Proxmark3 community

Research, development and trades concerning the powerful Proxmark3 device.

Remember; sharing is caring. Bring something back to the community.


"Learn the tools of the trade the hard way." +Fravia

You are not logged in.

Announcement

Time changes and with it the technology
Proxmark3 @ discord

Users of this forum, please be aware that information stored on this site is not private.

#1 2015-04-03 18:44:43

Lenox
Contributor
Registered: 2015-01-29
Posts: 42

Decoding & Cloning ICT Key Fob

I am trying the latest pm3-bin-2.0.0 for the ICT fobs.

What I did:

proxmark3> lf search 1 u
NOTE: some demods output possible binary
  if it finds something that looks like a tag         
False Positives ARE possible
Checking for known tags:
No Known Tags Found!
Checking for Unknown tags:
Possible Auto Correlation of 11200 repeating samples         
Unknown FSK Modulated Tag Found!         
1101010011010011         
0100110100101011         
0101010010101111         
1111111111111111         
1111111111111111         
1111111111111111         
1111111111111111         
1000010101010100         
1101010011001101         
0101001101010101         
0101010101001101         
0011010101010100         
1100110101010101         
0011010101010100         
1101010011010011         
0100110100101011         
0101010010101111         
1111111111111111         
1111111111111111         
1111111111111111 

Ink to Trace: http://www.filedropper.com/investigated-ict

Have any idea how to decode and clone it?  Thanks in advance.

Offline

#2 2015-04-04 04:56:34

marshmellow
Contributor
From: US
Registered: 2013-06-10
Posts: 2,302

Re: Decoding & Cloning ICT Key Fob

is there any markings on the tag, a printed number or anything?

the binary you received is the correct demod - 224 total bits (11200/50 [clock])

the bits appear inverted, probably meaning FSK2a, so an invert would likely be more accurate.  looks like 4 0's (or 1's once inverted) is the start pattern. then possibly manchester encoded bits after that for 152 bits (76 decoded bits).

Offline

#3 2015-04-04 05:44:44

Lenox
Contributor
Registered: 2015-01-29
Posts: 42

Re: Decoding & Cloning ICT Key Fob

The number on the fob:
17638
GT 081

Offline

#4 2015-04-04 14:52:25

marshmellow
Contributor
From: US
Registered: 2013-06-10
Posts: 2,302

Re: Decoding & Cloning ICT Key Fob

It appears it will take more tags to identify the correlation between the printed ID an the binary on the tag.  (Looks like it is scrambled a little.) (Though 81 can be clearly read)

As far as cloning, it should be possible with the repeating bits you have.  As is you would configure all 7 blocks of a ata55x7 to output the repeating binary value with fsk2 modulation and RF/50.  See the chip datasheet and forum posts for how.

Last edited by marshmellow (2015-04-05 01:57:34)

Offline

#5 2015-04-07 03:15:53

Lenox
Contributor
Registered: 2015-01-29
Posts: 42

Re: Decoding & Cloning ICT Key Fob

It works. Thanks

Offline

Board footer

Powered by FluxBB