In addition to the new apartment key with my other post, I’ve also gotten a new job that has given out some ID’s which I couldn’t help but take a look at. They are iCLASS, but as I’ve been reading here, that doesn’t mean a whole lot in terms of figuring out if it’s clonable. The writing on the back says its a HID iClass Px D9P which I’d never heard of and couldn’t find online.
Running an lf search nets me the following:
[usb] pm3 --> lf search
[=] NOTE: some demods output possible binary
[=] if it finds something that looks like a tag
[=] False Positives ARE possible
[=]
[=] Checking for known tags...
[=]
[+] [C1k48s ] HID Corporate 1000 48-bit std FC: 4530 CN: 85581 parity ( ok )
[=] found 1 matching format
[+] DemodBuffer:
[+] 1D96A9555555555555555556655556569A59555996A5969A
[=] raw: 09e0000000014011b2029c9b
[+] Valid HID Prox ID found!
[=] Couldn't identify a chipset
The hf search alternatively gets me
[usb] pm3 --> hf search
[|] Searching for iCLASS / PicoPass tag...
[+] iCLASS / Picopass CSN: 10 73 EB 02 F8 FF 12 E0
[+] Valid iCLASS tag / PicoPass tag found
and a further investigation with a hf iclass info gets us:
Never mind the first thing I said. iClass SE means no dumping it. Your only option is to record the wiegand data off a wall reader or omnikey and then use the proxmark to encode block 7 onto a legacy card. This only works if your target reader accepts legacy.
His card is different. SE is not legacy. It is based on the same card technology (picopass) but uses different (unknown) master keys and KDF. It was created by HID in response to the legacy master keys being leaked.
Yep, it says its a iClass Px D9P on the back. LF search gets us:
[usb] pm3 --> lf search
[=] NOTE: some demods output possible binary
[=] if it finds something that looks like a tag
[=] False Positives ARE possible
[=]
[=] Checking for known tags...
[=]
[+] [C1k48s ] HID Corporate 1000 48-bit std FC: 4530 CN: 85581 parity ( ok )
[=] found 1 matching format
[+] DemodBuffer:
[+] 1D96A9555555555555555556655556569A59555996A5969A
[=] raw: 09e0000000014011b2029c9b
[+] Valid HID Prox ID found!
Already got a flexMN and flexMT so they’re built in. I ran into trouble with the actual writing though. It told me that:
[usb] pm3 --> lf hid clone -r 09e0000000014011b2029c9b
[=] Preparing to clone HID tag using raw 09e0000000014011b2029c9b
[#] Tags can only have 84 bits
[=] You can cancel this operation by pressing the pm3 button