Research, development and trades concerning the powerful Proxmark3 device.
Remember; sharing is caring. Bring something back to the community.
"Learn the tools of the trade the hard way." +Fravia
You are not logged in.
Time changes and with it the technology
Proxmark3 @ discord
Users of this forum, please be aware that information stored on this site is not private.
Pages: 1
Topic closed
Hello all,
I'm a new owner of an Elechouse Proxmark3 Easy.
I'm trying to read the transponder chips in the keys for my 2005 Subaru, in an effort to reverse engineer the immobilizer system.
I know that these are 4D62 "80-bit" chips, which operate at 134kHZ.
As far as I know these are *not* HiTag chips, and I've been unable to read them using the Proxmark LF HiTag commands.
I did "snoop" a successful read of a key by the actual engine computer, but can't seem to successfully demodulate it into anything useful, so I'm looking for tips on how best to snoop and interpret unknown 134kHZ signals.
Happy to provide the trace(s) I've got as well.
Thanks in advance for the support! The Proxmark3 is a super powerful tool that I'm stoked to have discovered!
Offline
Welcome and I suggest you read http://www.proxmark.org/forum/viewtopic.php?id=1125 as an introduction.
Your access rights has been updated.
Offline
Pages: 1
Topic closed