From 636a850171e539ebdbc69534b00410d2f1f19559 Mon Sep 17 00:00:00 2001 From: Oleg Moiseenko <807634+merlokk@users.noreply.github.com> Date: Fri, 24 Jun 2022 22:03:53 +0300 Subject: [PATCH] Update T5577_Guide.md Signed-off-by: Oleg Moiseenko <807634+merlokk@users.noreply.github.com> --- doc/T5577_Guide.md | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/doc/T5577_Guide.md b/doc/T5577_Guide.md index ff0e0d3c0..deab49d53 100644 --- a/doc/T5577_Guide.md +++ b/doc/T5577_Guide.md @@ -22,6 +22,8 @@ | [The configuration Block – Block 0 Page 0](#the-configuration-block-block-0-page-0) | | [Exercise 2](#exercise-2) | | [The configuration Block – Block 3 Page 1](#the-configuration-block-block-3-page-1) | +| [Sniffing commands](#sniffing-commands) | +| [T5577 and Keysy](#t5577-and-keysy) | # Part 1 ^[Top](#top) @@ -721,6 +723,7 @@ _to be written_ ## Sniffing commands +^[Top](#top) Some readers work with cards via T55xx commands (read/write/etc) and think that they are safe) The password in this case is sent in clear text. @@ -740,6 +743,7 @@ So) There is a sniff command to get this command from the buffer or the field: ## T5577 and Keysy +^[Top](#top) The Keysy tag cloning tool (https://tinylabs.io/keysy/) uses T5577 tags that have a special "password" value (NOT the password described above) written in Block 6 that is tied to the traceability data. The Keysy checks and computes the proper value for Block 6 and will not write to a tag that does not contain the proper value. This DRM technology relies on the face that genuine T5577 chips cannot have their traceability data (Blocks 1 and 2 of Page 1) re-written and that the method to computer the proper value for Block 6 is proprietary, therefore compelling you to buy their branded tags.