I have a new access card from a new place of employ, and the Proxmark3 can’t read it at all. The card is from 3millID.
Anybody know what this might be?
I have a new access card from a new place of employ, and the Proxmark3 can’t read it at all. The card is from 3millID.
Anybody know what this might be?
First identify LF or HF,
look if you can see card antenna. It gives you a hint of which tech.
or use “lf tune --mix” vs “hf tune --mix” to identify which tech gives you a voltage drop.
Some cards is finicky with distance to pm3 antenna.
try different positions and based from previous steps, run
“lf search” or “hf search”
Woot! Thank you for pointing me in the right direction - using hf and lf tune, I determined both that it was high frequency and where I needed to put the card to read best. I then used hf search and it identified it as an ISO14443-A card by NXP Semiconductors, Mifare DESFire.
I’d tried hf search before but I must have not oriented the card to read correctly (every… time… and there were many) but by using hf tune I could see exactly where things needed to be.
Thx again.
I don’t know what your plans are. They’re not really clonable, but I just discovered these exist the other day: MIFARE DESFire® Compatible UID Modifiable Emulator Card — Lab401
That’s actually super helpful, thank you!
It honestly shouldnt work if the card system is set up properly. But you know how companies like to spend millions on hardware and software, but not implement it properly.
Lol Don’t do anything that’s going to get you fired.
To expand on this, the magic cards only emulate the UID and some of the profile aspects of the desfire but you can’t actually deploy application AIDs or do authentication (afaik)