I’m trying to clone a new access card I received from work, to a blank t55xx fob, but I’m not sure which data actually gets cloned, HID, Indala Optus, etc? Is it even possible to clone it?
hid preamble detected
[+] [H10306 ] HID H10306 34-bit FC: XXXXX CN: XXXXX parity ( fail )
[+] [N10002 ] Honeywell/Northern N10002 34-bit FC: XXXXX CN: XXXXX parity ( fail )
[+] [Optus34 ] Indala Optus 34-bit FC: XXXX CN: XXXXX
[+] [SMP34 ] Cardkey Smartpass 34-bit FC: XXXX CN: XXXXX Issue: 3
[+] [BQT34 ] BQT 34-bit FC: XX CN: XXXXXXXX parity ( fail )
[=] found 5 matching formats
[+] DemodBuffer:
[+] 1D555A6966565A6A9A9A6695
[=] raw: 00000000000000XXXXXXXXd8
[+] Valid HID Prox ID found!
[+] Chipset detection: EM4x05 / EM4x69
[?] Hint: try lf em 4x05
commands
[usb] pm3 →
Additional info from em 4x05 dump if needed:
Summary
[usb] pm3 → lf em 4x05 chk
[+] loaded 122 keys from dictionary file C:\working\ProxSpace\pm3\proxmark3\client\dictionaries/t55xx_default_pwds.dic
[=] press to exit
[=] testing 51243648
[=] testing 000D8787
[=] testing 19920427
[=] testing 50524F58
[+] found valid password [ 50524F58 ]
[+] time in check pwd 1 seconds
lf em 4x05 dump -f myfile -p 11223344
[usb] pm3 → lf em 4x05 dump -p 50524F58
[=] Found a EM4305 tag
[=] password is correct
[=] Addr | data | ascii |lck| info
[=] -----±---------±------±–±----
[=] 00 | 00040072 | …r | | Info/User
[=] 01 | 789AE2FC | x… | x | UID
[=] 02 | 50524F58 | PROX | | Password
[=] 03 | 0000BB3A | …: | | User
[=] 04 | 003DC258 | .=.X | | Config
[=] 05 | 69A55547 | i.UG | | User
[=] 06 | A9A59599 | … | | User
[=] 07 | 5699A6A6 | V… | | User
[=] 08 | 00000000 | … | | User
[=] 09 | 00000000 | … | | User
[=] 10 | 00000000 | … | | User
[=] 11 | 00000000 | … | | User
[=] 12 | 00000000 | … | | User
[=] 13 | 00000000 | … | | User
[=] 14 | 00008002 | … | | Lock active
[=] 15 | 00000000 | … | | Lock