I’m pretty new to the Proxmark 3 game and am using the EZ with the Iceman firmware. I got a JakCom smart ring that supposedly has two T55xx chips in it and was trying to clone some tags to it. I was able to write one HID tag to the ring, but in my attempts to write to the second chip I believe I bricked both chips and now I can only detect the T55xx chips using a password of ‘00000000’.
I have two questions:
Is there an easy way to tell if there are two T55 chips in this and clone to each individually?
Is it possible to save this ring or have I already bricked the chips beyond repair?
I have tried rewriting the block 0 to default multiple times and still just get the same ‘detect’ output.
lf t55xx write b 0 d 000880E0 p 00000000
I have also tried using test mode and wasn’t able to wipe anything.
This seems like an odd design feature.
As I imagine the antenna is wrapped around tge circumference if the ring, and if there were 2 chips of the same frequency, with antennas running parallel, this would cause nothing but problems.
IF however they were “folded” and took up half the space each, it might be usable, but you would need to present it perfectly to a reader to get the right chip.
Could you post a link from where you got it?
This is what I would try You can also try without the -t
lf t5 wipe --p 00000000 -t
from there just write whatever you want to it
eg.
lf em 41 clone --id 1122334455
Depending on what you end up with, THIS may be of interest
Thanks so much for the info so far, that’s super helpful! So, if I understand correctly the JakCom password is my golden ticket? It’s so weird that it shows the password as 00000000. Even when I run bruteforce it says that 00000000 is found as a correct password which is very interesting.
Is it worth trying to have the PM guess the password or should I just look around online?
Here’s the diagram that they have on the manual and on their site.
Here’s the link to the online manual (which includes an ad for their proprietary cloner lol). Chrome shows it as not secure jsyk: http://www.jakcom.com/ins/r5/r5en.html
Yeah, that makes more sense that way, I would assume the “best” way to use the LF side would be to remove the ring, or flip 180⁰ to read the side closest to the knuckles.
If you had one, you could likely sniff the password.
If that specific password was on this forum, I would probably be able to find it for you,; it may be one of the common ones, used by the white cloner, however, I assume they are all in the Flipper dictionary, and therefore not likely.
You may be best jumping on the RFID discord, and seeing if somebody there can point you in the right direction.
I ran into a few problems when trying to Program ID 1 and ID 2 with it seaming to be bricked and would not read anything from either ID 1 or ID 2
I am using Proxmark 3 to Write and Flipper Zero to Read.
The Flipper Zero reads anything but it wouldn’t Read anything from my initial problem.
To get out of this i used the instructions on here, basically you need to clear the blocks 0 - 7 to 0x00000000 using this comand:
lf t5 wipe --p 00000000
and then your program code. Mine is Pac/Stanley so i use this code.
lf pac clone --cn XXXXXXXX (XXXXXXXX = my Code)
Doing this will work everytime. A question i have though is: Are there 4 RFID chips or just 2 and why can we only seam to be able to program one ? (A bit of a waste)
I have several RFID tags. Another thought is can more than one tag be combined together ? ie sending out two or more codes to the reciever.
I think ( I don’t have one ) the R5 has 6 Chips in total
2 x IC ( Mifare Classic 1k not sure if gen1a or gen2 )
2 x NFC ( Assuming NTAG 213, 215, 216??)
Now for your question
2 x RFID , I would assume T5577, however, since you can only seem to be able to program one, my GUESSES are:
1 is faulty on yours
1 is T5577 known from your PM3 T5 write command, the other is possibly EM, HID Prox etc???
Your placement is not quite just right ( this on less likely, you know what you are doing)
Have you tried another writer like the blue cloner or white cloner? (another password on it?)
Have you also tried writing OTHER LF modes with the PM3?
Have you tried using the Flipper to write to it in various other modes ( easier placement than PM3 )
It’s always good to drop this as a reminder to everybody occasionally, because manufacturers/ vendors perpetuate the misconception through the use of “RFID” to refer to Low Frequency