Proxmark3 community

Research, development and trades concerning the powerful Proxmark3 device.

Remember; sharing is caring. Bring something back to the community.


"Learn the tools of the trade the hard way." +Fravia

You are not logged in.

Announcement

Time changes and with it the technology
Proxmark3 @ discord

Users of this forum, please be aware that information stored on this site is not private.

#1 2019-01-15 17:20:02

WMW
Contributor
Registered: 2019-01-07
Posts: 3

Wiegotcha

I've been at this a couple of months and come up with nothing, now I need to ask for some help.

I have built a wiegotcha (RFID thief) using a HF antenna (HID R10, the R90 is really expensive if this doesnt work...)

The data it spits out when used to scan a Mifare classic 1k card is as follows:

Bit length - 33
Facility code - 67
ID number - 9602288
proxmark hex - 23872509e1
block7 - 00000003872509e1
raw bits - 00000010001110000111001001010000100111100001

So if this was an LF card, this info would be great, and i could clone a card simply, but HF is very different.

I've read up on decoding the block7 data for iclass cards using the master key ect, but this doesnt work with mifare.

In an ideal world i want to decode this info to get the UID and any more info i can.

Can anyone help, or point me in the right direction?

Thanks

Offline

#2 2019-01-15 23:14:36

marshmellow
Contributor
From: US
Registered: 2013-06-10
Posts: 2,302

Re: Wiegotcha

What is the uid of the card?

Offline

#3 2019-01-16 00:22:50

0xFFFF
Administrator
From: Vic - Australia
Registered: 2011-05-31
Posts: 632

Re: Wiegotcha

If you want more information about a card without using anything more than Wiegand to interface with an R10 or R90, you're not going to get far.
You can determine the UID from a very limited range of very specific credentials.

Offline

Board footer

Powered by FluxBB