Icopy 5/8 default password

Hello. Can someone tell me the password that icopy 5 8 sets to the 125khz tag by default ? Need for bruteforce. If it is ok, can you share your common password list for bruteforce. Thx

Ok, I think the icopy 5/8 are kind of continuations of the white cloner etc, whereas the icopy x/xs are european totally different beasts.
So, I’m going to take a bit of a guess with this and give you the info that works for me with a late 2018 cloner I have, which with some luck, might help you!
Many of the keys for the older blue and white cloners are easy to google, but the later ones use some maths to calculate the password based on the UID.
The iceman proxmark softwear supports this so you can try:
lf t55xx chk --em 0000030039
That’s with the card’s uid set to the hex of decimal 12345 in em410x mode.
You can hopefully factory reset the tag with the following:
lf t55xx write -b 0 -d 000880e0 -p 00012b2b
lf t55xx write -t --pg1 -b 3 -d 00A00003
try them with the -t option as well.

Also, I’ll include below, a list of keys I’ve sniffed my cloner trying to use when you go to write a tag. It almost always finds one that works, so I’ve kind of built this lot tacked onto the end of my t55xx_default_pwds.dic
Some of them are definitely already there, so totally worth just doing a lf t55 chk first, to see if you already have it!

Failing all that, You’ll just have to do a lot of t55 sniffs and see if you can find what it does!
HTH:

W

all passwords seen from cloaner

00000004
0000000D
00009595
00012b2b
00014343
00058787
000A4020
00148040
00300D29
00601A52
00882200
00ad4f4f
01A5211D
05000000
0601A52F
19920427
28000000
4328C0C0
44B44CAE
45000000
51243648
54AAAFD5
5A265701
61858000
74280400
7FC00000
AA5557EA
AA7FFFBA
FF800000
FFFFD000
FFFFFC00
FFFF3FFF
FFFFA000
FFFFFFE9
FFFFFFFA

1 Like