proxmark3/doc/cloner_notes.md
2024-02-23 01:25:54 +02:00

2.7 KiB

Notes on Cloner guns

This document is based mostly on information posted on http://www.proxmark.org/forum/viewtopic.php?pid=39903#p39903

Table of Contents

Blue and black cloners

^Top

3 variants:

  1. EM cloner
  2. HID cloner
  3. EM/HID cloner

Quality varies my manufacturer (Quality A (Good) until D (Bad)) They set a password on block 7 of the chip and set the password enable bit in block 0

Standard password is normally:    51243648

Be sure to purchase the EM/HID version

White cloner (pre 2015)

^Top

Multifrequency Buttons light up BLUE Reads data correctly Coil performance acceptable

Standard password is normally (for T55xx):  AA55BBBB
Standard password 13,56mHz:       individual per white cloner

White cloner (after 2016)

^Top

Multifrequency Buttons light up WHITE Data scrambled (variable per individual cloner, possibly due to prevent legal issues) Coil performance good

Standard password is normally (for T55xx):  AA55BBBB
Standard password 13,56mHz:       individual per white cloner

White cloner (after 2016 D Quality)

^Top

Multifrequency (it says so but it doesn't) Only works for EM/HID card (125kHz) High frequency not working

Standard password is normally (for T55xx):  AA55BBBB

Note: Sets the HID card in TEST MODE

Restore page1 data

^Top

lf t55xx write -b 1 -d E0150A48 --pg1
lf t55xx write -b 2 -d 2D782308 --pg1

Sniffing the comms

^Top

The T55x7 protocol uses a pwm based protocol for writing to tags. In order to make decoding easier try the new command as seen below instead. It will try to extract the data written.

-- after threshold limit 20 is triggered, skip 10000 samples before collecting samples.
lf config -s 10000 -t 20
lf t55xx sniff

-- if you have a save trace from before, try
data load -f xxxxxxx.pm3
lf t55xx sniff -1

It uses the existing lf sniff command to collect the data, so setting that first as per normal sniffing is recommended. Once you have a sniff, you can "re-sniff" from the stored sniffed data and try different settings, if you think the data is not clean.

As normal, the cloner may write data past the end of the 40K sample buffer. So using the lf config -s <x bytes> then re-run the sniff to see if there is more data.