before I begin… basically I am trying to clone my work ID to some keychain fob’s that came with an old cheap “blue cloner” tool. I have a terrible habit of leaving my card everywhere but where it should be and I need to clone it to these keychain fob’s.
Things I have done:
I was able to use the commands
"lf hid read"
to get my work ID read and it is in fact a HID Prox card.
I was able to use commands to clone this card to
what I know is actually a T5577 card (not key fob type)
"lf hid clone -r (xxxxxxx my card raw data)
and it worked and was readable with the same command
"lf hid read".
now trying to read the keychain fob to get some info and then attempt to clone my HID prox card to it
[usb] pm3 → lf search
[=] NOTE: some demods output possible binary
[=] if it finds something that looks like a tag
[=] False Positives ARE possible
[=]
[=] Checking for known tags…
[=]
[+] EM 410x ID 3D00D51E2C
[+] EM410x ( RF/64 )
[=] -------- Possible de-scramble patterns ---------
[+] Unique TAG ID : BC00AB7834
[=] HoneyWell IdentKey
[+] DEZ 8 : 13966892
[+] DEZ 10 : 0013966892
[+] DEZ 5.5 : 00213.07724
[+] DEZ 3.5A : 061.07724
[+] DEZ 3.5B : 000.07724
[+] DEZ 3.5C : 213.07724
[+] DEZ 14/IK2 : 00262006971948
[+] DEZ 15/IK3 : 000807465089076
[+] DEZ 20/ZK : 11120000101107080304
[=]
[+] Other : 07724_213_13966892
[+] Pattern Paxton : 1038703660 [0x3DE95C2C]
[+] Pattern 1 : 14896340 [0xE34CD4]
[+] Pattern Sebury : 7724 85 5578284 [0x1E2C 0x55 0x551E2C]
[=] ------------------------------------------------
[+] Valid EM410x ID found!
[=] Couldn’t identify a chipset
I see it did not identify the chipset
Now, does this mean that the blank t55xx is written or emulating a em410x??
I just don’t know how to determine this.
so I tried some em 410x commands to read the fob.
[usb] pm3 → lf em 410x read
[+] EM 410x ID 3D00D51E2C
[usb] pm3 →
now this show’s a em 410x id of 3D00D51E2C
when the earlier command “lf search” showed the UNIQUE TAG ID to be BC00AB7834.
I am not sure what’s the difference between em 410x id and a UNIQUE TAG ID or if any of that info is even useful for my purposes.
so with more online searching I tried to following command
[usb] pm3 → lf t55xx config
[=] — current t55xx config --------------------------
[=] Chip type… T55x7
[=] Modulation… ASK
[=] Bit rate… 0 - RF/8
[=] Inverted… No
[=] Offset… 0
[=] Seq. terminator… No
[=] Block0… 00000000 (n/a)
[=] Downlink mode… default/fixed bit length
[=] Password set… No
I am assuming since this command actually show’s me the “chip type” that it is a T5577??
just going to see if I can actually wipe the data…in case it’s password protected by default
[usb] pm3 → lf t55xx wipe
[=] Target T55x7 tag
[=] Default configuration block 000880E0
[=] Begin wiping…
[=] Writing page 0 block: 00 data: 0x000880E0
[=] Writing page 0 block: 01 data: 0x00000000
[=] Writing page 0 block: 02 data: 0x00000000
[=] Writing page 0 block: 03 data: 0x00000000
[=] Writing page 0 block: 04 data: 0x00000000
[=] Writing page 0 block: 05 data: 0x00000000
[=] Writing page 0 block: 06 data: 0x00000000
[=] Writing page 0 block: 07 data: 0x00000000
[usb] pm3 →
seemed to actually wipe the data. Let’s read it again.
[usb] pm3 → lf t55xx config
[=] — current t55xx config --------------------------
[=] Chip type… T55x7
[=] Modulation… ASK
[=] Bit rate… 0 - RF/8
[=] Inverted… No
[=] Offset… 0
[=] Seq. terminator… No
[=] Block0… 00000000 (n/a)
[=] Downlink mode… default/fixed bit length
[=] Password set… No
[usb] pm3 →
so I am kinda at a loss here. It would seem from this information there is no password yet on the chip , which makes sense since I have never used the cheap rfid reader on it… I am just still not sure where to go from here, so I’m at a loss. I am not very versed at this type of thing but I am trying to learn. I could just copy to several T5577 cards but the key fob’s I won’t lose since I have yet to ever lose my car keys. I would appreciate any kind of help to guide me in the right direction. I am still reading as much info on all this I can. Thanks