Hello All,
I am trying to clone an AWID keycard to a generic key fob EM410xx key fob but cannot accomplish it. I have followed the guides and clone the AWID card to the generic fob but it populates as a Indala ID after cloning.
I have already bricked one of my extra fobs by preforming a lf t5 dump on the AWID and restoring on another EM410xx. I assume its the password issue too.
I believe it is due to being password protected.
Does anyone have an idea on how to unlock the card or obtain the password so I can write the generic fobs correctly? Any help would be appreciated. Thanks!
Here the info to the AWID card.
pm3 → lf search
[=] NOTE: some demods output possible binary
[=] if it finds something that looks like a tag
[=] False Positives ARE possible
[=]
[=] Checking for known tags…
[=]
[+] AWID - len: 26 FC: 77 Card: 41636 - Wiegand: 9b4549, Raw: 011d84774248881111111111
[+] Valid AWID ID found!
[usb] pm3 → lf t5 info
[=] — T55x7 Configuration & Information ---------
[=] Safer key : 0
[=] reserved : 0
[=] Data bit rate : 2 - RF/32
[=] eXtended mode : No
[=] Modulation : 3 - PSK 3 phase change on rising edge of input
[=] PSK clock frequency : 2 - RF/8
[=] AOR - Answer on Request : No
[=] OTP - One Time Pad : No
[=] Max block : 1
[=] Password mode : Yes
[=] Sequence Terminator : No
[=] Fast Write : No
[=] Inverse data : No
[=] POR-Delay : No
[=] -------------------------------------------------------------
[=] Raw Data - Page 0, block 0
[=] 00083830 - 00000000000010000011100000110000
[=] — Fingerprint ------------
Here is what it clones:
[usb] pm3 → lf search
[=] NOTE: some demods output possible binary
[=] if it finds something that looks like a tag
[=] False Positives ARE possible
[=]
[=] Checking for known tags…
[=]
[+] Indala (len 95) Raw: 8000000000000000fc039bfe00fc039bff00000000000000007c039f
[+] Valid Indala ID found!