Research, development and trades concerning the powerful Proxmark3 device.
Remember; sharing is caring. Bring something back to the community.
"Learn the tools of the trade the hard way." +Fravia
You are not logged in.
Time changes and with it the technology
Proxmark3 @ discord
Users of this forum, please be aware that information stored on this site is not private.
I bought a cloner from china and as I project what I would like to do is add an LCD to it and then maybe some sort of input to change numbers.
http://www.aliexpress.com/item/Handheld-125Khz-RFID-Honeywell-proximity-card-Copier-portable-Duplicator-Cloner-H-ID-reader-writer-10pcs-cards/1400802056.html
This isn't the link to where I bought it, I got it off ebay but it looks the same as this one. If anyones curious it works perfectly, tested it on my 125Khz HID card in the office.
Can someone advise if it would be possible for me to mount an LCD on the front of this so I can read the numbers? I can take it apart and photograph the inside if that helps???
I am not sure which point would be the best to access data on the board, like during read or write? Also would be cool if I could add some sort of arduino/sdcard type thing and store all the cards I read on a .txt file or something.
Offline
Do you know it your cloner sets the password on t55x7 tags? If so, can you sniff the traffic to get the password? or do you know the password?
Offline
tbh I am not sure, I just know it worked as I cloned my card and it let me in my building. My official card is stamped HID Proximity and the blank cards they came with the cloner worked.
And yes thats my plan, sniff the password off the PCB somehow but tbh I am a programmer not a hardware guy so this is all a bit new to me, is there any encryption or is the HID card singing out details in cleartext?
Offline
You are not in the right forum for hardware modification of a chinese cloner, you are in the Proxmark3 forum, where it mainly is about the proxmark3 device.
When it comes to cloners, the community has found that some of them sets a password on your cloned tag. And you can only use the cloner to re-program it. However, with a PM3 you can sniff the traffic and find out the password to unlock the tag again.
I was curious about if your cloner did this, and if it did, I would like to find out the pwd it uses.
I can't help you with your hardware modifications, but I wish you good luck with it.
Offline
Ok thanks for the info, I will let you know how I get on.
Offline
normally you would sniff the traffic between tag and cloner when it tries to program the tag with a PM3.
From that output, you can get a demodulation and the 4byte pwd.
Do you have a PM3?
Offline
Iceman, I'm interested in knowing these steps. I've been tinkering around with some T5577 fobs and I can't seem to program them. I've tried ones that have been programmed with the Chinese cloner as well as blank and so far no go. I'm able to get cards to clone but the fobs are rough.
I've tested around with data modulation and the lf Snoop utility but can't seem to get a decent stream with valuable data. Any information to help me keep tinkering would be greatly appreciated!
Last edited by minivan (2018-08-30 21:33:52)
Offline