Research, development and trades concerning the powerful Proxmark3 device.
Remember; sharing is caring. Bring something back to the community.
"Learn the tools of the trade the hard way." +Fravia
Time changes and with it the technology
Proxmark3 @ discord
Users of this forum, please be aware that information stored on this site is not private.
Pages: 1
Thank you for your answer!
I just asked, because i try to find out how to calculate the checksum/crc for the following dump for a very long time!
B80B is the associated hex-value of 30,00€ (0BB8) and 0932 is the corresponding checksum/crc!
Maybe someone can help...
Many thanks in advance!
Last edited by Ollibolli (2020-03-10 15:16:33)
Thank you for your answer!
I just asked, because i try to find out how to calculate the checksum/crc for the following dump for a very long time!
B80B is the associated hex-value of 30,00€ (0BB8) and 0932 is the corresponding checksum/crc!
Maybe someone can help...
Many thanks in advance!
Hmm, it seems there is another number nessesary for validate the card above!
I think "D4 B6" somehow belongs to the value "B8 0B"...
Can you see/find some coherences?
To format text check out the guide at http://www.proxmark.org/forum/help.php#bbcode (which can be found by clicking on the BBCode link.
To have a code/aligned text box, I would recommend the code /code options (wrapped in square brackets)
e.g.
Copy the list into the clipboard
pasted between code /code sections.
Thank you, but this do not work very well with me!
Here you can download the affected dups:
https://c.1und1.de/@626831653653715951/ … jNgpwMPFow
Sentinel, hopefully you find a solution for this...;-)
1.Remove passwords from file
2.Сount CRC-16/MODBUS 14 lines
dump example 05.00
================================
01 00 00 00 00 00 8A 4F A6 5C 00 00 00 00 00 00
00 00 00 00 01 01 5A 00 02 00 00 00 00 00 00 01
78 01 00 00 00 00 00 00 00 00 F4 01 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
00 00 20 20 20 20 20 20 20 20 20 20 20 20 20 20
20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
20 20 20 20 20 20 20 20 20 20 00 00 00 00 8A 4F
00 00 00 00 00 00 00 00 00 00 00 00 00 00
================================
CRC-16/MODBUS = 0x7C31
Forgive me for being stupid. Are dates and rooms stored in a predictable place? Or do I need to know what I'm looking for to find it?
I have dumped my entire hotel key collection, over 60 cards, now I have a shit-ton of hotel key dumps, would love to be able to read useful data from them reliably.
The vast majority of them are Hilton cards. I put the dumps up on github if anyone needs some fresh data to play with.
If there's a tutorial to get me up to speed, please point me there.
There are some old blogs on how someone did map different parts of vingcards, you can follow his idea for methodology.
Otherwise, its comparing and guessing, and see if you can verify what you guess to make any sense on a different card. Speaking of broad terms.
Head over to the discord server, and yes, I take a copy of those dumps of yours