does it just give you that output of valid iclass found or does it give you more info
do hf ic info and make sure its outputting properly
then re run the dump command making sure your card is securely placed on the proxmark so it can couple (black square is high freq antenna. it needs to either be ontop of the back suqare or under it under the proxmark.)
[=] NOTE: some demods output possible binary
[=] if it finds something that looks like a tag
[=] False Positives ARE possible
[=]
[=] Checking for known tags…
[=]
[/]Searching for COTAG tag…
[-] No data found!
[?] Maybe not an LF tag?
[=] hf search
Searching for iCLASS / PicoPass tag…
[+] iCLASS / Picopass CSN: 2D B8 BC 10 FE FF 12 E0
well there we go, it’s an SE credential which means it has keys that aren’t publicaly disclosed and not available to the proxmark. you can’t dump it because you don’t have the key. you’ll need a weaponised reader to be able to clone this.
in your output. the SE is the next generation after legacy and doesn’t share the keys
a weaponised reader is using an official hid multiclass reader with an esp interceptor to sniff the raw wiegand data of the card and downgrade it onto an iclass legacy. and no the proxmark can’t do that alone it needs the reader
I don’t think so. I’m pretty sure the article is referencing old iClass… It was just an example of what might need to happen to get the keys for an SE card… I don’t know the specifics for the new secure version of iClass
in your output it says the credential type. it says iclass SE
a weaponised reader is a HID multiclass reader that you wire an esp wiegand interceptor into. you can buy these or make them (can’t remember if omni key works for this tbh) you can then take the information from your exposed iclass SE and put it on an iclass legacy