anti-cloning is also used by the GDX for their identical “Indigo” fobs.
AAPROX use a Paxton bullet fob with grey ring which contains only a standard EM chip.
There is only one device that can duplicate any of the above. The PX1 by Retag-UK is available through all major locksmith distributors in the UK.
Rfidler, Proxmark, Keysy, iCopy cannot do it, don’t waste your time trying.
Hi all, only got around to this today. But the spoon did the trick! Currently trying to clone the paxton fob to a T5577 which is another issue in itself…