Research, development and trades concerning the powerful Proxmark3 device.
Remember; sharing is caring. Bring something back to the community.
"Learn the tools of the trade the hard way." +Fravia
Time changes and with it the technology
Proxmark3 @ discord
Users of this forum, please be aware that information stored on this site is not private.
Pages: 1
Hi guys,
I got some of this fobs laying around my lab, and i just started playing with them for fun.
Got this data from one of them, before disassembling it.
proxmark3> lf search
Reading 30000 bytes from device memory
Data fetched
Samples @ 8 bits/smpl, decimation 1:1
NOTE: some demods output possible binary
if it finds something that looks like a tag
False Positives ARE possible
Checking for known tags:
EM410x pattern found:
EM TAG ID : 09002E5921
Unique TAG ID : 9000749A84
Possible de-scramble patterns
HoneyWell IdentKey {
DEZ 8 : 03037473
DEZ 10 : 0003037473
DEZ 5.5 : 00046.22817
DEZ 3.5A : 009.22817
DEZ 3.5B : 000.22817
DEZ 3.5C : 046.22817
DEZ 14/IK2 : 00038657743137
DEZ 15/IK3 : 000618482932356
DEZ 20/ZK : 09000000070409100804
}
Other : 22817_046_03037473
Pattern Paxton : 155359009 [0x9429721]
Pattern 1 : 1952322 [0x1DCA42]
Pattern Sebury : 22817 46 3037473 [0x5921 0x2E 0x2E5921]
Valid EM410x ID Found!
I just tried to write ID, but i think it's not writable, probably it's password-protected?
Do someone have ever had to deal with them and been able someway to reset them?
If i'm right the vendor told me they were writable. Probably with a dedicated reader??
Last edited by Pummarola (2015-12-18 00:38:26)
similar, but i find t55x7's easier to work with/program